default search action
Kazue Sako
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c23]Ken Watanabe, Kazue Sako:
POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics. ACNS Workshops 2023: 710-715 - [c22]Zheng Wen, Xin Qi, Toshio Sato, Kazuhiko Tamesue, Yutaka Katsuyama, Kazue Sako, Jiro Katto, Takuro Sato:
LSTM-Based GNSS Spoofing Detection for Drone Formation Flights. IECON 2023: 1-6 - 2022
- [c21]Dan Yamamoto, Yuji Suga, Kazue Sako:
Formalising Linked-Data based Verifiable Credentials for Selective Disclosure. EuroS&P Workshops 2022: 52-65 - [e14]Yuji Suga, Kouichi Sakurai, Xuhua Ding, Kazue Sako:
ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022 - 3 June 2022. ACM 2022, ISBN 978-1-4503-9140-5 [contents] - 2021
- [c20]Xin Qi, Keping Yu, Toshio Sato, Kouichi Shibata, Eric Brigham, Takanori Tokutake, Rikiya Eguchi, Yusuke Maruyama, Zheng Wen, Kazuhiko Tamesue, Yutaka Katsuyama, Kazue Sako, Takuro Sato:
Ledger-based Points Transfer System in LPWAN: From Disaster Management Aspect. ICT-DM 2021: 150-155 - [e13]Kazue Sako, Nils Ole Tippenhauer:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part I. Lecture Notes in Computer Science 12726, Springer 2021, ISBN 978-3-030-78371-6 [contents] - [e12]Kazue Sako, Nils Ole Tippenhauer:
Applied Cryptography and Network Security - 19th International Conference, ACNS 2021, Kamakura, Japan, June 21-24, 2021, Proceedings, Part II. Lecture Notes in Computer Science 12727, Springer 2021, ISBN 978-3-030-78374-7 [contents]
2010 – 2019
- 2019
- [c19]Batnyam Enkhtaivan, Takao Takenouchi, Kazue Sako:
A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain. PST 2019: 1-5 - [e11]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11735, Springer 2019, ISBN 978-3-030-29958-3 [contents] - [e10]Kazue Sako, Steve A. Schneider, Peter Y. A. Ryan:
Computer Security - ESORICS 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11736, Springer 2019, ISBN 978-3-030-29961-3 [contents] - [e9]Dongdai Lin, Kazue Sako:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11442, Springer 2019, ISBN 978-3-030-17252-7 [contents] - [e8]Dongdai Lin, Kazue Sako:
Public-Key Cryptography - PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11443, Springer 2019, ISBN 978-3-030-17258-9 [contents] - 2018
- [c18]Kenji Tanaka, Rikiya Abe, Triet Nguyen-Van, Yuto Yamazaki, Tetsuya Kamitamari, Kazue Sako, Toshio Koide:
A Proposal on an Electricity Trading Platform Using Blockchain. TE 2018: 976-983 - [e7]Sarah Meiklejohn, Kazue Sako:
Financial Cryptography and Data Security - 22nd International Conference, FC 2018, Nieuwpoort, Curaçao, February 26 - March 2, 2018, Revised Selected Papers. Lecture Notes in Computer Science 10957, Springer 2018, ISBN 978-3-662-58386-9 [contents] - 2016
- [e6]Kazue Sako:
Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings. Lecture Notes in Computer Science 9610, Springer 2016, ISBN 978-3-319-29484-1 [contents] - 2013
- [e5]Kazue Sako, Palash Sarkar:
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part I. Lecture Notes in Computer Science 8269, Springer 2013, ISBN 978-3-642-42032-0 [contents] - [e4]Kazue Sako, Palash Sarkar:
Advances in Cryptology - ASIACRYPT 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part II. Lecture Notes in Computer Science 8270, Springer 2013, ISBN 978-3-642-42044-3 [contents] - 2012
- [e3]Xiaoyun Wang, Kazue Sako:
Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings. Lecture Notes in Computer Science 7658, Springer 2012, ISBN 978-3-642-34960-7 [contents] - [e2]George Danezis, Sven Dietrich, Kazue Sako:
Financial Cryptography and Data Security - FC 2011 Workshops, RLCPS and WECSR 2011, Rodney Bay, St. Lucia, February 28 - March 4, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7126, Springer 2012, ISBN 978-3-642-29888-2 [contents] - 2011
- [c17]Sumio Morioka, Toshiyuki Isshiki, Satoshi Obana, Yuichi Nakamura, Kazue Sako:
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology. HOST 2011: 57-62 - [r16]Kazue Sako:
Digital Signature Schemes. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 343-344 - [r15]Kazue Sako:
Electronic Voting Schemes. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 391-393 - [r14]Kazue Sako:
Goldwasser-Micali Encryption Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 516 - [r13]Kazue Sako:
Nyberg-Rueppel Signature Scheme. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 879 - [r12]Kazue Sako:
Probabilistic Public-Key Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 980 - [r11]Kazue Sako:
Public Key Cryptography. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 996-997 - [r10]Kazue Sako:
Semantic Security. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1176-1177 - [r9]Kazue Sako:
Verifiable Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1356-1357 - 2010
- [c16]Aggelos Kiayias, Kazue Sako:
RLCPS Preface. Financial Cryptography Workshops 2010: 105 - [c15]Jun Furukawa, Kengo Mori, Kazue Sako:
An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization. Towards Trustworthy Elections 2010: 141-154 - [e1]Radu Sion, Reza Curtmola, Sven Dietrich, Aggelos Kiayias, Josep M. Miret, Kazue Sako, Francesc Sebé:
Financial Cryptography and Data Security, FC 2010 Workshops, RLCPS, WECSR, and WLC 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6054, Springer 2010, ISBN 978-3-642-14991-7 [contents]
2000 – 2009
- 2009
- [j2]Isamu Teranishi, Jun Furukawa, Kazue Sako:
k-Times Anonymous Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 147-165 (2009) - [c14]Jun Furukawa, Kazue Sako, Satoshi Obana:
IC card-based single sign-on system that remains secure under card analysis. Digital Identity Management 2009: 63-72 - 2007
- [j1]Jun Furukawa, Kazue Sako:
An Efficient Publicly Verifiable Mix-Net for Long Inputs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 113-127 (2007) - 2006
- [c13]Toshiyuki Isshiki, Kengo Mori, Kazue Sako, Isamu Teranishi, Shoko Yonezawa:
Using group signatures for identity management and its implementation. Digital Identity Management 2006: 73-78 - [c12]Jun Furukawa, Kazue Sako:
An Efficient Publicly Verifiable Mix-Net for Long Inputs. Financial Cryptography 2006: 111-125 - [c11]Isamu Teranishi, Kazue Sako:
k-Times Anonymous Authentication with a Constant Proving Cost. Public Key Cryptography 2006: 525-542 - 2005
- [r8]Kazue Sako:
digital signature schemes. Encyclopedia of Cryptography and Security 2005 - [r7]Kazue Sako:
Electronic Voting Schemes. Encyclopedia of Cryptography and Security 2005 - [r6]Kazue Sako:
Goldwasser-Micali Encryption Scheme. Encyclopedia of Cryptography and Security 2005 - [r5]Kazue Sako:
Nyberg-Rueppel Signature Scheme. Encyclopedia of Cryptography and Security 2005 - [r4]Kazue Sako:
Probabilistic Public-Key Encryption. Encyclopedia of Cryptography and Security 2005 - [r3]Kazue Sako:
Public Key Cryptography. Encyclopedia of Cryptography and Security 2005 - [r2]Kazue Sako:
Semantic Security. Encyclopedia of Cryptography and Security 2005 - [r1]Kazue Sako:
Verifiable Encryption. Encyclopedia of Cryptography and Security 2005 - 2004
- [c10]Isamu Teranishi, Jun Furukawa, Kazue Sako:
k-Times Anonymous Authentication (Extended Abstract). ASIACRYPT 2004: 308-322 - 2002
- [c9]Jun Furukawa, Hiroshi Miyauchi, Kengo Mori, Satoshi Obana, Kazue Sako:
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling. Financial Cryptography 2002: 16-30 - 2001
- [c8]Jun Furukawa, Kazue Sako:
An Efficient Scheme for Proving a Shuffle. CRYPTO 2001: 368-387 - 2000
- [c7]Martin Hirt, Kazue Sako:
Efficient Receipt-Free Voting Based on Homomorphic Encryption. EUROCRYPT 2000: 539-556 - [c6]Kazue Sako:
An Auction Protocol Which Hides Bids of Losers. Public Key Cryptography 2000: 422-432
1990 – 1999
- 1999
- [c5]Kazue Sako:
Implementation of a Digital Lottery Server on WWW. CQRE 1999: 101-108 - 1997
- [c4]Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani:
Fault tolerant anonymous channel. ICICS 1997: 440-444 - 1996
- [c3]Markus Jakobsson, Kazue Sako, Russell Impagliazzo:
Designated Verifier Proofs and Their Applications. EUROCRYPT 1996: 143-154 - 1995
- [c2]Kazue Sako, Joe Kilian:
Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth. EUROCRYPT 1995: 393-403 - 1994
- [c1]Kazue Sako, Joe Kilian:
Secure Voting Using Partially Compatible Homomorphisms. CRYPTO 1994: 411-424
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint