Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IPSJ-CSEC, SITE, ICSS [detail] |
2009-07-03 14:15 |
Akita |
Akita University |
Risk Assessment Method for Networked Systems using CVSS Toshiki Harada, Akira Kanaoka, Eiji Okamoto (Univ.Tsukuba), Masahiko Kato (IIJ Technology) ISEC2009-34 SITE2009-26 ICSS2009-48 |
CVSS(Common Vulnerability Scoring System) is a common vulnerability scoring method. CVSS is composed of three metrics gr... [more] |
ISEC2009-34 SITE2009-26 ICSS2009-48 pp.189-194 |
ISEC |
2009-05-22 14:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Another Experimental Security Analysis of OTU2000 through Attacks Based on Lattice Theory Daewoo Kim, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba.) ISEC2009-10 |
OTU 2000 was proposed as a quantum cyrptosystem which may not be broken even if quantum computers are constructed. In th... [more] |
ISEC2009-10 pp.61-68 |
ISEC |
2008-05-16 16:35 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Strongly Unforgeable ID-based Signatures Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2008-15 |
There is an open problem to construct ID-based signature schemes which satisfy strongly EUF-ID-CMA, without random oracl... [more] |
ISEC2008-15 pp.99-106 |
LOIS |
2008-03-07 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg.(pending) |
On the Security of Publicly Verifiable Electronic Voting Masahiro Mambo, Eiji Okamoto (Univ. Tsukuba) OIS2007-97 |
So far, publicly verifiable voting schemes have been proposed where voters can verify
the correctness of tallying of al... [more] |
OIS2007-97 pp.1-4 |
LOIS |
2008-03-07 13:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg.(pending) |
Efficiency Verification of the Improved PayWord Micropayment Scheme Mitsuyoshi Kaga, Masahiro Mambo, Eiji Okamoto (Univ. Tsukuba) OIS2007-98 |
Adachi et al. pointed out vulnerability of misuse of credential by user in the well-known PayWord micropayment scheme an... [more] |
OIS2007-98 pp.5-10 |
ISEC |
2007-09-07 11:40 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Sender Authenticated Key Agreements Without Random Oracles Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba) ISEC2007-80 |
The purpose of this paper is to study sender authenticated key agreements by a third party, which uses the received para... [more] |
ISEC2007-80 pp.49-55 |
ISEC |
2007-05-18 15:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A multiplication formula on degenerate divisors of genus 4 hyperelliptic curves Naoki Kanayama, Takehiro Yamaguchi, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) ISEC2007-11 |
We show an pairing-friendly genus 4 hyperelliptic curve over finite fields of characteristic 2 and prove an scalar multi... [more] |
ISEC2007-11 pp.69-76 |
IT, ISEC, WBS |
2007-03-15 16:55 |
Gunma |
Gunma Univ. (Kiryu Campus) |
Universal $\eta_T$ Pairing Algorithm over Arbitrary Extension Degrees Masaaki Shirase, Tsuyoshi Takagi (Future Univ. Hakodate), Eiji Okamoto (Univ of Tsukuba) |
[more] |
IT2006-76 ISEC2006-131 WBS2006-73 pp.87-92 |
ISEC |
2006-12-13 13:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Proposal for an improvement of computing Twisted Ate pairing Seiichi Matsuda, Naoki Kanayama, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
[more] |
ISEC2006-106 pp.29-34 |
ISEC, LOIS |
2006-11-16 16:10 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
Cost Reduction in the Micropayment Scheme PayWord Mitsuyoshi Kaga, Masahiro Mambo, Eiji Okamoto (Univ. of Tsukuba) |
[more] |
ISEC2006-92 OIS2006-50 pp.25-29 |
ISEC, LOIS |
2006-11-17 11:15 |
Chiba |
Univ. of Tokyo(Kashiwa Campus) |
Final exponentiation of ηT pairing Masaaki Shirase, Tsuyoshi Takagi (Future Univ.-Hakodate), Eiji Okamoto (Univ. of Tsukuba) |
[more] |
ISEC2006-98 OIS2006-56 pp.19-26 |
ISEC, SITE, IPSJ-CSEC |
2006-07-20 10:45 |
Okayama |
Okayama Univ. |
Efficient Calculation for Tate Pairing Masaaki Shirase, Tsuyoshi Takagi (FUN), Eiji Okamoto (Univ of Tsukuba) |
[more] |
ISEC2006-12 SITE2006-9 pp.19-26 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 13:00 |
Iwate |
Iwate Prefectural University |
Construction of Oblivious Signatures Nobuyuki Shiina, Takeshi Okamoto, Eiji Okamoto (Tsukuba Univ.) |
(To be available after the conference date) [more] |
ISEC2005-31 SITE2005-29 pp.165-171 |
ISEC, LOIS |
2004-11-09 10:15 |
Osaka |
Osaka Univ. |
Transformation-Free Proxy Cryptosystems with Limited Authorization Lihua Wang (Tsukuba Univ.), Zhenfu Cao (Shanghai Jiao Tong Univ.), Eiji Okamoto, Ying Miao, Takeshi Okamoto (Tsukuba Univ.) |
In this paper transformation-free proxy cryptosystems with limited
authorization (TFP systems) are studied. The TFP sys... [more] |
ISEC2004-88 OIS2004-55 pp.23-28 |