Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
RCC, ISEC, IT, WBS |
2024-03-13 10:45 |
Osaka |
Osaka Univ. (Suita Campus) |
Note on Impossibility of Tight Reduction on IND-CCA secure IdentityBased Encryption with Multiple Private-Key Generators Yudai Suzuki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai (NTT Social Informatics Lab.) IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 |
Identity-Based Encryption with Multiple Private-Key Generators (mPKG-IBE) has been proposed by Fujioka and Yoneyama at P... [more] |
IT2023-81 ISEC2023-80 WBS2023-69 RCC2023-63 pp.38-43 |
LOIS, SITE, ISEC |
2023-11-10 11:45 |
Hiroshima |
Satellite Campus Hiroshima (Primary: On-site, Secondary: Online) |
Secure Identity-Based Authenticated Key Exchange with Multiple Private Key Generators against Malicious Generators Kazuma Wariki, Atsushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) ISEC2023-66 SITE2023-60 LOIS2023-24 |
We propose a new security model, id(m)-aneCK model, for identity-based authenticated key exchange with multiple private ... [more] |
ISEC2023-66 SITE2023-60 LOIS2023-24 pp.78-85 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2023-07-25 15:10 |
Hokkaido |
Hokkaido Jichiro Kaikan |
Extended $k^m$-anonymity for randomization Masaya Kobayashi, Atsushi Fujioka (Kanagawa Univ.), Koji Chida (Gunma Univ.) ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 |
Various models have been proposed to evaluate anonymity. Among them, $k$-anonymity is widely known as a representative a... [more] |
ISEC2023-53 SITE2023-47 BioX2023-56 HWS2023-53 ICSS2023-50 EMM2023-53 pp.255-260 |
RCC, ISEC, IT, WBS |
2023-03-15 14:55 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Experiments on pre-image computation time in Keccak[r = 40, c = 160, nr = 2] Xinyu Qi, Atsushi Fujioka (Kanagawa Univ), Kazumaro Aoki (BUNKYO Univ) IT2022-131 ISEC2022-110 WBS2022-128 RCC2022-128 |
Keccak is the technology behind the cryptographic hash function selected by the National Institute of Standards and Tech... [more] |
IT2022-131 ISEC2022-110 WBS2022-128 RCC2022-128 pp.398-403 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 15:50 |
Online |
Online |
Revocable Identity-Based Encryption With Multiple Private-Key Generators secure against Chosen Ciphertext Attacks and Decryption Key Exposure Yudai Suzuki, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Akira Nagai (NTT) ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 |
This study gives new security definitions for revocable identity-based encryption with multiple private-key generators (... [more] |
ISEC2022-27 SITE2022-31 BioX2022-52 HWS2022-27 ICSS2022-35 EMM2022-35 pp.118-123 |
SITE, ISEC, LOIS |
2021-11-12 13:50 |
Online |
Online |
Security notions of decryption-controllable identity-based encryption Hidekazu Miyanaga, Atsushi Fujioka, Taroh Sasaki (Kanagawa Univ.), Yuki Okano (NTT), Koutarou Suzuki (Toyohashi Univ. of Tech.), Kazuki Yoneyama (Ibaraki Univ.) ISEC2021-43 SITE2021-37 LOIS2021-26 |
In recent years, there have been increasing opportunities for a single user to have multiple devices. A similar situati... [more] |
ISEC2021-43 SITE2021-37 LOIS2021-26 pp.13-17 |
LOIS, ISEC, SITE |
2020-11-06 11:45 |
Online |
Online |
Encodings and Numbers of Ciphertexts in Garbled Circuits on Three-valued Logic Shunsuke Hayashi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2020-35 SITE2020-32 LOIS2020-15 |
Reducing the number of ciphertexts in a garbled circuit, a realization
method of secure computation, has been researche... [more] |
ISEC2020-35 SITE2020-32 LOIS2020-15 pp.19-25 |
ISEC |
2020-05-20 16:05 |
Online |
Online |
Identity-based Authenticated Key Exchange for IoT Devices and its Security against Malicious Private Key Generator Kazuma Wariki, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.), Koutarou Suzuki (Toyohashi Univ. of Tech.), Junichi Tomida (NTT) ISEC2020-12 |
With a rapid increase in the number of IoT devices, many
identity-based authenticated key exchange (IBAKE) protocols fo... [more] |
ISEC2020-12 pp.55-61 |
WBS, IT, ISEC |
2018-03-08 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Effect on randomizing components to the security of Minalpher Yuki Kishi, Keita Osafune, Yuta Kuwano, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-117 ISEC2017-105 WBS2017-98 |
This paper examines randomizing components in Minalpher, where the randomizing components are Shift Rows (SR) and Mix C... [more] |
IT2017-117 ISEC2017-105 WBS2017-98 pp.73-79 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106 |
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more] |
IT2017-125 ISEC2017-113 WBS2017-106 pp.129-135 |
WBS, IT, ISEC |
2018-03-09 09:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Case of ID-CCA2 Security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-139 ISEC2017-127 WBS2017-120 |
Identity-Based Encryption (IBE) is a type of Public-Key Encryption. The IND security (indistinguishability) and the ANO ... [more] |
IT2017-139 ISEC2017-127 WBS2017-120 pp.213-218 |
WBS, IT, ISEC |
2018-03-09 09:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On Confirming Ciphertext Update in Key-Updatable Public-key Encryption with Keyword Search Yuka Sakoda, Honomu Ohtomo, Naoki Matsunaga, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) IT2017-140 ISEC2017-128 WBS2017-121 |
A public-key encryption with keyword search (PEKS) scheme is applicable to safe cloud services as a user can search a ke... [more] |
IT2017-140 ISEC2017-128 WBS2017-121 pp.219-223 |
ISEC, COMP |
2017-12-22 10:40 |
Kochi |
Eikokuji Campus, Kochi University of Technology |
A Note on Security Notions of Anonymity in Identity-Based Encryption
-- Relationship between LOR security and SW security -- Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2017-85 COMP2017-39 |
One of the criteria of security of Identity-based encryption is anonymity. The anonymity is defined using a game betwee... [more] |
ISEC2017-85 COMP2017-39 pp.89-94 |
COMP, ISEC |
2016-12-21 09:50 |
Hiroshima |
Hiroshima University |
A note on security notions of anonymity in Identity-based encryption Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32 |
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] |
ISEC2016-71 COMP2016-32 pp.9-13 |
COMP, ISEC |
2016-12-22 09:30 |
Hiroshima |
Hiroshima University |
Effect on Mix Columns to the Security of Minalpher Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) ISEC2016-80 COMP2016-41 |
This article is about Mix Columns in Minalpher. SPN strcture have Mix Columns. Mix Columns have an influence on sa... [more] |
ISEC2016-80 COMP2016-41 pp.59-62 |