Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, RCC, WBS |
2022-03-10 09:40 |
Online |
Online |
Construction GKW Transformation for Arithmetic Circuits Kotaro Chinen, Hiroaki Anada (Univ. Nagasaki) IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 |
Garbled ciruits is a cryptographic framework for secure two-party computation introduced by Yao. Yao's protocol is a met... [more] |
IT2021-88 ISEC2021-53 WBS2021-56 RCC2021-63 pp.31-37 |
IT, ISEC, RCC, WBS |
2022-03-10 10:05 |
Online |
Online |
Towards Group Signature Scheme with Equality Test for Signers Kyoya Anzai, Hiroaki Anada (Univ. Nagasaki) IT2021-89 ISEC2021-54 WBS2021-57 RCC2021-64 |
In this technical report, we discuss a group signature scheme with equality test for signers. This scheme has a func... [more] |
IT2021-89 ISEC2021-54 WBS2021-57 RCC2021-64 pp.38-41 |
WBS, IT, ISEC |
2021-03-05 11:45 |
Online |
Online |
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction Hiroaki Anada (Univ. of Nagasaki) IT2020-149 ISEC2020-79 WBS2020-68 |
We propose an anonymous credential scheme and its generic construction, where there are independent decentralized multi-... [more] |
IT2020-149 ISEC2020-79 WBS2020-68 pp.225-231 |
ISEC |
2020-05-20 14:40 |
Online |
Online |
Making Variance of Mining Time Smaller for Computational Problems Based on Hash Functions
-- Serial Concatenation and Parallel Concatenation -- Hiroaki Anada (Univ. Nagasaki), Kouichi Sakurai (Kyushu Univ.) ISEC2020-9 |
In Bitcoin, the computational problem which miners should solve is
an equation described in the term of a hash functio... [more] |
ISEC2020-9 pp.33-40 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 14:35 |
Kochi |
Kochi University of Technology |
A Method for Key-Updatable Symmetric Searchable Encryption Natsume Matsuzaki, Hiroaki Anada (Univ. of Nagasaki) ISEC2019-54 SITE2019-48 BioX2019-46 HWS2019-49 ICSS2019-52 EMM2019-57 |
[more] |
ISEC2019-54 SITE2019-48 BioX2019-46 HWS2019-49 ICSS2019-52 EMM2019-57 pp.353-356 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-24 15:00 |
Kochi |
Kochi University of Technology |
Participation Report of the 9th BIU Winter School on Cryptography Hiroaki Anada (Univ. Nagasaki) ISEC2019-55 SITE2019-49 BioX2019-47 HWS2019-50 ICSS2019-53 EMM2019-58 |
In this technical report, ``The 9th BIU Winter School on Cryptography'' is introduced, which the author participated in.... [more] |
ISEC2019-55 SITE2019-49 BioX2019-47 HWS2019-50 ICSS2019-53 EMM2019-58 pp.357-361 |
IT, ISEC, WBS |
2019-03-08 16:10 |
Tokyo |
University of Electro-Communications |
Non-interactive Proof Systems for Group-Dependent Bundled Languages Hiroaki Anada (Univ. of Nagasaki) IT2018-114 ISEC2018-120 WBS2018-115 |
In this report,
we propose a bundled language for the direct product of group-dependent languages.
Then we construct... [more] |
IT2018-114 ISEC2018-120 WBS2018-115 pp.243-248 |
ISEC |
2018-09-07 10:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On AND/OR Composition of the ZKBoo Protocols Hiroaki Anada (U. Nagasaki) ISEC2018-53 |
The ZKBoo protocol, which was presented at USENIX Security '16, is a kind of sigma-protocol. Since the presentation it i... [more] |
ISEC2018-53 pp.23-24 |
LOIS, ISEC, SITE |
2017-11-09 16:30 |
Kyoto |
|
Anonymous Attribute-Authentication Scheme in Multi-authority Setting on Key Generation Hiroaki Anada (U.Nagasaki), Seiko Arita (IISEC) ISEC2017-59 SITE2017-41 LOIS2017-36 |
In a setting that a single user is given plural credentials on her attributes and related secret keys, an authentication... [more] |
ISEC2017-59 SITE2017-41 LOIS2017-36 pp.63-70 |
ISEC |
2017-05-12 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Proposal on Key-Updatable Searchable Encryption
-- Applying Proxy Re-Encryption with Keyword Search -- Natsume Matsuzaki, Hiroaki Anada, Yohei Watanabe (Univ. of Nagasaki) ISEC2017-1 |
Searchable encryption is one of the advanced cryptographic primitives,
which is being studied and developed actively
... [more] |
ISEC2017-1 pp.1-6 |
ISEC, WBS, IT |
2017-03-10 11:45 |
Tokyo |
TOKAI University |
Diagonally Witness-Indistinguishable Proof Systems Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) IT2016-121 ISEC2016-111 WBS2016-97 |
We propose a witness-indistinguishable proof system which is a kind of parallel composition of witness-indistinguishable... [more] |
IT2016-121 ISEC2016-111 WBS2016-97 pp.145-148 |
ISEC |
2016-09-02 10:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Bundling Proofs of Knowledge and its Application to Signatures Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC) ISEC2016-39 |
(To be available after the conference date) [more] |
ISEC2016-39 pp.9-14 |
LOIS, ISEC, SITE |
2015-11-07 10:55 |
Kanagawa |
Kanagawa Univ. |
Extension of NTRU Using Group Ring and Its Application Takanori Yasuda, Hiroaki Anada (ISIT), Kouichi Sakurai (Kyushu Univ.) ISEC2015-52 SITE2015-39 LOIS2015-46 |
[more] |
ISEC2015-52 SITE2015-39 LOIS2015-46 pp.103-109 |
IPSJ-CSEC, ISEC, SITE, ICSS, EMM, IPSJ-SPT [detail] |
2015-07-02 10:15 |
Aichi |
NAGOYA TRADE & INDUSTRY CENTER |
Attribute-Based Two-Tier Signatures Hiroaki Anada (ISIT), Seiko Arita (IISEC), Kouichi Sakurai (Kyushu University) ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 |
An attribute-based signature scheme is a digital signature scheme proposed in 2008 by Maji et al.,
in which a message i... [more] |
ISEC2015-9 SITE2015-7 ICSS2015-19 EMM2015-17 pp.1-8 |
IA, ICSS |
2015-06-12 11:30 |
Fukuoka |
Kyushu Institute of Technology Univ. |
A Report on International Conference NDSS2015 Hiroaki Anada (ISIT), Yuhei Kawakoya (NTTi3), Kuniyasu Suzaki (AIST) IA2015-12 ICSS2015-12 |
International conference NDSS (Network and Distributed System Security Symposium) is one of the top conference of inform... [more] |
IA2015-12 ICSS2015-12 pp.63-68 |
IT, ISEC, WBS |
2010-03-04 11:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks Hiroaki Anada, Seiko Arita (IISEC) IT2009-76 ISEC2009-84 WBS2009-55 |
We give a discrete logarithm based identification scheme characterized by its high efficiency and strong security. In fa... [more] |
IT2009-76 ISEC2009-84 WBS2009-55 pp.31-38 |