• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

SHIKATA Junji  四方 順司

ORCIDConnect your ORCID iD *help
… Alternative Names

SHIKATA JUNJI  四方 順司

Less
Researcher Number 30345483
Other IDs
External Links
Affiliation (Current) 2022: 横浜国立大学, 大学院環境情報研究院, 教授
Affiliation (based on the past Project Information) *help 2022: 横浜国立大学, 環境情報研究科(研究院), 教授
2016 – 2021: 横浜国立大学, 大学院環境情報研究院, 教授
2012 – 2015: 横浜国立大学, 環境情報研究院, 准教授
2013: 横浜国立大学, 大学院環境情報研究院, 准教授
2011: 横浜国立大学, 環境情報研究科(研究院), 准教授 … More
2007 – 2009: Yokohama National University, 大学院・環境情報研究院, 准教授
2005: 横浜国立大学, 大学院・環境情報研究院, 助教授
2005: Yokohama National University, Graduate School of Environment and Information Sciences, Associate Professor, 大学院環境情報研究院, 助教授
2004: 国立大学法人横浜国立大学, 大学院・環境情報研究科, 講師
2004: 国立大学法人横浜国立大学, 大学院・環境情報研究院, 講師
2003: 横浜国立大学, 大学院・環境情報研究院, 講師 Less
Review Section/Research Field
Principal Investigator
Fundamental theory of informatics / Information security / Basic Section 60070:Information security-related
Except Principal Investigator
Science and Engineering / Information security / Basic Section 60010:Theory of informatics-related
Keywords
Principal Investigator
暗号理論 / 情報理論的安全性 / 暗号 / 認証 / 暗号・認証等 / 情報量的安全性 / ステガノグラフィ / 情報セキュリティ / 署名 / 高機能暗号 … More / 情報理論 / 情報理論的な安全性 / 認証子つき暗号化方式 / ブラインド署名方式 / 認証・署名 / 結合可能安全性 / 結合可能性 / 長期的安全性 / 計算量的安全性 / 鍵共有 / 暗号・認証 … More
Except Principal Investigator
情報理論的安全性 / 情報セキュリティ / 暗号・認証 / バイオメトリクス(生体認証) / 人工物メトリクス / 耐タンパー性 / 署名生成機能の危殆化 / タイムスタンプ / 情報ハイディング / 暗号・認証等 / バイオメトリクス / 人間機械間暗号 / 非常時通報 / 耐タンパー技術 / 耐クローン技術 / バイオメトリクス技術 / 電子署名 / 証拠性 / Information Security / Cryptography / Authentication / Biometrics / Artifact-metrics / Tamper Resistance / Compromise of Digital Signature / Time Stamping / Information Hiding / 推測秘匿性 / 暗号理論 / 情報理論的暗号理論 / 共通鍵暗号 / 秘密分散法 / 安全性概念 / 十分統計量 / 計算量的安全性 Less
  • Research Projects

    (10 results)
  • Research Products

    (192 results)
  • Co-Researchers

    (11 People)
  •  公開鍵暗号の識別不可能性に対する総合的評価技術の開発Principal Investigator

    • Principal Investigator
      四方 順司
    • Project Period (FY)
      2022 – 2025
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Yokohama National University
  •  十分統計量に基づくシミュレーションベース安全性の深化

    • Principal Investigator
      岩本 貢
    • Project Period (FY)
      2021 – 2024
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60010:Theory of informatics-related
    • Research Institution
      The University of Electro-Communications
  •  情報理論的暗号理論における統一的パラダイムの深化、発展とその応用Principal Investigator

    • Principal Investigator
      四方 順司
    • Project Period (FY)
      2018 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Review Section
      Basic Section 60070:Information security-related
    • Research Institution
      Yokohama National University
  •  推測秘匿性に基づく情報理論的暗号理論の新展開

    • Principal Investigator
      岩本 貢
    • Project Period (FY)
      2017 – 2020
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      The University of Electro-Communications
  •  A Unified Paradigm in Information Theoretic Cryptography and Its ApplicationsPrincipal Investigator

    • Principal Investigator
      SHIKATA Junji
    • Project Period (FY)
      2015 – 2017
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      Yokohama National University
  •  Research on Coexistence of Computational and Information-Theoretic Security Mechanisms for Long-term SecurityPrincipal Investigator

    • Principal Investigator
      SHIKATA JUNJI
    • Project Period (FY)
      2014 – 2016
    • Research Category
      Grant-in-Aid for Challenging Exploratory Research
    • Research Field
      Information security
    • Research Institution
      Yokohama National University
  •  Research on Information-Theoretically Composable Security for Cryptographic PrimitivesPrincipal Investigator

    • Principal Investigator
      SHIKATA JUNJI
    • Project Period (FY)
      2011 – 2013
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Yokohama National University
  •  Research on Encryption and Signatures with Information-theoretic Security and Their ApplicationPrincipal Investigator

    • Principal Investigator
      SHIKATA Junji
    • Project Period (FY)
      2007 – 2009
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Yokohama National University
  •  情報理論的に安全性が保障される暗号技術の研究Principal Investigator

    • Principal Investigator
      四方 順司
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Yokohama National University
  •  Research on Basic Information Security Technologies for Assured Conveyance of Users' Intention

    • Principal Investigator
      MATSUMOTO Tsutomu
    • Project Period (FY)
      2001 – 2005
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Yokohama National University

All 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 2003 Other

All Journal Article Presentation Book

  • [Book] Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings2017

    • Author(s)
      Junji Shikata (Editor)
    • Total Pages
      233
    • Publisher
      Springer
    • ISBN
      9783319720883
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Book] Information Theoretic Security2017

    • Author(s)
      Junji Shikata (ed.)
    • Total Pages
      233
    • Publisher
      Springer-Verlag
    • ISBN
      9783319720890
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Journal Article] 非一様ランダム鍵を用いた情報理論的に安全な信頼性の低い調停者付き認証符号について2019

    • Author(s)
      小林大輝, 四方順司
    • Journal Title

      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Identity-based Encryption with Hierarchical Key-insulation in the Standard Model2019

    • Author(s)
      Junji Shikata and Yohei Watanabe
    • Journal Title

      Designs, Codes and Cryptography, Springer

      Volume: 87-5 Pages: 1005-1033

    • DOI

      10.1007/s10623-018-0503-4

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17H01752, KAKENHI-PROJECT-18H03238
  • [Journal Article] 格子問題に基づくSemi-Adaptive安全な内積暗号2019

    • Author(s)
      宮澤智輝, 佐藤慎悟, 四方順司
    • Journal Title

      情報処理学会, 研究報告コンピュータセキュリティ(CSEC)

      Volume: 2019-CSEC-87, no.1 Pages: 1-8

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] KEM/DEMフレームワークを利用したフォワード安全公開鍵暗号と匿名放送型暗号の構成2019

    • Author(s)
      打越忠宏, 四方順司
    • Journal Title

      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices2019

    • Author(s)
      Amonrat Prasitsupparote, Yohei Watanabe, Junichi Sakamoto, Junji Shikata, and Tsutomu Matsumoto
    • Journal Title

      International Journal of Digital Information and Wireless Communications

      Volume: 8 (4) Pages: 288-303

    • DOI

      10.17781/p002535

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17H01752, KAKENHI-PROJECT-16J10532
  • [Journal Article] 探索問題の困難性に基づく効率的なしきい値公開鍵暗号の構成2019

    • Author(s)
      海老名将宏, 渡邉洋平, 四方順司
    • Journal Title

      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices2019

    • Author(s)
      Prasitsupparote Amonrat, Watanabe Yohei, Sakamoto Junichi, Shikata Junji, Matsumoto Tsutomu
    • Journal Title

      International Journal of Digital Information and Wireless Communications (IJDIWC)

      Volume: 8 (4) Pages: 288-303

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] SO-CCA secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model2019

    • Author(s)
      Sato Shingo、Shikata Junji
    • Journal Title

      Cryptography and Coding, Springer

      Volume: LNCS11929 Pages: 317-341

    • DOI

      10.1007/978-3-030-35199-1_16

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-17H01752, KAKENHI-PROJECT-18H03238
  • [Journal Article] エントロピーロスの小さいロバストファジー抽出器の構成に関する一考察2019

    • Author(s)
      山田憲一, 四方順司
    • Journal Title

      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] 格子問題の困難性に基づく多重暗号の効率的な構成法2018

    • Author(s)
      大沼航史, 佐藤慎悟, 四方順司
    • Journal Title

      2018年暗号と情報セキュリティシンポジウム論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Implementation and Analysis of Fully Homomorphic Encryption in Wearable Devices2018

    • Author(s)
      Prasitsupparote Amonrat, Watanabe Yohei, Shikata Junji
    • Journal Title

      Proc. of The Fourth International Conference on Information Security and Digital Forensics (ISDF 2018), The Society of Digital Information and Wireless Communications

      Volume: - Pages: 1-14

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Signcryption with Quantum Random Oracles2018

    • Author(s)
      Sato Shingo、Shikata Junji
    • Journal Title

      Proc. of The 12th International Conference on Provable Security (ProvSec 2018), Springer

      Volume: LNCS 11192 Pages: 406-414

    • DOI

      10.1007/978-3-030-01446-9_24

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Cooperative Jammingを用いた主通信路に雑音のあるWiretap Channel IIにおける暗号通信について2018

    • Author(s)
      飯塚寛貴, 田中亮大, 四方順司
    • Journal Title

      電子情報通信学会, 信学技報

      Volume: vol. 117, no. 488 Pages: 245-251

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography2018

    • Author(s)
      M. Iwamoto, K. Ohta, and J. Shikata
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: Vol. 64, No. 1 Pages: 654-685

    • DOI

      10.1109/tit.2017.2744650

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710, KAKENHI-PROJECT-17H01752
  • [Journal Article] Lattice-Based Signcryption Without Random Oracles2018

    • Author(s)
      Sato Shingo、Shikata Junji
    • Journal Title

      Proceedings of International Conference on Post-Quantum Cryptography, PQCrypto 2018: Post-Quantum Cryptography, Springer

      Volume: LNCS 10786 Pages: 331-351

    • DOI

      10.1007/978-3-319-79063-3_16

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Lower Bounds on Lattice Enumeration with Extreme Pruning2018

    • Author(s)
      Aono Yoshinori、Nguyen Phong Q.、Seito Takenobu、Shikata Junji
    • Journal Title

      Advances in Cryptology - CRYPTO 2018, Springer

      Volume: 10992 Pages: 608-637

    • DOI

      10.1007/978-3-319-96881-0_21

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H02830, KAKENHI-PROJECT-18H03238
  • [Journal Article] Numerical and Non-Asymptotic Analysis of Elias’s and Peres’s Extractors with Finite Input Sequences2018

    • Author(s)
      Amonrat Prasitsupparote, Norio Konno, and Junji Shikata
    • Journal Title

      Entropy

      Volume: 20 (10) Pages: 729-729

    • DOI

      10.3390/e20100729

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-17H01752, KAKENHI-PROJECT-18H03238
  • [Journal Article] CBDH仮定に基づく効率的な閾値公開鍵暗号2018

    • Author(s)
      海老名将宏, 渡邉洋平, 四方順司
    • Journal Title

      第21回コンピュータセキュリティシンポジウム(CSS2018)論文集

      Volume: -

    • NAID

      170000178615

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] 相関のある情報を用いたMultiple Access Wiretap Channelにおける秘匿通信について2018

    • Author(s)
      小川善功, 田中亮大, 四方順司
    • Journal Title

      第21回コンピュータセキュリティシンポジウム(CSS2018)論文集

      Volume: -

    • NAID

      170000178603

    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Threshold Encryption2018

    • Author(s)
      Y. Watanabe and J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 印刷中 Pages: 17-54

    • DOI

      10.1007/s10623-016-0324-2

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-16J10532, KAKENHI-PROJECT-15H02710, KAKENHI-PROJECT-17H01752
  • [Journal Article] 非一様ランダム鍵を用いた情報理論的に安全な調停者付き認証符号について2018

    • Author(s)
      石川美穂, 四方順司
    • Journal Title

      電子情報通信学会, 信学技報

      Volume: vol. 117, no. 488 Pages: 231-236

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 種々のFO変換のKDM安全性に関する一考察2017

    • Author(s)
      中川原里沙, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Threshold Encryption2017

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Numerical Analysis of Elias's and Peres's Deterministic Extractors2017

    • Author(s)
      A. Prasitsupparote, N. Konno, J. Shikata
    • Journal Title

      Proc. of The 51st Annual Conference on Information Systems and Sciences (CISS 2017)

      Volume: 未定

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Tighter bounds on entropy of secret keys in authentication codes2017

    • Author(s)
      J. Shikata
    • Journal Title

      IEEE International Workshop on Information Theory

      Volume: - Pages: 259-263

    • DOI

      10.1109/itw.2017.8278016

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710, KAKENHI-PROJECT-17H01752
  • [Journal Article] CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance2017

    • Author(s)
      Y. Ishida, J. Shikata, and Y. Watanabe
    • Journal Title

      International Journal on Applied Cryptography

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Unconditionally Secure Searchable Encryption2017

    • Author(s)
      T. Yoshizawa, Y. Watanabe, J. Shikata
    • Journal Title

      Proc. of The 51st Annual Conference on Information Systems and Sciences (CISS 2017)

      Volume: 未定

    • NAID

      170000151476

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance2017

    • Author(s)
      Y. Ishida, J. Shikata, and Y. Watanabe
    • Journal Title

      International Journal on Applied Cryptography (IJACT)

      Volume: vol.3, no.3 Pages: 288-311

    • DOI

      10.1504/ijact.2017.086229

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Unconditionally Secure Searchable Encryption2017

    • Author(s)
      T. Yoshizawa, Y. Watanabe, and J. Shikata
    • Journal Title

      Proc. of The 51st Annual Conference on Information Systems and Sciences (CISS 2017)

      Volume: 未定

    • NAID

      170000151476

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Threshold Encryption2017

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 3ラウンド対話型Signcryptionの効率的な構成法2017

    • Author(s)
      井田潤一, 渡邉洋平, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 量子ランダムオラクルモデルにおけるSigncryptionの構成法2017

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance2017

    • Author(s)
      Y. Ishida, J. Shikata, Y. Watanabe
    • Journal Title

      International Journal on Applied Cryptography

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 推測秘匿性に基づく情報理論的に安全な検索可能暗号2017

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Wiretap Channel IIにおける能動的攻撃を考慮した暗号通信について2017

    • Author(s)
      田中亮大,四方順司
    • Journal Title

      コンピュータセキュリティシンポジウム2017論文集

      Volume: -

    • NAID

      170000176337

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] SIS問題の計算量評価2017

    • Author(s)
      青野良範, 清藤武暢, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 推測秘匿性に基づく情報理論的に安全な検索可能暗号2017

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 最悪推測秘匿性を満たす秘密分散法に関する基本的性質2017

    • Author(s)
      岩本貢, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Sequential Aggregate Authentication Codes with Information Theoretic Security2016

    • Author(s)
      S. Tomita, Y. Watanabe, J. Shikata
    • Journal Title

      2016 Annual Conference on Information Science and Systems (CISS)

      Volume: - Pages: 192-197

    • DOI

      10.1109/ciss.2016.7460500

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-26540056, KAKENHI-PROJECT-15H02710
  • [Journal Article] Information-theoretically Secure Timed-release Secret Sharing Schemes2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Journal of Information Processing

      Volume: Vol.24, No.4 Issue: 4 Pages: 680-689

    • DOI

      10.2197/ipsjjip.24.680

    • NAID

      130005165245

    • ISSN
      1882-6652
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710, KAKENHI-PROJECT-16J10532, KAKENHI-PROJECT-26540056
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Trans., Special Section on Discrete Mathematics and Its Applications

      Volume: 未定

    • NAID

      130005154232

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 格子問題に基づくSigncryptionのスタンダードモデルでの構成2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 格子問題に基づくSigncryption構成法の再考2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS2016)論文集

      Volume: -

    • NAID

      170000173664

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 情報理論的に安全な検索可能暗号の構成法について2016

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS2016)論文集

      Volume: -

    • NAID

      170000173735

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] スタンダードモデルにおけるID ベース階層型鍵隔離暗号の構成法2016

    • Author(s)
      渡邉洋平,四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection2016

    • Author(s)
      Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata
    • Journal Title

      Information Security and Cryptology (ICISC 2015), Springer

      Volume: 9558 Pages: 278-293

    • DOI

      10.1007/978-3-319-30840-1

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K16006, KAKENHI-PROJECT-15H02710
  • [Journal Article] Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness2016

    • Author(s)
      Y. Watanabe, G. Hanaoka, J. Shikata
    • Journal Title

      Information Theoretic Security, Springer

      Volume: LNCS 10015 Pages: 213-237

    • DOI

      10.1007/978-3-319-49175-2

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710, KAKENHI-PROJECT-26540056
  • [Journal Article] 情報理論的に安全な検索可能暗号の構成法について2016

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS 2016)論文集

      Volume: -

    • NAID

      170000173735

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Information-Theoretically Secure Timed-Release Secret Sharing Schemes2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Journal of Information Processing

      Volume: 未定

    • NAID

      130005165245

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 汎用的結合可能なゲーム理論的安全性を達成する二者間プロトコル用コンパイラの提案と紛失通信への適用2016

    • Author(s)
      後藤彰太, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: Vol. 99-A, No.6 Issue: 6 Pages: 1097-1106

    • DOI

      10.1587/transfun.e99.a.1097

      10.1587/transfun.E99.A.1097

    • NAID

      130005154232

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710, KAKENHI-PROJECT-16J10532, KAKENHI-PROJECT-26540056
  • [Journal Article] An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern Analysis2016

    • Author(s)
      J. Su, K. Yoshioka, J. Shikata, T. Matsumoto
    • Journal Title

      Proc. of International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), ACM

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Public-Key Cryptography - PKC 2016, Part I

      Volume: LNCS 9614 Pages: 255-279

    • DOI

      10.1007/978-3-662-49384-7

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-26540056, KAKENHI-PROJECT-26730068, KAKENHI-PROJECT-13J03998
  • [Journal Article] An Efficient Method for Detecting Obfuscated Suspicious JavaScript Based on Text Pattern Analysis2016

    • Author(s)
      J. Su, K. Yoshioka, J. Shikata, T. Matsumoto
    • Journal Title

      Proc. of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016)

      Volume: - Pages: 3-11

    • DOI

      10.1145/2903185.2903189

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Trans., Special Section on Discrete Mathematics and Its Applications

      Volume: 未定

    • NAID

      130005154232

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法2016

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 格子問題に基づくSigncryption構成法の再考2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS 2016)論文集

      Volume: -

    • NAID

      170000173664

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 格子問題に基づくSigncryptionのスタンダードモデルでの構成2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] 情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法2016

    • Author(s)
      吉澤貴博,渡邉洋平,四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 暗号文の耐改変性と復号権限の変更機能をもつ情報理論的に安全な放送型暗号2015

    • Author(s)
      渡邉洋平, 花岡悟一郎, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法2015

    • Author(s)
      渡邉洋平,四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 395-402

    • NAID

      170000151356

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Timed-Release Secret Sharing Schemes with Information-Theoretic Security2015

    • Author(s)
      Yohei Watanabe, Junji Shikata
    • Journal Title

      Springer LNCS

      Volume: 未定

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys2015

    • Author(s)
      Noriyasu Takei, Yohei Watanabe, Junji Shikata
    • Journal Title

      Josai Mathematical Monograph

      Volume: 8 Pages: 115-133

    • NAID

      120005575969

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] CCA安全かつ暗号文長が短い鍵失効機能付きIDベース暗号の構成法2015

    • Author(s)
      石田優, 渡邉洋平, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 推測成功確率に基づいた安全性基準をみたす秘密分散法2015

    • Author(s)
      岩本貢, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions2015

    • Author(s)
      Y. Ishida, Y. Watanabe, J. Shikata
    • Journal Title

      Information Security and Privacy (ACISP 2015), Springer

      Volume: LNCS 9144 Pages: 174-191

    • DOI

      10.1007/978-3-319-19962-7_5

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056, KAKENHI-PROJECT-15H02710
  • [Journal Article] 情報理論的に安全な順序検証型多重認証方式2015

    • Author(s)
      富田信一朗, 渡邉洋平, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 情報理論的に安全な検索可能暗号2015

    • Author(s)
      吉澤貴博,渡邉洋平,四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 1321-1326

    • NAID

      170000151476

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 情報理論的に安全な検索可能暗号2015

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 1321-1326

    • NAID

      170000151476

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage2015

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Provable Security (ProvSec 2015), Springer

      Volume: LNCS 9451 Pages: 489-502

    • DOI

      10.1007/978-3-319-26059-4

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-26540056, KAKENHI-PROJECT-15H02710
  • [Journal Article] A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer2015

    • Author(s)
      S. Goto, J. Shikata
    • Journal Title

      Cryptography and Coding (IMACC 2015), Springer

      Volume: LNCS 9496 Pages: 133-151

    • DOI

      10.1007/978-3-319-27239-9

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      M. Iwamoto, J. Shikata
    • Journal Title

      Proc. of 2015 IEEE International Symposium on Information Theory (ISIT2015)

      Volume: - Pages: 725-729

    • DOI

      10.1109/isit.2015.7282550

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056, KAKENHI-PROJECT-15H02710
  • [Journal Article] 暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法2015

    • Author(s)
      渡邉洋平, 四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 395-402

    • NAID

      170000151356

    • Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Journal Article] Canetti-Halevi-Katz変換による代理人再暗号化方式の一般的構成法2015

    • Author(s)
      河西真瑠那, 清藤武暢, 渡邉洋平, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 推測確率に基づいた安全性基準をみたす暗号化方式の構成法2015

    • Author(s)
      岩本貢, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Revisiting Information Theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      J. Shikata
    • Journal Title

      Proc. of the 31th Symposium on Cryptography and Information Security (SCIS2014)

      Volume: (CDROM)

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 受信者集合を変更可能な情報理論的安全性に基づく放送型暗号2014

    • Author(s)
      渡邉洋平, 四方順司
    • Journal Title

      2014年コンピュータセキュリティシンポジウム(CSS2014)論文集

      Volume: --

    • NAID

      170000087362

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] 選択暗号文攻撃に対して安全な鍵失効機能付きIDベース暗号2014

    • Author(s)
      石田優, 渡邉洋平, 四方順司
    • Journal Title

      2014年コンピュータセキュリティシンポジウム(CSS2014)論文集

      Volume: --

    • NAID

      170000087281

    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      M. Iwamoto and J. Shikata
    • Journal Title

      Proc. of the 31th Symposium on Cryptography and Information Security (SCIS2014)

      Volume: (CDROM)

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of The 31th Symposium on Cryptography and Information Security (SCIS 2014)

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Its Applications2014

    • Author(s)
      Yohei Watanabe and Junji Shikata
    • Journal Title

      Springer

      Volume: 8782 Pages: 115-133

    • DOI

      10.1007/978-3-319-12475-9_24

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-13J03998, KAKENHI-PROJECT-26540056
  • [Journal Article] Secret Sharing Schemes Based on Min-Entropies2014

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of IEEE International Symposium on Information Theory (ISIT2014)

      Volume: -- Pages: 401-405

    • DOI

      10.1109/isit.2014.6874863

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Journal Article] Revisiting Information-theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      Junji Shikata
    • Journal Title

      Proc. of The 31th Symposium on Cryptography and Information Security (SCIS 2014)

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part I - Properties of Conditional Renyi Entropy-2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Journal Title

      Proc. of the 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: (CDROM)

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information Theoretic Security for Encryption Based on Conditional Renyi Entropies2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Journal Title

      Proc. of the 7th International Conference on Information Theoretic Security (ICITS2013)

      Volume: 8317 Pages: 103-121

    • URL

      http://eprint.iacr.org/2013/440

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II -Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      Junji Shikata, Mitsugu Iwamoto
    • Journal Title

      Proc. of The 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information Theoretically Secure Aggregate Authentication Code : Model, Bounds, and Constructions2013

    • Author(s)
      A. Kubai, J. Shikata, Y. Watanabe
    • Journal Title

      Proc. of CD-ARES 2013 Workshops

      Volume: 8128 Pages: 16-28

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part I -Properties of Conditional Renyi Entropy-2013

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of The 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part II-Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Journal Title

      Proc. of the 30th Symposium on Cryptography and Information Security (SCIS2013)

      Volume: (CDROM)

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] グループにおける情報理論的に安全な相互認証方式2013

    • Author(s)
      一将吾, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2013 (SCIS2013)論文集

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information Theoretic Security for Encryption Based on Conditional Renyi Entropies2013

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of The 7th International Conference on Information Theoretic Security (ICITS2013), Springer

      Volume: LNCS 8317 Pages: 103-121

    • DOI

      10.1007/978-3-319-04268-8_7

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Formalization of Information-Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      Junji Shikata
    • Journal Title

      Proc. of 2013 IEEE International Symposium on Information Theory (ISIT2013)

      Volume: なし Pages: 2720-2724

    • DOI

      10.1109/isit.2013.6620721

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions2013

    • Author(s)
      A. Kubai, J. Shikata, Y. Watanabe
    • Journal Title

      Proc. of CD-ARES 2013 Workshops, Springer

      Volume: LNCS 8128 Pages: 16-28

    • DOI

      10.1007/978-3-642-40588-4_2

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-13J03998, KAKENHI-PROJECT-23500012
  • [Journal Article] Formalization of Information Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      J. Shikata
    • Journal Title

      Proc. of 2013 IEEE International Symposium on Information Theory (ISIT2013)

      Pages: 2720-2724

    • URL

      http://eprint.iacr.org/2012/383

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 情報理論的に安全なタイムリリース鍵共有方式のアプリケーションについて2012

    • Author(s)
      渡邉洋平, 清藤武暢, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 情報理論的安全性の定式化の再考:暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 情報理論的に安全なアグリゲート機能を有するメッセージ認証技術2012

    • Author(s)
      玖波井麻人, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 情報理論的安全性の定式化の再考 : 暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム(SCIS2012) 論文集

      Volume: (CDROM)

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] グループにおける情報理論的に安全な相手認証方式2012

    • Author(s)
      一将吾, 渡邉洋平, 四方順司
    • Journal Title

      コンピューターセキュリティシンポジウム 2012 (CSS2012) 論文集

      Volume: なし Pages: 595-600

    • NAID

      170000072739

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Yohei Watanabe, Takenobu Seito, Junji Shikata
    • Journal Title

      Proc. of The 6th International Conference on Information Theoretic Security (ICITS), Springer

      Volume: LNCS 7412 Pages: 167-186

    • DOI

      10.1007/978-3-642-32284-6

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information Theoretic Timed-Release Security : Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Y. Watanabe, T. Seito and J. Shikata
    • Journal Title

      Proc. of the 6th International Conference on Information Theoretic Security (ICITS2012)

      Volume: 7412 Pages: 167-186

    • URL

      http://eprint.iacr.org/2012/460

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 情報理論的に安全なKey-Insulated Key-AgreementとTimed-Release Key-Agreementの関係性について2012

    • Author(s)
      清藤武暢, 渡邊洋平, 四方順司
    • Journal Title

      暗号と情報セキュリティシンポジウム2012 (SCIS2012)論文集

      Volume: なし

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 情報理論的に安全なタイムリリース暗号化方式及びメッセージ認証方式の下界について2012

    • Author(s)
      渡邉洋平, 清藤武暢, 四方順司
    • Journal Title

      コンピューターセキュリティシンポジウム 2012 (CSS2012) 論文集

      Volume: なし Pages: 601-608

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information Theoretically Secure Key-Insulated Key Agreement2011

    • Author(s)
      T. Seito and J. Shikata
    • Journal Title

      Proc. of 2011 IEEE Information Theory Workshop (ITW2011)

      Pages: 287-291

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information-theoretically Secure Key-Insulated Key Agreement2011

    • Author(s)
      T. Seito, J. Shikata
    • Journal Title

      Proc. of 2011 IEEE Information Theory Workshop (ITW2011)

      Volume: なし Pages: 287-291

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata, D. Yamanaka
    • Journal Title

      Proc. of 13th IMA International Conference, Cryptography and Coding (IMACC2011), Springer

      Volume: LNCS 7089 Pages: 112-131

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] 時刻情報で制御する情報理論的に安全な鍵共有方式2011

    • Author(s)
      渡邉洋平, 清藤武暢, 四方順司
    • Journal Title

      コンピュータセキュリティシンポジウム2011 (CSS2011) 論文集

      Volume: なし Pages: 738-743

    • NAID

      170000067565

    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Bit Commitment in the Bounded Storage Model : Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata and D. Yamanaka
    • Journal Title

      Proc. of the 13th IMA International Conference, Cryptography and Coding (IMACC2011)

      Volume: 7089 Pages: 112-131

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Journal Article] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      T. Seito, T. Aikawa, J. Shikata, T. Matsumoto
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 2B2-4

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 3A1-4

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Journal Title

      2010年暗号と情報セキュリティシンポジウム論文集(CDROM) 2B4-3

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Unconditionally Secure Blind Signatures2009

    • Author(s)
      Y. Hara, T. Seito, J. Shikata, T. Matsumoto
    • Journal Title

      Information Theoretic Security, ICITS 2007 - Selected Papers 4883

      Pages: 23-43

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment2009

    • Author(s)
      Y. Hara, T. Ishiwata, J. Shikata, T. Matsumoto
    • Journal Title

      Formal to Practical Security 5458

      Pages: 116-137

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Unconditionally Secure Blind Authentication Codes : The Model, Constructions, and Links to Commitment2009

    • Author(s)
      Yuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      Formal to Practical Security, Springer-Verlag LNCS 5458

      Pages: 116-137

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Bounded Storage Modelにおける効率的なビットコミットメントの構成法2009

    • Author(s)
      山中大輔, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] 情報理論的安全性に基づく相手認証方式2009

    • Author(s)
      二井将太, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Unconditionally Secure Blind Signatures2009

    • Author(s)
      Yuki Hara, Takenobu Seito, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      Information Theoretic Security, ICITS 2007-Selected Papers, Springer LNCS 4883

      Pages: 24-43

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Bounded Storage Modelにおいて安全な非対称鍵配送方式2009

    • Author(s)
      重田真義, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集 (CDROM)

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム論文集(CDROM) 3B3-3

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems2008

    • Author(s)
      Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling
    • Journal Title

      T. Data Hiding and Multimedia Security 3

      Pages: 23-32

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems2008

    • Author(s)
      Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling
    • Journal Title

      T. Data Hiding and Multimedia Security 3, Springer

      Pages: 23-32

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢, 二井将太, 四方順司, 松本勉
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム論文集(CDROM) 1E1-5

    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] Unconditionally Secure Steganography Against Active Attacks2008

    • Author(s)
      Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      IEEE Transactions on Information Theory 54(6)

      Pages: 2690-2705

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Journal Article] 情報理論的安全性をもつステガノグラフィについて2006

    • Author(s)
      四方順司
    • Journal Title

      電子情報通信学会 2006年総合大会講演論文集

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] 情報理論的に安全なブラインド署名方式2006

    • Author(s)
      原裕樹, 清藤武暢, 四方順司, 松本勉
    • Journal Title

      Proceedings of the 2006 Symposium on Cryptography and Information Security (SCIS 2006)

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] On collusion security of random codes2005

    • Author(s)
      K.Yoshioka, J.Shikata, T.Matsumoto
    • Journal Title

      IEICE Transactions E88-A・5

    • NAID

      110003213238

    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] 情報理論的に安全なブラインド認証方式2005

    • Author(s)
      原裕樹, 清藤武暢, 四方順司, 松本勉
    • Journal Title

      Proceedings of Computer Security Symposium 2005 (CSS2005)

      Pages: 241-246

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] Authenticated Encryption and Steganography in Unconditional Security Setting2005

    • Author(s)
      Tsutomu Matsumoto, Junji Shikata
    • Journal Title

      Proceedings of The 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security

      Pages: 1-6

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] On collusion security of random codes2005

    • Author(s)
      K.Yoshioka, J.Shikata, T.Matsumoto
    • Journal Title

      IEICE Trans. Jan

    • NAID

      110003213238

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] 仲裁者を伴うモデルにおける情報理論的に安全な匿名認証2005

    • Author(s)
      黄瀬和之, 清藤武暢, 四方順司, 松本勉
    • Journal Title

      Proceedings of the 2005 Symposium on Cryptography and Information Security (SCIS 2005)

      Pages: 1327-1332

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] Information-Theoretically Secure Steganography, Revisited2005

    • Author(s)
      J.Shikata, N.Takanohashi, T.Matsumoto
    • Journal Title

      Proceedings of the 2005 Symposium on Cryptography and Information Security (SCIS 2005)

      Pages: 169-174

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] 情報理論的に安全なグループ署名方式について2005

    • Author(s)
      清藤武暢, 黄瀬和之, 四方順司, 松本勉
    • Journal Title

      Technical Report of MICE, ISEC Vol.104,No.730

      Pages: 13-18

    • NAID

      10015553201

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] On collusion security of random codes,2005

    • Author(s)
      K.Yoshioka, J.Shikata, T.Matsumoto
    • Journal Title

      IEICE Trans.

    • NAID

      110003213238

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] Collusion secure codes : systematic security definitions and their relations,2004

    • Author(s)
      K.Yoshioka, J.Shikata, T.Matsumoto
    • Journal Title

      IEICE Transactions Vol. E87-A, No.5

      Pages: 1162-1171

    • NAID

      110003213013

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] Collusion secure codes : systematic security definitions and their relations2004

    • Author(s)
      K.Yoshioka, J.Shikata, T.Matsumoto
    • Journal Title

      IEICE transactions Vol. E87-A, No. 5

      Pages: 1162-117

    • NAID

      110003213013

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] Collusion secure codes : systematic security definitions and their relations2004

    • Author(s)
      K.Yoshioka, J.Shikata, T.Matsumoto
    • Journal Title

      IEICE Transactions E87-A・5

      Pages: 1162-1171

    • NAID

      110003213013

    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] Unconditionally Secure Authenticated Encryption2004

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, T.Matsumoto, H.Imai
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E87-A, No.5

      Pages: 1119-1131

    • NAID

      110003213009

    • Data Source
      KAKENHI-PROJECT-16700009
  • [Journal Article] Systematic treatment of collusion secure codes : the definitions and their relationships.2003

    • Author(s)
      Yoshioka Katsunari, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      Information Security(Springer-Verlag)

    • Description
      「研究成果報告書概要(和文)」より
    • Data Source
      KAKENHI-PROJECT-13224040
  • [Journal Article] Systematic treatment of collusion secure codes : the definitions and their relationships2003

    • Author(s)
      Yoshioka Katsunari, Junji Shikata, Tsutomu Matsumoto
    • Journal Title

      Information Security, Springer-Verlag

    • Description
      「研究成果報告書概要(欧文)」より
    • Data Source
      KAKENHI-PROJECT-13224040
  • [Presentation] Efficient Threshold Public-Key Encryption from CBDH2019

    • Author(s)
      Masahiro Ebina, Yohei Watanabe, Junji Shikata
    • Organizer
      International Workshop on Information Security (IWSEC 2019)
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] 非一様ランダム鍵を用いた情報理論的に安全な信頼性の低い調停者付き認証符号について2019

    • Author(s)
      小林大輝, 四方順司
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] Efficient Threshold Public-Key Encryption from CBDH2019

    • Author(s)
      M. Ebina, Y. Watanabe, J. Shikata
    • Organizer
      14th International Workshop on Security (IWSEC2019)
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Presentation] 格子問題に基づくSemi-Adaptive安全な内積暗号2019

    • Author(s)
      宮澤智輝, 佐藤慎悟, 四方順司
    • Organizer
      情報処理学会, 研究報告コンピュータセキュリティ(CSEC)
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] エントロピーロスの小さいロバストファジー抽出器の構成に関する一考察2019

    • Author(s)
      山田憲一, 四方順司
    • Organizer
      2019年暗号と情報セキュリティシンポジウム (SCIS 2019)
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] SO-CCA secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model2019

    • Author(s)
      S. Sato, J. Shikata
    • Organizer
      17th IMA International Conference on Cryptography and Coding
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Presentation] Toward Lightweight Authentication: Application of Aggregate MACs for IoT2018

    • Author(s)
      Shikata Junji
    • Organizer
      The 4th French-Japanese Cybersecurity Workshop
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-18H03238
  • [Presentation] Toward Lightweight Authentication: Application of Aggregate MACs for IoT2018

    • Author(s)
      Junji Shikata
    • Organizer
      The 4th French-Japanese Cybersecurity Workshop
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] 相関のある情報を用いたMultiple Access Wiretap Channelにおける秘匿通信について2018

    • Author(s)
      小川善功, 田中亮大, 四方順司
    • Organizer
      第21回コンピュータセキュリティシンポジウム(CSS 2018)
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] Cooperative Jammingを用いた主通信路に雑音のあるWiretap Channel IIにおける暗号通信について2018

    • Author(s)
      飯塚寛貴, 田中亮大, 四方順司
    • Organizer
      電子情報通信学会, ISEC
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] Implementation and Analysis of Fully Homomorphic Encryption in Wearable Devices2018

    • Author(s)
      Amonrat Prasitsupparote, Yohei Watanabe, and Junji Shikata
    • Organizer
      The Fourth International Conference on Information Security and Digital Forensics (ISDF 2018), The Society of Digital Information and Wireless Communications
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] 非一様ランダム鍵を用いた情報理論的に安全な調停者付き認証符号について2017

    • Author(s)
      石川美穂, 四方順司
    • Organizer
      電子情報通信学会, ISEC
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] Tighter Bounds on Entropy of Secret Keys in Authentication Codes2017

    • Author(s)
      J. Shikata
    • Organizer
      2017 IEEE Information Theory Workshop (ITW2017)
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Presentation] Wiretap Channel IIにおける能動的攻撃を考慮した暗号通信について2017

    • Author(s)
      田中亮大,四方順司
    • Organizer
      コンピュータセキュリティシンポジウム2017 (CSS2017)
    • Data Source
      KAKENHI-PROJECT-17H01752
  • [Presentation] 横浜国立大学先端科学高等研究院「情報・物理セキュリティ研究ユニット」の活動紹介2016

    • Author(s)
      四方順司
    • Organizer
      IoT Security Forum 2016
    • Place of Presentation
      東京, 日本
    • Year and Date
      2016-09-15
    • Invited
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Presentation] 横浜国立大学先端科学高等研究院「情報・物理セキュリティ研究ユニット」の活動紹介2016

    • Author(s)
      四方順司
    • Organizer
      IoT Security Forum 2016
    • Place of Presentation
      東京, 日本
    • Year and Date
      2016-09-15
    • Invited
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Presentation] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      J. Shikata
    • Organizer
      2015 IEEE International Symposium on Information Theory (ISIT2015)
    • Place of Presentation
      Hong Kong, China
    • Year and Date
      2015-06-14
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Presentation] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      J. Shikata
    • Organizer
      2015 IEEE International Symposium on Information Theory (ISIT2015)
    • Place of Presentation
      Hong Kong, China
    • Year and Date
      2015-06-14
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15H02710
  • [Presentation] 情報理論的暗号理論について~サーベイとチャレンジ~2014

    • Author(s)
      四方順司
    • Organizer
      電子情報通信学会ISEC-IT-WBS 合同研究会
    • Place of Presentation
      名古屋
    • Invited
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Revisiting Information Theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      J. Shikata
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      Kagoshima, Japan
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] 情報理論的暗号理論について~サーベイとチャレンジ~2014

    • Author(s)
      四方順司
    • Organizer
      電子情報通信学会ISEC-IT-WBS合同研究会
    • Place of Presentation
      名古屋, 日本
    • Invited
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys2014

    • Author(s)
      Junji Shikata
    • Organizer
      Josai University, Annual Workshop on Statistical Science and Related Topics
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2014-12-07
    • Invited
    • Data Source
      KAKENHI-PROJECT-26540056
  • [Presentation] Revisiting Information-theoretically Secure Authentication Codes by Conditional Renyi Entropies2014

    • Author(s)
      Junji Shikata
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS 2014)
    • Place of Presentation
      鹿児島, 日本
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Optimal Constructions for Information Theoretically Secure Encryptions Based on Renyi Entropies2014

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      The 31th Symposium on Cryptography and Information Security (SCIS2014)
    • Place of Presentation
      Kagoshima, Japan
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Information-Theoretically Secure Aggregate Authentication Code : Model, Bounds, and Constructions2013

    • Author(s)
      A. Kubai, J. Shikata, Y. Watanabe
    • Organizer
      CD-ARES 2013 Workshops
    • Place of Presentation
      Regensburg, Germany
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] 情報理論的暗号理論について2013

    • Author(s)
      四方順司
    • Organizer
      日本応用数理学会
    • Place of Presentation
      東京
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part II-Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      J. Shikata and M. Iwamoto
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      Kyoto, Japan
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption: Part II -Fano's Inequality and Shannon's Bound-2013

    • Author(s)
      Junji Shikata
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      京都府京都市
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Information Theoretic Security for Encryption Based on Conditional Renyi Entropies2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      The 7th International Conference on Information Theoretic Security (ICITS2013)
    • Place of Presentation
      Singapore
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Formalization of Information Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      J. Shikata
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul, Turkey
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Revisiting Conditional Renyi Entropy and its Application to Encryption : Part I -Properties of Conditional Renyi Entropy-2013

    • Author(s)
      M. Iwamoto and J. Shikata
    • Organizer
      The 30th Symposium on Cryptography and Information Security (SCIS2013)
    • Place of Presentation
      Kyoto, Japan
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Formalization of Information-Theoretic Security for Key-Agreement, Revisited2013

    • Author(s)
      Junji Shikata
    • Organizer
      2013 IEEE International Symposium on Information Theory (ISIT2013)
    • Place of Presentation
      Istanbul, Turkey
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] 情報理論的安全性の定式化の再考:暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Organizer
      暗号と情報セキュリティシンポジウム 2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] 情報理論的安全性の定式化の再考:暗号化と鍵共有方式2012

    • Author(s)
      四方順司
    • Organizer
      暗号と情報セキュリティシンポジウム2012 (SCIS2012)
    • Place of Presentation
      金沢
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Information-Theoretic Timed-Release Security : Key-Agreement, Encryption and Authentication Codes2012

    • Author(s)
      Y. Watanabe, T. Seito and J. Shikata
    • Organizer
      The 6th International Conference on Information Theoretic Security (ICITS2012)
    • Place of Presentation
      Montreal, Canada
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata
    • Organizer
      13th IMA International Conference, Cryptography and Coding (IMACC2011)
    • Place of Presentation
      UK
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Information-theoretically Secure Key-Insulated Key Agreement2011

    • Author(s)
      T. Seito and J. Shikata
    • Organizer
      2011 IEEE Information Theory Workshop (ITW2011)
    • Place of Presentation
      Brazil
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] Bit Commitment in the Bounded Storage Model : Tight Bound and Simple Optimal Construction2011

    • Author(s)
      J. Shikata and D. Yamanaka
    • Organizer
      The 13th IMA International Conference, Cryptography and Coding (IMACC2011)
    • Place of Presentation
      Oxford, UK
    • Data Source
      KAKENHI-PROJECT-23500012
  • [Presentation] 情報理論的安全性に基づいて匿名性・追跡性を付与するプリミティブの提案2010

    • Author(s)
      小林大樹, 四方順司
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] Information-theoretically Secure Key-Insulated Multireceiver Authentication Codes2010

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-20
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] 情報理論的に安全なKey-Insulated署名方式2010

    • Author(s)
      相河正, 清藤武暢, 四方順司
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      サンポートホール高松(香川県)
    • Year and Date
      2010-01-21
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な署名方式について2009

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2009年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      滋賀県大津
    • Year and Date
      2009-01-22
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] メンバーの秘密鍵を無効化できる情報理論的に安全な認証方式について2008

    • Author(s)
      清藤武暢, 四方順司, 松本勉
    • Organizer
      2008年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-22
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] Unconditionally Secure Blind Signatures2007

    • Author(s)
      Y. Hara, T. Seito, J. Shikata, T. Matsumoto
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-03-25
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] Construction Methodology of Unconditionally Secure Signature Schemes2007

    • Author(s)
      Junji Shikata
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-03-26
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] Construction Methodology of Unconditionally Secure Signature Schemes (Invited Talk)2007

    • Author(s)
      Junji Shikata
    • Organizer
      International Conference on Information Theoretic Security (ICITS 2007)
    • Place of Presentation
      Madrid, Spain
    • Year and Date
      2007-05-26
    • Data Source
      KAKENHI-PROJECT-19700008
  • [Presentation] 推測確率に基づいた安全性基準をみたす暗号化方式の構成法

    • Author(s)
      四方順司
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Data Source
      KAKENHI-PROJECT-26540056
  • 1.  MATSUMOTO Tsutomu (40183107)
    # of Collaborated Projects: 5 results
    # of Collaborated Products: 12 results
  • 2.  岩本 貢 (50377016)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 3 results
  • 3.  太田 和夫 (80333491)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 2 results
  • 4.  渡邉 洋平 (40792263)
    # of Collaborated Projects: 2 results
    # of Collaborated Products: 5 results
  • 5.  AONO Yoshinori
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 6.  Schuldt Jacob
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 7.  MATSUDA Takahiro
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 8.  HANAOKA Goichiro
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 9.  MORITA Hiraku
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 10.  IWATA Tetsu
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results
  • 11.  松田 隆宏
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results

URL: 

Are you sure that you want to connect your ORCID iD to this researcher?
* This action can be performed only by the researcher themselves.

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi