• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Yoshida Maki  吉田 真紀

ORCIDConnect your ORCID iD *help
… Alternative Names

YOSHIDA Maki  吉田 真紀

Less
Researcher Number 50335387
External Links
Affiliation (Current) 2022: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所, 主任研究員
Affiliation (based on the past Project Information) *help 2016 – 2020: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所セキュリティ基盤研究室, 主任研究員
2016: 国立研究開発法人情報通信研究機構, サイバーセキュリティ研究所, 主任研究員
2015: 国立研究開発法人情報通信研究機構, ネットワークセキュリティ研究所, 主任研究員
2015: 国立研究開発法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティアーキテクチャ研究室, 主任研究員
2014: 独立行政法人情報通信研究機構, ネットワークセキュリティ研究所, 研究員 … More
2013 – 2014: 独立行政法人情報通信研究機構, ネットワークセキュリティ研究所セキュリティアーキテクチャ研究室, 主任研究員
2012: 大阪大学, 情報科学研究科, 助教
2007 – 2011: Osaka University, 大学院・情報科学研究科, 助教
2006: 大阪大学, 大学院情報科学研究科, 助手
2002 – 2005: 大阪大学, 大学院・情報科学研究科, 助手
2001: 大阪大学, 基礎工学研究科, 助手 Less
Review Section/Research Field
Principal Investigator
Fundamental theory of informatics / 情報通信工学 / Information security / Basic Section 60010:Theory of informatics-related
Except Principal Investigator
Science and Engineering / Information security
Keywords
Principal Investigator
安全性 / 暗号プロトコル / 汎用的結合可能性 / 著作権保護 / 電子透かし / 検出誤り率 / 検出結果の信頼性保証 / False positive error / 推定 / False negative error … More / 情報フロー解析 / 暗号技術 / 健全性 / 情報フロー / 機密度 / 情報漏洩 / 静的解析 / 電子文書 / 真正性 / 長期署名 / 汎用的結合 / セキュリティ / 汎用的結合可能 / 形式的検証 / 計算量的に健全 / 計算量的健全性 / UC安全性 / GUC安全性 / EUC安全性 / Generic model / 暗号 / 困難性仮定 / 正当性検証 / Bilinear Group / Generic Model / 安全性評価 / IoT / セキュアネットワーク / 秘密分散 / 更新 / 最適化 / 暗号資産 … More
Except Principal Investigator
XML / コンテンツ配信 / 安全性 / アクセス制御 / プロトコル / コンテンツ保護 / アクセル権モデル / 暗号プロトコル / 不正者追跡 / 配信制御 / 分離不能多重化通信 / 楕円曲線 / ペアリング / コンテンツ / コンテンツ配信管理 / 通信複雑度 / セキュリティ / 委託配信 / オフライン型配信 / P2P型ネットワーク / 暗号・認証 / 暗号・認証等 / 暗号 Less
  • Research Projects

    (12 results)
  • Research Products

    (162 results)
  • Co-Researchers

    (9 People)
  •  セキュリティレベルを更新可能とするアクセス構造を備えた最適秘密分散に関する研究Principal Investigator

    • Principal Investigator
      吉田 真紀
    • Project Period (FY)
      2019 – 2021
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Review Section
      Basic Section 60010:Theory of informatics-related
    • Research Institution
      National Institute of Information and Communications Technology
  •  Network-Dependent Security Evaluation for Cryptographic ProtocolsPrincipal Investigator

    • Principal Investigator
      Maki Yoshida
    • Project Period (FY)
      2015 – 2017
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      National Institute of Information and Communications Technology
  •  Research on Cryptographic Primitives with Easily Verifiable Security

    • Principal Investigator
      Hanaoka Goichiro
    • Project Period (FY)
      2014 – 2018
    • Research Category
      Grant-in-Aid for Scientific Research (B)
    • Research Field
      Information security
    • Research Institution
      National Institute of Advanced Industrial Science and Technology
  •  Development of automatic analysis of hardnes assumptions for cryptosystemsPrincipal Investigator

    • Principal Investigator
      Yoshida Maki
    • Project Period (FY)
      2012 – 2015
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      National Institute of Information and Communications Technology
      Osaka University
  •  Computationally sound symbolic analysis of security and assistance of redesign for cryptographic protocolsPrincipal Investigator

    • Principal Investigator
      YOSHIDA Maki
    • Project Period (FY)
      2009 – 2011
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Osaka University
  •  Development of universally composable long term signaturesPrincipal Investigator

    • Principal Investigator
      YOSHIDA Maki
    • Project Period (FY)
      2006 – 2008
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Osaka University
  •  コンテンツ配信管理システムとその安全性確認に関する研究

    • Principal Investigator
      藤原 融
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Osaka University
  •  暗号技術に基づく関数を用いたプログラムに対する情報フロー解析法の開発Principal Investigator

    • Principal Investigator
      吉田 真紀
    • Project Period (FY)
      2004 – 2005
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Osaka University
  •  コンテンツ配信管理における複雑度と安全性のトレードオフ及び安全性保証に関する研究

    • Principal Investigator
      藤原 融
    • Project Period (FY)
      2003
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Osaka University
  •  コンテンツ配信管理システムに関する統合的セキュリティ技術の研究

    • Principal Investigator
      藤原 融
    • Project Period (FY)
      2002
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas
    • Review Section
      Science and Engineering
    • Research Institution
      Osaka University
  •  電子透かしにおける検出誤り確率推定法の開発Principal Investigator

    • Principal Investigator
      吉田 真紀
    • Project Period (FY)
      2002 – 2003
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      情報通信工学
    • Research Institution
      Osaka University
  •  コンテンツ配信管理システムに関する統合的セキュリティ技術の研究

    • Principal Investigator
      藤原 融
    • Project Period (FY)
      2001
    • Research Category
      Grant-in-Aid for Scientific Research on Priority Areas (C)
    • Review Section
      Science and Engineering
    • Research Institution
      Osaka University

All 2021 2020 2019 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2004 Other

All Journal Article Presentation Book

  • [Book] 汎用的結合可能な安全性, 日本応用数理学会監修/薩摩順吉・大石進一・杉原 正顕(編) 応用数理ハンドブック2013

    • Author(s)
      鈴木斎輝, 吉田真紀
    • Total Pages
      2
    • Publisher
      朝倉書店
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] 秘密同時メッセージと条件付き秘密開示に対する乱数長下界2021

    • Author(s)
      河内 亮周, 吉田 真紀
    • Journal Title

      2021年暗号と情報セキュリティシンポジウム予稿集

      Volume: -

    • Data Source
      KAKENHI-PROJECT-19K11835
  • [Journal Article] Compact Verifiably Multiplicative Secret Sharing2020

    • Author(s)
      Maki Yoshida, Satoshi Obana
    • Journal Title

      IEICE Proceeding Series

      Volume: - Pages: 437-441

    • DOI

      10.34385/proc.65.C03-4

    • NAID

      230000012690

    • ISSN
      2188-5079
    • Language
      English
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19K11835
  • [Journal Article] Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing2020

    • Author(s)
      Satoshi Obana, Maki Yoshida
    • Journal Title

      Proceedings of the 17th International Joint Conference on e-Business and Telecommunications

      Volume: II Pages: 322-329

    • DOI

      10.5220/0009819203220329

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-19K11835
  • [Journal Article] Verifiably Multiplicative Secret Sharing2019

    • Author(s)
      Maki Yoshida, Satoshi Obana
    • Journal Title

      IEEE Transactions on Information Theory

      Volume: 65 Pages: 3233-3245

    • DOI

      10.1109/tit.2018.2886262

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-18K11304, KAKENHI-PROJECT-19K11835
  • [Journal Article] 検証可能な乗法秘密分散の効率向上2019

    • Author(s)
      吉田真紀, 尾花賢
    • Journal Title

      コンピュータセキュリティシンポジウム2019 (CSS2019)予稿集

      Volume: 2F3-2 Pages: 1-5

    • NAID

      170000181091

    • Data Source
      KAKENHI-PROJECT-19K11835
  • [Journal Article] On the (in)efficiency of non-interactive secure multiparty computation2018

    • Author(s)
      Maki Yoshida, Satoshi Obana
    • Journal Title

      Designs, Codes and Cryptography

      Volume: - Pages: 1-13

    • DOI

      10.1007/s10623-017-0424-7

    • Peer Reviewed / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00196, KAKENHI-PROJECT-18K11304
  • [Journal Article] Verifiably multiplicative secret sharing2017

    • Author(s)
      Maki Yoshida, Satoshi Obana
    • Journal Title

      Proceedings of ICITS 2017, Lecture Notes in Computer Science

      Volume: 10681 Pages: 73-82

    • DOI

      10.1007/978-3-319-72089-0_5

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] Two Approaches to Analyzing the Security of Cryptographic Protocols2016

    • Author(s)
      Maki Yoshida
    • Journal Title

      Journal of the National Institute of Information and Communications Technology

      Volume: vol.63, no.2 Pages: 179-184

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] Efficient Usage of Cover Free Families in Broadcast Encryption2016

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99-A, 6 Pages: 1216-1221

    • NAID

      130005154246

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] On the (In)Efficiency of Non-Interactive Secure Multiparty Computation2016

    • Author(s)
      Maki Yoshida and Satoshi Obana
    • Journal Title

      Lecture Notes in Computer Science

      Volume: 9558 Pages: 185-193

    • DOI

      10.1007/978-3-319-30840-1_12

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] Analyzing and Fixing the QACCE Security of QUIC2016

    • Author(s)
      Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida
    • Journal Title

      Proceedings of SSR 2016, Lecture Notes in Computer Science

      Volume: 10074 Pages: 1-31

    • DOI

      10.1007/978-3-319-49100-4_1

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] An Efficient Construction of Non-Interactive Secure Multiparty Computation2016

    • Author(s)
      Satoshi Obana, Maki Yoshida
    • Journal Title

      Proceedings of CANS 2016, Lecture Notes in Computer Science

      Volume: 10052 Pages: 604-614

    • DOI

      10.1007/978-3-319-48965-0_39

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] Efficient Usage of Cover Free Families in Broadcast Encryption2016

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: vol.E99-A,no.6 Pages: 1-8

    • NAID

      130005154246

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] IHC 評価基準における圧縮率と加法電子透かし法の最適なパラメータとの関係2015

    • Author(s)
      戸塚拓伸, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vo.114, no. 511 Pages: 85-90

    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] On the Impossibility of <i>d</i>-Multiplicative Non-perfect Secret Sharing2015

    • Author(s)
      Maki Yoshida, Kazuya Ohkita, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: vol.E98-D, no.1 Issue: 2 Pages: 58-64

    • DOI

      10.1587/transfun.e98.a.767

      10.1587/transfun.E98.A.767

    • NAID

      130004770935

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking2015

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Information and Systems

      Volume: vol.E98-A, no.2 Issue: 1 Pages: 58-64

    • DOI

      10.1587/transinf.2014mup0006

      10.1587/transinf.2014MUP0006

    • NAID

      130004721761

    • ISSN
      0916-8532, 1745-1361
    • Language
      English
    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Trade-off between resiliency and efficiency of cryptographic protocols -- The case of information theoretical security --2015

    • Author(s)
      Maki Yoshida
    • Journal Title

      IEICE Technical Report

      Volume: vol.115, no.38 Pages: 69-74

    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Journal Article] IHC 電子透かしコンテストの高画質カテゴリにおける加法 電子透かし法の性能評価2014

    • Author(s)
      戸塚拓伸, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: vol.114, no.222 Pages: 53-58

    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria2014

    • Author(s)
      Hironobu Tozuka, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the 1st International Workshop on Information Hiding and Its Criteria for Evaluation

      Volume: vol.1 Pages: 31-36

    • DOI

      10.1145/2598908.2598917

    • Peer Reviewed / Open Access
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria2014

    • Author(s)
      Hironobu Tozuka, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the First International Workshop on Information Hiding and its Criteria for evaluation

      Volume: -

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] 加法電子透かし法のIHC 評価基準による性能評価2014

    • Author(s)
      戸塚拓伸, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会 技術研究報告

      Volume: Vol.113, No.480 Pages: 81-86

    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Theoretical Performance Analysis of Hybrid Additive-Multiplicative Watermarking2013

    • Author(s)
      Seigo Ikeda, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Technical Report

      Volume: VOL.112, NO.420 Pages: 77-82

    • NAID

      110009727934

    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Generic Construction of GUC Secure Commitment in the KRK Model2012

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Lecture Notes in Computer Science

      Volume: VOL.7631 Pages: 244-260

    • DOI

      10.1007/978-3-642-34117-5_16

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Hybrid Additive-Multiplicative Watermarking for General Embedding Domains2012

    • Author(s)
      Seigo Ikeda, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Technical Report

      Volume: VOL.112, NO.129 Pages: 9-16

    • NAID

      110009625788

    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Optimum General Threshold Secret Sharing2012

    • Author(s)
      Maki Yoshida, Toru Fujiwara, Marc P.C. Fossorier
    • Journal Title

      Lecture Notes in Computer Science

      Volume: VOL.7412 Pages: 187-204

    • DOI

      10.1007/978-3-642-32284-6_11

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] New Hybrid Additive-Multiplicative Watermarking with Better Tradeoff between Image Quality and Detection Accuracy2012

    • Author(s)
      Seigo Ikeda, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of 2012 International Symposium on Information Theory and its Applications

      Volume: - Pages: 797-801

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Journal Article] Bilinear Groupに関する困難性仮定への攻撃導出-Cryptology ePrint Archive上の仮定に攻撃は存在するか?-2011

    • Author(s)
      岡前直由, 吉田真紀, 雲嶋健太, 阿部正幸, 大久保美也子, 藤原融
    • Journal Title

      2011年暗号と情報セキュリティシンポジウム予稿集

      Volume: (CD-ROM)

    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Toward Digital Watermarking for Cryptographic Data2011

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E94-A, No.1 Pages: 270-272

    • NAID

      10027986929

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] 公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      日本応用数理学会論文誌

      Volume: 第20巻,第1号 Pages: 11-32

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] The Vector Decomposition Problem2010

    • Author(s)
      Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E93-A, No.1

      Pages: 188-193

    • NAID

      10026862600

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Computationally Sound Symbolic Analysis for EUC Security of Key Exchange2010

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Journal Title

      日本応用数理学会2010年度年会

      Pages: 63-64

    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Generic Modelにおける困難性仮定への攻撃の数式処理を用いた導出2010

    • Author(s)
      雲嶋健太, 吉田真紀, 阿部正幸, 大久保美也子, 藤原融
    • Journal Title

      電子情報通信学会技術研究報告

      Volume: Vol.110, No.281 Pages: 57-64

    • NAID

      110008153932

    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] 公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      日本応用数理学会論文誌 第20巻,第1号(To appear)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] The Vector Decomposition Problem2010

    • Author(s)
      Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E93-A, No.1 Pages: 188-193

    • NAID

      10026862600

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] All-or-nothing Property for Efficient Symbolic Analysis2010

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Computational and Symbolic Proofs of Security

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Expiration Dated Fingerprinting2010

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IJICIC

      Volume: Vol.6, No.3 Pages: 1271-1278

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Expiration Dated Fingerprinting2010

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      International Journal of Innovative Computing, Information and Control (IJICIC) Vo1.6, No.3

      Pages: 1271-1278

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] 評価者間類似度計算の改善による汚染コンテンツダウンロード抑制効果向上2010

    • Author(s)
      山中広明, 岡村真吾, 藤原融, 吉田真紀, 石原靖哲, 秋山豊和, 加藤精一, 下條真司
    • Journal Title

      情報処理学会論文誌

      Volume: Vol.51 No.8 Pages: 1428-1442

    • NAID

      110007970746

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Development of a Verification Tool for Composable Security2009

    • Author(s)
      Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Computational and Symbolic Proofs of Security

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida, Torn Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E92-A, No.1

      Pages: 222-225

    • NAID

      10026855139

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking2009

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, and Toru Fujiwara
    • Journal Title

      the8th International Workshop on Digital Watermarking(IWDW2009)

      Volume: LNCS5703 Pages: 279-293

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Watermarking Cryptographic Data2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing(IIH-MSP2009)

      Volume: A02-02(CD-ROM)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals

      Volume: Vol.E92-A, No.1 Pages: 222-225

    • NAID

      10026855139

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Journal Article] Flexible Timed-release Encryption2009

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E92-A, No.1

      Pages: 222-225

    • NAID

      10026855139

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 画素空間へのパッチワーク法と相関型電子透かし法の検出誤り確率の比較2008

    • Author(s)
      北村至, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会論文誌(D) Vol.J91-D, No.11

      Pages: 2605-2615

    • NAID

      110007380937

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval2008

    • Author(s)
      Mohamed Layouni, Maki Yoshida, and Shingo Okamura
    • Journal Title

      Proceedings of the 10th International Conference on Information and Communications Security (ICICS2008) LNCS 5308

      Pages: 387-402

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] DWT係数に対する加法電子透かし法とパッチワーク法の性能比較2008

    • Author(s)
      北村至, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 1D1-5(CD-ROM)

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 画素空間への加法電子透かしに対する最適な抽出法の再設計とパッチワーク法との性能比較2008

    • Author(s)
      北村至, 大北和也, 吉田真紀, 藤原融
    • Journal Title

      電子情報通信学会マルチメディア情報ハイディング研究会第5回研究会資料

      Pages: 59-64

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 利便性の高いコンテンツ事前配信のための匿名フィンガープリンティング2008

    • Author(s)
      原村 和裕, 吉田 真紀, 藤原 融
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム予稿集 1D1-4

      Pages: 18-18

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Expiration-dated Fingerprinting2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing

      Pages: 147-150

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Anonymous Fingerprinting for Predelivery of Contents2008

    • Author(s)
      Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 11th International Conference on Information Security and Cryptography (LNCS) (To appear)

    • NAID

      110006534097

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 相互認証の汎用的結合可能な安全性の解析のための形式的手法2008

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 4C2-4(CD-ROM)

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] コンテンツ事前配信における不正配布抑止力の強い匿名フィンガープリンティング2008

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 1D2-3(CD-ROM)

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Efficient Multi-Authorizer Accredited Symmetrically Private In formation Retrieval2008

    • Author(s)
      Mohamed Layouni, Maki Yoshida, Shingo Okamura
    • Journal Title

      Proceedings of the 10th International Conference on Information and Communications Security (LNCS) 5308

      Pages: 387-402

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 画素空間への加法電子透かしに対する最適検出の再考2008

    • Author(s)
      木村 至, 吉田 真紀, 藤原 融
    • Journal Title

      2008年暗号と情報セキュリティシンポジウム予稿集 2F3-4

      Pages: 149-149

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Optimum General Threshold Secret Sharing2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara, Marc Fossorier
    • Journal Title

      Proceedings of the the 31th Symposium on In formation Theory and Its Applications (CD-ROM)

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Expiration-dated Fingerprinting2008

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP 2008

      Pages: 147-150

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 統計的フラジャイル電子透かし法に関する改ざん位置特定性能の改善2008

    • Author(s)
      大北和也, 北村至, 吉田真紀, 藤原融
    • Journal Title

      2009年暗号と情報セキュリティシンポジウム予稿集 1D1-4(CD-ROM)

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Anonymous Fingerprinting for Predelivery of Contents2008

    • Author(s)
      Kazuhiro Haramura, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the 11th International Conference on Information Security and Cryptography (ICISC2008) LNCS 5461

      Pages: 134-151

    • NAID

      110006534097

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Global Timed-release Encryption2008

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      to appear in Proceedings of the 26th International Conference on Consumer Electronics 2008 ICCE2008

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing2007

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2007 IEEE International Symposium on Information Theory

      Pages: 78-78

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] コンテンツ事前配信のための匿名フィンガープリンティング2007

    • Author(s)
      原村 和裕, 吉田 真紀, 藤原 融
    • Journal Title

      電子情報通信学会技術研究報告 Vol.107,No.345

      Pages: 23-30

    • NAID

      110006534097

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 画素空間への加法電子透かしにおける秘密鍵の利用法による検出誤り確率への影響2007

    • Author(s)
      北村 至, 吉田 真紀, 藤原 融
    • Journal Title

      2007年暗号と情報セキュリティシンポジウム予稿集

      Pages: 189-189

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] C2Cコンテンツ配信仲介サービスのための協調型非対称フィンガープリンティング2007

    • Author(s)
      浅野 順也, 岡村 真吾, 吉田 真紀, 藤原 融
    • Journal Title

      2007年暗号と情報セキュリティシンポジウム予稿集

      Pages: 37-37

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain2007

    • Author(s)
      Takaaki Fujita, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E90 No.1

      Pages: 216-225

    • NAID

      110007519089

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain2007

    • Author(s)
      Takaaki Fujita, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E90-A, No.1

      Pages: 216-225

    • NAID

      110007519089

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A Private and Consistent Data Retrieval Scheme with Log-Squared Communication2007

    • Author(s)
      Satoshi Nakayama, Maki Yoshida, Shingo Okamura, and Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E90-A, No.1

      Pages: 204-215

    • NAID

      110007519088

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A Secure Construction for the Nonlinear Function Threshold Ramp Secret Sharing Scheme2007

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Proceedings of the 2007 IEEE International Symposium on Information Theory ISIT2007

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A Private and Consistent Data Retrieval Scheme with Log-Squared Communication2007

    • Author(s)
      Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals Vol.E90 No.1

      Pages: 204-215

    • NAID

      110007519088

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A New Scheme for Optimum Decoding of Additive Watermarks in Spatial Domain2007

    • Author(s)
      Maki Yoshida, Itaru Kitamura, and Toru Fujiwara
    • Journal Title

      to appear in Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing IIH-MSP2007

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Effciency Analysis of the Nonlinear Function Ramp Secret Sharing Schemes2007

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2007 Hawaii and SITA Joint Conference on Information Theory

      Pages: 119-124

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A New Scheme for Optimum Decoding of additive Watermarks Embedded in Spatial Domain2007

    • Author(s)
      Maki Yoshida, Itaru Kitamura, Toru Fujiwara
    • Journal Title

      Proceedings of the Third International Conference on Interlligent Information Hiding and Multimedia Signal Processing Vol.II

      Pages: 16-19

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Towards Secure C2C Contents Distribution Services2006

    • Author(s)
      Junya Asano, Shingo Okamura, Maki Yoshida, and Toru Fujiwara
    • Journal Title

      Proceedings of the 1st Joint Workshop on Information Security JWIS2006

      Pages: 347-360

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Towards Secure C2C Contents Distribution Services2006

    • Author(s)
      Junya Asano, Shingo Okamura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      The 1st Joint Workshop on Information Security

      Pages: 347-360

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A Timed-Release Key Management Scheme for Backward Recovery2006

    • Author(s)
      Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara
    • Journal Title

      Proceedings of the 8th Annual International Conference on Information Security and Cryptology To appear

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] An Unlinkable Interactive Drama Delivery System Allowing Rechoice of a Scene2006

    • Author(s)
      Shingo Okamura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2006 Symposium on Cryptography and Information Security

      Pages: 127-127

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain2006

    • Author(s)
      Maki Yoshida, Takaaki Fujita, Toru Fujiwara
    • Journal Title

      IEEE 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing

      Pages: 101-104

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] パッチワーク法に対する最適な透かし検出2006

    • Author(s)
      藤田 高彬, 吉田 真紀, 藤原 融
    • Journal Title

      2006年暗号と情報セキュリティシンポジウム予稿集

      Pages: 242-242

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] On the Security of Tag-KEM for Signcryption2006

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Journal Title

      Proceedings of the 2nd Workshop on Cryptography for Ad hoc Networks (WCAN'06), Electronic Notes in Theoretical Computer Science 171 No.1

      Pages: 83-91

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] 検索語の秘匿と検索結果の一貫性検証を可能とする通信効率の良いデータ検索プロトコル2006

    • Author(s)
      中山 敏, 吉田 真紀, 岡村 真吾, 藤原 融
    • Journal Title

      2006年暗号と情報セキュリティシンポジウム予稿集

      Pages: 182-182

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] プライバシを保護したC2Cディジタルコンテンツ売買方式2006

    • Author(s)
      浅野 順也, 岡村 真吾, 吉田 真紀, 藤原 融
    • Journal Title

      2006年暗号と情報セキュリティシンポジウム予稿集

      Pages: 214-214

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] On the Security of Tag-KEM for Signcryption2006

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      2nd Workshop on Cryptography for Ad hoc Networks

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] Authenticated Key Encapsulation Using Signatures2006

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 2006 Hawaii, IEICE and SITA Joint Conference on Information Theory, Nara; also included in IEICE Technical Report Vol.106,No-59

      Pages: 23-28

    • NAID

      110004741466

    • Data Source
      KAKENHI-PROJECT-18700009
  • [Journal Article] A Timed-Release Key Management Scheme for Backward Recovery2006

    • Author(s)
      M.Yoshida, S.Mitsunari, T.Fujiwara
    • Journal Title

      Proc.8th Annual International Conference on Information Security and Cryptology To appear

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] A Time-Limited Key Management Scheme Based on a One-Way Permutation Tree2005

    • Author(s)
      Maki Yoshida, Yuichi Kaji, Toru Fujiwara
    • Journal Title

      Proceedings of the 2005 Hawaii, IEICE and SITA Joint conference on Information Theory, Honolulu, Hawaii

      Pages: 165-170

    • NAID

      10016434926

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] 相関型電子透かしの誤検出確率保証法における見逃し確率の改善2005

    • Author(s)
      藤田 高彬, 岡本 邦宏, 吉田 真紀, 藤原 融
    • Journal Title

      電子情報通信学会技術研究報告ISEC Vol.105, No.194

      Pages: 155-160

    • NAID

      110003298641

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] An Efficient Private and Consistent Data Retrieval Protocol2005

    • Author(s)
      Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, Toru Fujiwara
    • Journal Title

      Conference Records of Western European Workshop on Research in Cryptology

      Pages: 83-84

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] 先着限定販売のための売り切れ証明プロトコル2005

    • Author(s)
      吉田 真紀, 藤原 融
    • Journal Title

      コンピュータセキュリティシンポジウム2005 予稿集

      Pages: 523-528

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] A Watermark Detection Scheme Ensuring the False Positive Error Probability2005

    • Author(s)
      Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Conference Records of Western European Workshop on Research in Cryptology

      Pages: 18-19

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] Unlinkable Delivery System for Interactive Dramas2005

    • Author(s)
      Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science E88-A・1

      Pages: 262-269

    • NAID

      110003213234

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] A Time-Limited Key Management Scheme Based on a One-Way Permutation Tree2005

    • Author(s)
      M.Yoshida, Y.Kaji, T.Fujiwara
    • Journal Title

      Proc.2005 Hawaii, IEICE and SITA Joint Conference on Information Theory

      Pages: 165-170

    • NAID

      10016434926

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] Unlinkable Delivery System for Interactive Dramas2005

    • Author(s)
      Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E88-A, No.1

      Pages: 262-269

    • NAID

      110003213234

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] A Watermark Detection Scheme Ensuring the False Positive Error Probability2005

    • Author(s)
      T.Fujita, K.Okamoto, M.Yoshida, T.Fujiwara
    • Journal Title

      Conference Records of Western European Workshop on Research in Cryptology

      Pages: 18-19

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] 検索語の秘匿と検索結果の一貫性検証を可能とするデータ検索プロトコルにおける通信量の削減2005

    • Author(s)
      中山 敏, 吉田 真紀, 岡村 真吾, 藤原 晶, 藤原 融
    • Journal Title

      電子情報通信学会技術研究報告ISEC Vol.105, No.194

      Pages: 129-136

    • NAID

      110003298633

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] An Efficient Private and Consistent Data Retrieval Protocol2005

    • Author(s)
      S.Nakayama, M.Yoshida 他
    • Journal Title

      Conference Records of Western European Workshop on Research in Cryptology

      Pages: 83-84

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors2005

    • Author(s)
      Shingo Okamura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Peer-reviewed Proceedings of the ISSA 2005 New Knowledge Today Conference

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors2005

    • Author(s)
      S.Okamura, M.Yoshida, T.Fujiwara
    • Journal Title

      Peer-reviewed Proceedings of the ISSA 2005 New Knowledge Today Conference

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] 検索結果の秘匿と一貫性検証を可能とするデータ検索プロトコルの提案2005

    • Author(s)
      中山 敏, 藤原 晶, 吉田 真紀, 藤原 融
    • Journal Title

      2005年暗号と情報セキュリティシンポジウム予稿集 Vol.III

      Pages: 1489-1494

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] 動画像用相関型電子透かしの誤検出確率を保証可能とするフレーム間類似度の評価2005

    • Author(s)
      藤田 高彬, 岡本 邦宏, 吉田 真紀, 藤田 融
    • Journal Title

      2005年暗号と情報セキュリティシンポジウム予稿集 Vol.III

      Pages: 1033-1038

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] 暗号を用いたプロトコルに対するコスト最小攻撃の形式的導出法2004

    • Author(s)
      馬山 貴峰, 吉田 真紀, 藤原 融
    • Journal Title

      電子情報通信学会技術研究報告 ISEC2004-87

      Pages: 15-22

    • NAID

      110003298351

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] An Interactive Drama Delivery System Suitable for Mobile Phone (Preliminary Version)2004

    • Author(s)
      Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 5th International workshop on Information Security Application

      Pages: 391-398

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] A Method to Ensure Reliability of a Detection Result for Correlation Based Watermarking Detection Schemes2004

    • Author(s)
      Kunihiro Okamoto, Takayuki Ueno, Maki Yoshida, Toru Fujiwara
    • Journal Title

      2004 International Symposium on Information Theory and Its Applications

      Pages: 299-304

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] Unlinkable Delivery System for Interactive Dramas Including Conditional Choices2004

    • Author(s)
      Shingo Okamura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      2004 International Symposium on Information Theory and Its Applications

      Pages: 474-479

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Journal Article] An Interactive Drama Delivery System Suitable for Mobile Phone (Preliminary Version)2004

    • Author(s)
      Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, Toru Fujiwara
    • Journal Title

      Proceedings of the 5th International workshop on Information Security Applications (WISA2004)

      Pages: 391-398

    • Data Source
      KAKENHI-PROJECT-16700013
  • [Journal Article] A Digital Contents Consignment System Protecting Marketing Information2004

    • Author(s)
      Akira Fujiwara, Shingo Okamura, Maki Yoshida, Toru Fujiwara
    • Journal Title

      2004 International Symposium on Information Theory and Its Applications

      Pages: 468-473

    • Data Source
      KAKENHI-PROJECT-16016258
  • [Presentation] Private Simultaneous Messages および Conditional Disclosure of Secrets に関する情報理論的下界2020

    • Author(s)
      河内亮周, 吉田真紀
    • Organizer
      2019年度冬のLAシンポジウム
    • Data Source
      KAKENHI-PROJECT-19K11835
  • [Presentation] 検証乗算可能な秘密分散2018

    • Author(s)
      吉田真紀, 尾花賢
    • Organizer
      2018年暗号と情報セキュリティシンポジウム (SCIS2018)
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Presentation] 秘密分散とマトロイド2017

    • Author(s)
      吉田真紀
    • Organizer
      日本応用数理学会2017年度年会, 数理的技法による情報セキュリティ (FAIS)
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Presentation] TLSへのLogjam攻撃のProVerifによる形式化と検出2016

    • Author(s)
      木村文哉,吉田真紀,米山一樹
    • Organizer
      2016年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ, 熊本県熊本市中央区東阿弥陀寺町
    • Year and Date
      2016-01-19
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Presentation] A Note on Using Sigma Protocols in Cryptographic Protocols2016

    • Author(s)
      Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, Maki Yoshida
    • Organizer
      日本応用数理学会2016 年度年会, 数理的技法による情 報セキュリティ(FAIS)
    • Place of Presentation
      北九州国際会議場, 福岡県北九州市
    • Data Source
      KAKENHI-PROJECT-15K00196
  • [Presentation] Toward Exact Assumptions for UC Commitments with Automated Verification2015

    • Author(s)
      Hideki Sakurada, Kazuki Yoneyama, Yoshikazu Hanatani, and Maki Yoshida
    • Organizer
      The 2015 Symposium on Cryptography and Information Security
    • Place of Presentation
      RIHGA Royal Hotel Kokura, Asano, Kokurakita-ku, Kitakyushu, Fukuoka
    • Year and Date
      2015-01-23
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] 形式検証に向けたQUICの安全性定義の検討2015

    • Author(s)
      櫻田 英樹, 米山 一樹, 吉田 真紀, 花谷 嘉一
    • Organizer
      日本応用数理学会2015年度年会FAISオーガナイズド・セッション
    • Place of Presentation
      金沢大学, 石川県金沢市角間町
    • Year and Date
      2015-09-11
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] UCコミットメントの形式検証による厳密な仮定の導出に向けて2015

    • Author(s)
      吉田真紀
    • Organizer
      2015年 暗号理論ワークショップ
    • Place of Presentation
      東京工業大学, 東京都目黒区大岡山
    • Year and Date
      2015-02-24
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] 暗号プロトコル安全性検証の可視化に向けて2015

    • Author(s)
      吉田真紀, 水野修
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉, 福岡県福岡市小倉北区浅野
    • Year and Date
      2015-01-23
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] 暗号プロトコル評価の理論と可視化2015

    • Author(s)
      吉田真紀
    • Organizer
      Small-workshop on Communications between Academia and Industry for Security
    • Place of Presentation
      九州大学西新プラザ, 福岡市早良区西新
    • Year and Date
      2015-01-19
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] 暗号プロトコル評価の理論と可視化2014

    • Author(s)
      吉田真紀
    • Organizer
      CELLOSシンポジウム2014
    • Place of Presentation
      飯田橋グラン・ブルーム, 東京都千代田区富士見
    • Year and Date
      2014-12-18
    • Invited
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] Externalized Universally Composable の枠組みに対する記号的モデル2014

    • Author(s)
      吉田真紀, 鈴木斎輝, 藤原融
    • Organizer
      日本応用数理学会
    • Place of Presentation
      2009 年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS)
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] 時限式暗号における時報の受信失敗への対策について2014

    • Author(s)
      吉田真紀, 藤原融
    • Organizer
      2014 年暗号と情報セキュ リティシンポジウム
    • Place of Presentation
      2014 年暗号と情報セキュ リティシンポジウム
    • Data Source
      KAKENHI-PROJECT-24500015
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かし2012

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急(石川県)
    • Year and Date
      2012-02-01
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かし2012

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] On the Security of Ciphertext in Public-Key Encryption2012

    • Author(s)
      安永憲司, 吉田真紀
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急(石川県)
    • Year and Date
      2012-02-01
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Generic Construction of GUC Secure Commitment Protocol in the PKI Model2012

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Organizer
      Proceedings of the2012Symposium on Cryptography and Information Security
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 画質劣化を抑えた加法と乗法のハイブリッド電子透かしと尤度比検定による最適な検出2012

    • Author(s)
      吉田真紀
    • Organizer
      CompView暗号理論ワークショップ
    • Place of Presentation
      東工大蔵前会館(東京都)(招待講演)
    • Year and Date
      2012-02-22
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Generic Construction of GUC Secure Commitment Protocol in the PKI Model2012

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2012年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      金沢エクセルホテル東急(石川県)
    • Year and Date
      2012-01-30
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Bilinear Groupに関する困難性仮定への攻撃導出-Cryptology ePrint Archive上の仮定に攻撃は存在するか?-2011

    • Author(s)
      岡前直由, 吉田真紀, 雲嶋健太, 阿部正幸, 大久保美也子, 藤原融
    • Organizer
      2011年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2011

    • Author(s)
      aki Yoshida, Kazuya Ohkita, Toru Fujiwara
    • Organizer
      IEICE Tech. Rep.
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] On the Impossibility of d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      吉田真紀
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館(東京都)
    • Year and Date
      2011-05-13
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] EUC安全なメッセージ認証のためのmulti-messageプロトコルに対する記号的基準2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      IEICE Tech. Rep.
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] On d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      吉田真紀, 藤原融
    • Organizer
      2011 Workshop on Secret Sharing and Cloud Computing
    • Place of Presentation
      九州大学マス・フォア・インダストリ研究所(福岡県)(招待講演)
    • Year and Date
      2011-06-07
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] On the Impossibility of d-Multiplicative Non-perfect Secret Sharing2011

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      IEICE Tech. Rep.
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Bilinear Groupに関する困難性仮定への攻撃導出2011

    • Author(s)
      吉田真紀
    • Organizer
      Progress in Computer Algebra Systems
    • Place of Presentation
      九州大学マス・フォア・インダストリ研究所(福岡県)(招待講演)
    • Year and Date
      2011-08-31
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Static Adversaryに対してEUC安全な認証の記号的基準について2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会技術研究報告
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2011

    • Author(s)
      吉田真紀, 大北和也, 藤原融
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      静岡大学浜松キャンパス(静岡県)
    • Year and Date
      2011-07-12
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] EUC安全なメッセージ認証のためのmulti-messageプロトコルに対する記号的基準2011

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      大阪電気通信大学(大阪府)
    • Year and Date
      2011-11-15
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] All-or-nothing Property for Efficient Symbolic Analysis2010

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      Computational and Symbolic Proofs of Security
    • Place of Presentation
      Barbizon, France
    • Year and Date
      2010-04-15
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 汎用的結合可能な相互認証に対する記号的識別不可能性を用いた記号的基準2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2010年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Recovery of Tampered Pixels for Statistical Fragile Watermarking2010

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Toru Fujiwara
    • Organizer
      Proceedings of the 2010 Symposium on Cryptography and Information Security (SCIS2010)
    • Place of Presentation
      高松、日本
    • Year and Date
      2010-01-21
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Generic Modelにおける困難性仮定への攻撃の数式処理を用いた導出2010

    • Author(s)
      雲嶋健太, 吉田真紀, 阿部正幸, 大久保美也子, 藤原融
    • Organizer
      電子情報通信学会技術研究報告
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 汎用的結合可能な相互認証に対する記号的識別不可能性を用いた記号的基準2010

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2010年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      高松、日本
    • Year and Date
      2010-01-20
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Computationally Sound Symbolic Analysis for EUC Security of Key Exchange2010

    • Author(s)
      Itsuki Suzuki, Maki Yoshida, Toru Fujiwara
    • Organizer
      日本応用数理学会2010年度年会
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 多様性か否か-安全性の形式的検証と男女共同参画2010

    • Author(s)
      吉田真紀
    • Organizer
      東工大女性研究者のキャリアモデルインタビュー
    • Place of Presentation
      東京,日本
    • Year and Date
      2010-02-25
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 汎用的結合可能な安全性の形式的検証のためのpattern拡張に関する一考察2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年度年会
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 暗号プロトコルに対する公理的安全性検証法の主要処理の改良と実装2009

    • Author(s)
      鎌野善樹, 鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS)
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] 暗号プロトコルに対する公理的安全性検証法の主要処理の改良と実装2009

    • Author(s)
      鎌野善樹, 鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会,数理的技法による情報セキュリティ(FAIS)
    • Place of Presentation
      京都
    • Year and Date
      2009-03-07
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] 汎用的結合可能な安全性の形式的検証のためのpattern拡張に関する一考察2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年度年会,数理的技法による情報セキュリティ(FAIS)
    • Place of Presentation
      豊中,日本
    • Year and Date
      2009-09-28
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Development of a Verification Tool for Composable Security2009

    • Author(s)
      Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, Toru Fujiwara
    • Organizer
      Computational and Symbolic Proofs of Security (CosyProofs 2009)
    • Place of Presentation
      Atagawa, Japan
    • Year and Date
      2009-04-08
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] Watermarking Cryptographic Data A02-022009

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      The Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009)
    • Place of Presentation
      Kyoto, Japan(CD-ROM)
    • Year and Date
      2009-09-12
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 汎用的結合可能な鍵交換の安全性検証法2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009 年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS)
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] 相互認証の汎用的結合可能な安全性の解析のための形式的手法2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      2009年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] コンテンツ事前配信における不正配布抑止力の強い匿名フィンガープリンティング2009

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Organizer
      2009 年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] 汎用的結合可能な鍵交換の安全性検証法2009

    • Author(s)
      鈴木斎輝, 吉田真紀, 藤原融
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会,数理的技法による情報セキュリティ(FAIS)
    • Place of Presentation
      京都
    • Year and Date
      2009-03-07
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking2009

    • Author(s)
      Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, Toru Fujiwara
    • Organizer
      The 8th International Workshop on Digital Watermarking (IWDW 2009)
    • Place of Presentation
      Guildford, UK
    • Year and Date
      2009-08-26
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] 電子透かし性能向上のための統計的手法2009

    • Author(s)
      吉田真紀
    • Organizer
      電子透かしと確率的情報処理
    • Place of Presentation
      仙台,日本
    • Year and Date
      2009-11-13
    • Data Source
      KAKENHI-PROJECT-21700015
  • [Presentation] カルテ情報自己管理のための墨塗り署名2008

    • Author(s)
      冨士由奈, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会2008年総合大会
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] 利便性の高いコンテンツ事前配信のための匿名フィンガープリンティング2008

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Organizer
      2008年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] Optimum General Threshold Secret Sharing2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara, and Marc Fossorier
    • Organizer
      Proceedings of the 31th Symposium on Information Theory and Its Applications (SITA2008)
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] Global Timed-release Encryption2008

    • Author(s)
      Maki Yoshida, Toru Fujiwara
    • Organizer
      The 26th IEEE International Conference on Consumer Electronics
    • Place of Presentation
      LAS,US
    • Year and Date
      2008-01-11
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] Efficiency Analysis of the Nonlinear Function Ramp Secret Sharing Schemes2007

    • Author(s)
      Maki Yoshida and Toru Fujiwara
    • Organizer
      Proceedings of the 2007 Hawaii and SITA Joint Conference on Information Theory (HISC'07)
    • Place of Presentation
      Honolulu, Hawaii
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] コンテンツ事前配信のための匿名フィンガープリンティング2007

    • Author(s)
      原村和裕, 吉田真紀, 藤原融
    • Organizer
      電子情報通信学会技術研究報告(ISEC2007-92)
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] C2Cコンテンツ配信仲介サービスのための協調型非対称フィンガープリンティング2007

    • Author(s)
      浅野順也, 岡村真吾, 吉田真紀, 藤原融
    • Organizer
      2007年暗号と情報セキュリティシンポジウム予稿集
    • Data Source
      KAKENHI-PROJECT-18700009
  • [Presentation] ハイブリッド電子透かしの組合せに関する検討

    • Author(s)
      池田成吾, 吉田真紀, 藤原融
    • Organizer
      2013 年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ウェスティン都ホテル京都(京都府)
    • Data Source
      KAKENHI-PROJECT-24500015
  • 1.  藤原 融 (70190098)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 8 results
  • 2.  石原 靖哲 (00263434)
    # of Collaborated Projects: 4 results
    # of Collaborated Products: 0 results
  • 3.  Hanaoka Goichiro (30415731)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 4.  縫田 光司 (20435762)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 5.  江村 恵太 (30597018)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 6.  Attrapadun Nutt (40515300)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 7.  松田 隆宏 (60709492)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 8.  松尾 真一郎 (20553960)
    # of Collaborated Projects: 1 results
    # of Collaborated Products: 0 results
  • 9.  OBANA Satoshi
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 2 results

URL: 

Are you sure that you want to connect your ORCID iD to this researcher?
* This action can be performed only by the researcher themselves.

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi