• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

MOROZOV Kirill  MOROZOV Kirill

ORCIDConnect your ORCID iD *help
Researcher Number 80443232
Affiliation (based on the past Project Information) *help 2016 – 2017: 東京工業大学, 情報理工学院, 特任准教授
2014 – 2015: 九州大学, マス・フォア・インダストリ研究所, 助教
2013: 九州大学, マス・フォア・インダストリ研究 所, 助教
2012: 九州大学, マス・フォア・インダストリ研究所, 助教
Review Section/Research Field
Principal Investigator
Information security / Fundamental theory of informatics
Keywords
Principal Investigator
不正者を検知可能な秘密分散法 / 秘密分散法 / 符号理論に基づく暗号 / 耐量子暗号 / Robust秘密分散法 / 公開鍵暗号方式 / デジタル署名 / 暗号解読 / プライバシー保護計算 / 委託秘匿計算 … More / ロバスト秘密分散法 / コミットメント方式 / 平文知識証明プロトコル / 不正者に対しても検知可能な秘密分散法 / ゼロ知識証明プロトコル / 符号理論に基づく暗号方式 / シェア再配布 / robust秘密分散法 / 暗号プロトコル Less
  • Research Projects

    (2 results)
  • Research Products

    (64 results)
  • Co-Researchers

    (2 People)
  •  耐量子公開鍵暗号と能動的攻撃者に対して安全な秘密分散法の研究Principal Investigator

    • Principal Investigator
      Morozov Kirill
    • Project Period (FY)
      2015 – 2017
    • Research Category
      Grant-in-Aid for Scientific Research (C)
    • Research Field
      Information security
    • Research Institution
      Tokyo Institute of Technology
      Kyushu University
  •  A Study on Code-Based Postquantum Cryptographic Protocols and Their Security ModelsPrincipal Investigator

    • Principal Investigator
      MOROZOV Kirill
    • Project Period (FY)
      2012 – 2014
    • Research Category
      Grant-in-Aid for Young Scientists (B)
    • Research Field
      Fundamental theory of informatics
    • Research Institution
      Kyushu University

All 2017 2016 2015 2014 2013 2012

All Journal Article Presentation Book

  • [Book] Code-Based Zero-Knowledge Protocols and Their Applications2017

    • Author(s)
      Kirill Morozov
    • Total Pages
      20
    • Publisher
      Springer
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Book] "Code-Based Public-Key Encryption" - a section in the book Nishii et al. (eds.), "A Mathematical Approach to Research Problems of Science and Technology - Theoretical Basis and Developments in Mathematical Modeling", pp. 47-56, Mathematics for Industry, vol. 52014

    • Author(s)
      Kirill Morozov
    • Total Pages
      10
    • Publisher
      Springer
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Efficient outsourcing of secure k-nearest neighbour query over encrypted database2017

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Computers & Security

      Volume: 69 Pages: 65-83

    • DOI

      10.1016/j.cose.2016.11.012

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation2017

    • Author(s)
      Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto
    • Journal Title

      Advances in Information and Computer Security, IWSEC 2017, Lecture Notes in Computer Science

      Volume: 10418 Pages: 159-178

    • DOI

      10.1007/978-3-319-64200-0_10

    • ISBN
      9783319641997, 9783319642000
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] On unconditionally binding code-based commitment schemes2017

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai
    • Journal Title

      Proc. of 11th International Conference on Ubiquitous Information Management and Communication

      Volume: - Pages: 101-101

    • DOI

      10.1145/3022227.3022327

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions2017

    • Author(s)
      Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      The Journal of Supercomputing

      Volume: 73 Issue: 10 Pages: 4275-4301

    • DOI

      10.1007/s11227-017-2009-7

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00029, KAKENHI-PROJECT-15K00186
  • [Journal Article] Secret Sharing with Cheaters Using Multi-Receiver Authentication2017

    • Author(s)
      Rui Xu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: E100.A Issue: 1 Pages: 115-125

    • DOI

      10.1587/transfun.E100.A.115

    • NAID

      130005180789

    • ISSN
      0916-8508, 1745-1337
    • Language
      English
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Cross-Group Secret Sharing Scheme for Secure Usage of Cloud Storage over Different Providers and Regions2017

    • Author(s)
      Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      The Journal of Supercomputing

      Volume: N/A

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] CCA2 Key-Privacy for Code-Based Encryption in the Standard Model2017

    • Author(s)
      Y. Yoshida, K. Morozov, K. Tanaka
    • Journal Title

      Lecture Notes in Computer Science (PQCrypto 2017)

      Volume: 10346 Pages: 35-50

    • DOI

      10.1007/978-3-319-59879-6_3

    • ISBN
      9783319598789, 9783319598796
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-16H01705, KAKENHI-PROJECT-17H01695, KAKENHI-PROJECT-15K00186
  • [Journal Article] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2017

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Computers & Security

      Volume: N/A

    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2016

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Proc. Information Security and Privacy - 21st Australasian Conference (Part I), ACISP 2016, Lecture Notes in Computer Science

      Volume: 9722 Pages: 181-197

    • DOI

      10.1007/978-3-319-40253-6_11

    • ISBN
      9783319402529, 9783319402536
    • Peer Reviewed / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Cross-group Secret Sharing for Secure Cloud Storage Service2016

    • Author(s)
      Chenyutao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, Kouichi Sakurai
    • Journal Title

      Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication, IMCOM 2016

      Volume: - Pages: 1-8

    • DOI

      10.1145/2857546.2857610

    • NAID

      120006654575

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00029, KAKENHI-PROJECT-15K00186, KAKENHI-PROJECT-15H02711
  • [Journal Article] On the Security of the CFS Signature2016

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu
    • Journal Title

      Proc. of Symposium on Cryptography and Information Security (SCIS 2016)

      Volume: - Pages: 1-5

    • Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters2016

    • Author(s)
      Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Journal Title

      Proc. Information Theoretic Security - 9th International Conference, ICITS 2016, Lecture Notes in Computer Science

      Volume: 10015 Pages: 3-23

    • DOI

      10.1007/978-3-319-49175-2_1

    • ISBN
      9783319491745, 9783319491752
    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Privacy-preserving k-Nearest Neighbour Query on Outsourced Database2016

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Journal Title

      Proc. of 21st Australasian Conference on Information Security and Privacy (ACISP 2016)

      Volume: 印刷中

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Note on some recent cheater identifiable secret sharing schemes2015

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98-A (8) Pages: 1814-1819

    • NAID

      130005089910

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Parity Check based redistribution of secret shares2015

    • Author(s)
      Yvo Desmedt, Kirill Morozov
    • Journal Title

      Proc. of IEEE International Symposium on Information Theory, ISIT 2015

      Volume: - Pages: 959-963

    • DOI

      10.1109/isit.2015.7282597

    • Peer Reviewed / Acknowledgement Compliant / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Parity Check Based Redistribution of Secret Shares2015

    • Author(s)
      Yvo Desmedt and Kirill Morozov
    • Journal Title

      Proceedings of 2015 IEEE International Symposium on Information Theory (ISIT)

      Volume: なし Pages: 959-963

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Note on Some Recent Cheater Identifiable Secret Sharing Schemes2015

    • Author(s)
      Rui Xu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: 98-A (8) Pages: 1814-1819

    • NAID

      130005089910

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services2015

    • Author(s)
      Mingwu Zhang, Yong Xia, Ou Yuan, and Kirill Morozov
    • Journal Title

      International Journal of Communication Systems

      Volume: 末定 Issue: 12 Pages: 1863-1872

    • DOI

      10.1002/dac.2817

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013, KAKENHI-PROJECT-15K00186
  • [Journal Article] Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters2015

    • Author(s)
      Avishek Adhikar, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Journal Title

      IACR Cryptology ePrint Archive

      Volume: 1115 Pages: 1-23

    • Acknowledgement Compliant / Open Access / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Zero-Knowledge Protocols for Code-Based Public-Key Encryption2015

    • Author(s)
      Rong Hu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: 98-A (10) Pages: 2139-2151

    • NAID

      130005100672

    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Journal Article] Generic Constructions and Transformations of Decryption Consistent Encryption2014

    • Author(s)
      Mingwu Zhang, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      IETE Journal of Research

      Volume: 60 (3) Issue: 3 Pages: 218-228

    • DOI

      10.1080/03772063.2014.901480

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Revisits and Transformations Among Functional Encryption Systems2014

    • Author(s)
      Mingwu Zhang, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      IETE Technical Review

      Volume: 31 (1) Issue: 1 Pages: 103-114

    • DOI

      10.1080/02564602.2014.891385

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication2014

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Proc. 9th International Workshop on Security (IWSEC 2014), Lecture Notes in Computer Science

      Volume: 8639 Pages: 72-87

    • DOI

      10.1007/978-3-319-09843-2_6

    • ISBN
      9783319098425, 9783319098432
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Cryptanalysis of Some Recent Cheater Identifiable Secret Sharing Schemes2014

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Proceedings of Symposium on Cryptography and Information Security (SCIS) 2014, Kagoshima, January 21-24, 2014

    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE2014

    • Author(s)
      Cui Yang, Kazukuni Kobara, Kirill Morozov, and Hideki Imai
    • Journal Title

      International Journal of Network Security

      Volume: 16 (1) Pages: 19-28

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] LR-FEAD: leakage-tolerating and attribute-hiding functional encryption mechanism with delegation in affine subspaces2014

    • Author(s)
      Mingwu Zhang, Chunzhi Wang, and Kirill Morozov
    • Journal Title

      Journal of Supercomputing

      Volume: 70 (3) Issue: 3 Pages: 1405-1432

    • DOI

      10.1007/s11227-014-1234-6

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency2014

    • Author(s)
      Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, and Kouichi Sakurai
    • Journal Title

      Proc. of 4th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2014), Lecture Notes in Computer Science

      Volume: 8804 Pages: 47-58

    • DOI

      10.1007/978-3-319-12060-7_4

    • ISBN
      9783319120591, 9783319120607
    • Peer Reviewed / Acknowledgement Compliant
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Confirmer Signatures from McEliece Assumptions (Extended Abstract)2014

    • Author(s)
      Rong Hu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Proceedings of Symposium on Cryptography and Information Security (SCIS) 2014, Kagoshima, January 21-24, 2014

    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary2013

    • Author(s)
      Rui Xu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      Advances in Information and Computer Security - 8th International Workshop on Security, IWSEC 2013, Okinawa, Japan, November 18-20, 2013, Proceedings

      Volume: LNCS, vol. 8231 Pages: 258-271

    • DOI

      10.1007/978-3-642-41383-4_17

    • ISBN
      9783642413827, 9783642413834
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited (Short Paper)2013

    • Author(s)
      Rong Hu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      Proc. 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013)

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Proof of plaintext knowledge for code-based public-key encryption revisited2013

    • Author(s)
      Rong Hu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS 2013, Hangzhou, China - May 08 - 10, 2013

      Pages: 535-540

    • DOI

      10.1145/2484313.2484385

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding2013

    • Author(s)
      Rong Hu, Kirill Morozov, and Tsuyoshi Takagi
    • Journal Title

      8th Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013

      Pages: 12-18

    • DOI

      10.1109/asiajcis.2013.10

    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] On Proof of Plaintext Knowledge for Code-Based Public Key Encryption2013

    • Author(s)
      Rong Hu, Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      Proc. of Symposium on Cryptography and Information Security (SCIS 2013)

    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Code-Based Public Key Encryption (Book Section)2013

    • Author(s)
      Kirill Morozov
    • Journal Title

      MI Lecture Note Series : "科学・技術の研究問題への数学アプローチ - 数学モデリングの基礎と展開 -"

      Volume: 46 Pages: 31-38

    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Efficient Constructions of Deterministic Encryption from Hybrid Encryption and Code-Based PKE2013

    • Author(s)
      Cui Yang, Kazukuni Kobara, Kirill Morozov, Hideki Imai
    • Journal Title

      International Journal of Network Security

    • Data Source
      KAKENHI-PROJECT-24700013
  • [Journal Article] Zero-Knowledge Protocols for the McEliece Encryption2012

    • Author(s)
      Kirill Morozov, Tsuyoshi Takagi
    • Journal Title

      Lecture Notes in Computer Science : Proc. of the 17th Australasian Conference on Information Security and Privacy (ACISP 2012)

      Volume: 7372 Pages: 180-193

    • DOI

      10.1007/978-3-642-31448-3_14

    • ISBN
      9783642314476, 9783642314483
    • Peer Reviewed
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Anonymity in Code-Based Public-Key Encryption2017

    • Author(s)
      Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka
    • Organizer
      3rd Asia Post-Quantum Cryptography Forum
    • Place of Presentation
      Tokyo Institute of Technology
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters2017

    • Author(s)
      Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Organizer
      34th Symposium on Cryptography and Information Security
    • Place of Presentation
      Naha, Okinawa
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Cloud-Friendly VSS with a Non-Interactive Dealer2016

    • Author(s)
      Kirill Morozov
    • Organizer
      2016 Workshop on Mathematics of Information-Theoretic Cryptography
    • Place of Presentation
      National University of Singapore, Singapore
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters2016

    • Author(s)
      Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu
    • Organizer
      9th International Conference on Information Theoretic Security, ICITS 2016
    • Place of Presentation
      Tacoma, WA, USA
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Recent Progress on Secret Sharing with Cheaters2016

    • Author(s)
      Kirill Morozov
    • Organizer
      3rd Sino-Korea International Conference on Coding Theory and Related Topics
    • Place of Presentation
      Beijing, China
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] A Survey of Code-Based Cryptography2016

    • Author(s)
      Kirill Morozov
    • Organizer
      1st PQC Asia Forum
    • Place of Presentation
      Chengdu, China
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Recent Trends in Code-Based Cryptography2016

    • Author(s)
      Kirill Morozov
    • Organizer
      Round table on Code-Based Cryptography
    • Place of Presentation
      Sogang University, Seoul, Korea
    • Invited
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] On the Security of the CFS Signature2016

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu
    • Organizer
      Symposium on Cryptography and Information Security (SCIS 2016)
    • Place of Presentation
      Kumamoto, Japan
    • Year and Date
      2016-01-19
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2016

    • Author(s)
      Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi
    • Organizer
      21st Australasian Conference on Information Security and Privacy, ACISP 2016
    • Place of Presentation
      Melbourne, Australia
    • Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Improvement of Robust Secret Sharing with Optimal Cheater Resiliency2015

    • Author(s)
      Kirill Morozov
    • Organizer
      Symposium on Cryptography and Information Security 2015
    • Place of Presentation
      Kitakyushu
    • Year and Date
      2015-01-21
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Code-based designated confirmer signatures2015

    • Author(s)
      Kirill Morozov, Rong Hu, Tsuyoshi Takagi
    • Organizer
      SIAM Conference on Applied Algebraic Geometry, Minisymposium MS24: Coding Theory and Cryptography 1
    • Place of Presentation
      Daejeon, Korea
    • Year and Date
      2015-08-04
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Cheater Identifiable Secret Sharing Schemes Via Multi-Receiver Authentication2015

    • Author(s)
      Kirill Morozov
    • Organizer
      Workshop among Asian Information Security Laboratories (WAIS) 2015
    • Place of Presentation
      The WooJung College of Information and Communications Hall, Korea University, Seoul
    • Year and Date
      2015-01-09
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Zero-Knowledge Protocols for Code-Based Public-Key Encryption2015

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar of Department of Mathematics, Seoul National University
    • Place of Presentation
      Department of Mathematics, Seoul National University, Gwanak Campus
    • Year and Date
      2015-01-12
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] On Security of the Courtois-Finiasz-Sendrier signature2015

    • Author(s)
      Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu
    • Organizer
      Dagstuhl Seminar 15371 “Quantum Cryptanalysis”
    • Place of Presentation
      Schloss Dagstuhl, Germany
    • Year and Date
      2015-09-11
    • Invited / Int'l Joint Research
    • Data Source
      KAKENHI-PROJECT-15K00186
  • [Presentation] Code-Based Encryption2014

    • Author(s)
      Kirill Morozov
    • Organizer
      ワークショップ「社会基盤としての高機能暗号とその楕円曲線及び格子による実現」
    • Place of Presentation
      九州大学産学官連携イノベーションプラザ、福岡
    • Year and Date
      2014-09-09
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] A New Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary2014

    • Author(s)
      Kirill Morozov
    • Organizer
      Workshop around algebraic combinatorics
    • Place of Presentation
      高知大学理学部理学科数学コース
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary2013

    • Author(s)
      Kirill Morozov
    • Organizer
      安全・安心社会基盤構築のための代数構造~サイバー社会の信頼性確保のための数理学~ワークショップ
    • Place of Presentation
      九州先端科学技術研究所、福岡
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Verifiable Code-Based Encryption2013

    • Author(s)
      Kirill Morozov
    • Organizer
      Dagstuhl Seminar 13371 "Quantum Cryptanalysis"
    • Place of Presentation
      Leibniz Center for Informatics, Saarland, Germany
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Secret Sharing, Proof of Plaintext Knowledge, and Their Applications to Secure Cloud Storage2013

    • Author(s)
      Kirill Morozov
    • Organizer
      2013 International Symposium on Data Security and Identity Privacy in Cloud Computing (DSIP2013)
    • Place of Presentation
      Hubei University of Technology, Wuhan, China
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Zero-Knowledge Protocols for Code-Based Public-Key Encryption2013

    • Author(s)
      Kirill Morozov
    • Organizer
      Workshop on Post-Quantum Cryptography and Its Related Topics
    • Place of Presentation
      九州先端科学技術研究所、福岡
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Zero-Knowledge Protocols for the McEliece Cryptosystem2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      School of Mathematical Science, University of Science and Technology of China, Hefei, China
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Zero-Knowledge Protocols for Code-Based Encryption2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      State Key Laboratory Of Information Security (SKLOIS), Chinese Academy of Sciences, Beijing, China
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Oblivious Transfer Capacity of Generalized Erasure Channels in the Malicious Model2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      State Key Laboratory Of Information Security (SKLOIS), Chinese Academy of Sciences, Beijing, China
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Zero-Knowledge Identification Protocols from Coding2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      State Key Laboratory Of Information Security (SKLOIS), Chinese Academy of Sciences, Beijing, China
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] Zero-Knowledge Protocols for the McEliece Cryptosystem2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Seminar
    • Place of Presentation
      School of Computer Science and Technology, University of Science and Technology of China, Hefei, China
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • [Presentation] On proof of plaintext knowledge for code-based public key encryption2012

    • Author(s)
      Kirill Morozov
    • Organizer
      Indo-Japan Joint Workshop on Cryptography
    • Place of Presentation
      九州先端科学技術研究所、福岡
    • Invited
    • Data Source
      KAKENHI-PROJECT-24700013
  • 1.  穴田 啓晃
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 2 results
  • 2.  田中 圭介
    # of Collaborated Projects: 0 results
    # of Collaborated Products: 1 results

URL: 

Are you sure that you want to link your ORCID iD to your KAKEN Researcher profile?
* This action can be performed only by the researcher himself/herself who is listed on the KAKEN Researcher’s page. Are you sure that this KAKEN Researcher’s page is your page?

この研究者とORCID iDの連携を行いますか?
※ この処理は、研究者本人だけが実行できます。

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi