|
黒澤馨 研究業績一覧 (57件)
論文
-
Toi Tomita,
Wakaha Ogata,
Kaoru Kurosawa.
Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK,
IEICE Trans. on Fundamentals,
Vol. Vol.E105-A,
No. 3,
Mar. 2022.
-
Toi Tomita,
Wakaha Ogata,
Kaoru Kurosawa,
Ryo Kuwayama.
CCA-Secure Leakege-Resilient Identity-Based Encryption without q-Type Assumptions,
IEICE Trans. on Fundamentals,
Vol. E103-A,
No. 10,
pp. 1157--1166,
Oct. 2020.
-
Wakaha Ogata,
Kaoru Kurosawa.
No-Dictionary Searchable Symmetric Encryption,
IEICE Trans. on Fundamentals,
Vol. E102-A,
No. 1,
pp. 144-124,
Jan. 2019.
-
Le Trieu Phong,
Kaoru Kurosawa,
Wakaha Ogata.
Undeniable and Unpretendable Signatures,
IEICE Trans. on Fundamentals,
Vol. E95-A,
No. 1,
pp. 138-150,
Jan. 2012.
-
Le Trieu Phong,
Kaoru Kurosawa,
Wakaha Ogata.
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes,
IEICE Trans. on Fundamentals,
Vol. E93-A,
No. 1,
pp. 63-75,
Jan. 2010.
-
K.Okada,
K.Kurosawa.
MDS secret sharing scheme secure against cheaters,
IEEE Trans. on IT,
Vol. 46,
No. 3,
pp. 1078-1081,
2000.
-
S.Obana,
K.Kurosawa.
``Combinatorial classification of optimal authentication codes with arbitration,
Designs, Codes and Cryptography,
Vol. 20,
No. 3,
pp. 281-305,
2000.
-
K.Kurosawa,
F.Sato,
T.Sakata,
W.Kishimoto.
A relatiohship between linear complexity and k-error linear complexity,
IEEE Trans. on IT,
Vol. 46,
No. 2,
pp. 694-698,
2000.
-
K. Kurosawa,
T. Yoshida.
Strongly universal hashing and identification codes via channels,
IEEE Trans. on IT,
Vol. 45,
No. 6,
pp. 2091-2095,
1999.
-
T. Satoh,
M. Haga,
K. Kurosawa.
Towards secure and fast hash functions,
IEICE, Trans.E82-A,
No. 1,
pp. 53-64,
1999.
-
Y. Desmedt,
K. Kurosawa.
Practical and proven zero knwoledge constant round variant of GQ and Schnorr,
IEICE, Trans.E82-A,
No. 1,
pp. 69-76,
1999.
-
T. Satoh,
K. Kurosawa.
Highly nonlinear vector Boolean functions,
IEICE, Trans.E82-A,
No. 5,
pp. 807-814,
1999.
-
T. Iwata,
K. Kurosawa.
Probabilistic higher order differential attack and higher order bent functions,
Proc. of Asiacrypt'99, LNCS 1716, Springer Verlag,
pp. 62-74,
1999.
-
T. Satoh,
T. Iwata,
K. Kurosawa.
On cryptographically secure vectorial Boolean functions,
Proc. of Asiacrypt'99, LNCS 1716, Springer Verlag,
pp. 20-28,
1999.
-
K. Kurosawa,
Wakaha Ogata.
Efficient Rabin-type Digital Signature Scheme,
Designs, Codes and Cryptography,
Vol. 16,
No. 1,
pp. 53-64,
1999.
-
Carlo Blundo,
Alfredo De Santis,
K. Kurosawa,
Wakaha Ogata.
Fallacious Bound for Authentication Codes,
Journal of Cryptology,
Vol. 12,
No. 3,
pp. 155-159,
1999.
-
Wakaha Ogata,
Kaoru Kurosawa.
Some Basic Properties of General Nonperfect Secret Sharing Schemes,
Journal of Universal Computer Science,
Vol. 4,
No. 8,
pp. 690-704,
1998.
-
K.Okada,
W.Ogata,
K.Sakano,
K.Kurosawa.
Analysis on Secret Sharing Schemes with Non-Graphical Access Structures,
IEICE Transaction,
Vol. E80-A,
pp. 85-89,
1997.
-
Kaoru Kurosawa,
Yutaka Katayama,
Wakaha OGATA.
Reshufflable and Laziness Tolerant Mental Card Game Protocol,
IEICE Transaction,
Vol. E80-A,
pp. 72-78,
1997.
-
Wakaha OGATA,
Keiichi SAKANO,
Kaoru KUROSAWA.
Multisymbol Majority Vote and Hard Core,
Information Processing Letters,
Vol. 58,
pp. 285-292,
1996.
-
Kaoru Kurosawa,
Wakaha Ogata,
Shigeo Tsujii.
4-move Perfect ZKIP for Some Promise Problem,
IEICE Transaction,
Vol. E78-A,
pp. 34-41,
1995.
-
Wakaha Ogata,
Kaoru Kurosawa.
On claw free families,
IEICE Transaction,
Vol. E77-A,
pp. 72-80,
1994.
国際会議発表 (査読有り)
-
Toi Tomita,
Wakaha Ogata,
Kaoru Kurosawa.
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions,
IWSEC 2019,
Aug. 2019.
-
Wakaha Ogata,
Kaoru Kurosawa.
Efficient no-dictionary verifiable searchable symmetric encryption,
Finantial Cryptology,
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
Springer,
Vol. 10322 LNCS,
pp. 498-516,
Apr. 2017.
-
Le Trieu Phong,
Kaoru Kurosawa,
Wakaha Ogata.
Provably Secure Convertible Undeniable Signatures with Unambiguity,
Seventh Conference on Security and Cryptography for Networks,
Proc. of 7th International Conference, SCN 2010, LNCS Vol. 6280,
pp. 291-308,
Sept. 2010.
公式リンク
-
Le Trieu Phong,
Kaoru Kurosawa,
Wakaha Ogata.
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes,
AfricaCrypt 2009,
Progress in Cryptology -- AFRICACRYPT 2009, LNCS,
Vol. 5580,
pp. 1116-134,
June 2009.
-
K.Kurosawa,
W.Ogata,
Toshihiko Matsuo,
S.Makishima.
IND-CCA Public Key Schemes Equivalent to Factoring N=pq,
PKC 2001,
Lecture Notes in Computer Science, Proc. of PKC2001,
Vol. 1992,
pp. 36-47,
2001.
-
Wakaha OGATA,
Kaoru KUROSAWA,
Kazue Sako,
Kazunori TAKATANI.
Fault Tolerant Anonymous Channel,
Proc. of ICICS'97, Lecture Notes in Computer Science,
Vol. 1334,
pp. 440-444,
1997.
-
Wakaha Ogata,
Kaoru Kurosawa.
Optimum Secret Sharing Scheme Secure against Cheating,
Eurocrypt'96,
Proc. of Eurocrypt'96, Lecture Notes in Computer Science,
Vol. 1070,
pp. 200-211,
1996.
-
Kaoru Kurosawa,
Satoshi Obana,
Wakaha Ogata.
t-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes,
CRYPTO'95,
Proc. of CRYPTO'95, Lecture Notes in Computer Science,
Vol. 963,
pp. 410-423,
1995.
-
K.Kurosawa,
K.Okada,
K.Sakano,
W.Ogata,
S.Tsujii.
Nonperfect Secret Sharing Schemes and Matroids,
Eurocrypt'93,
Proc. of Eurocrypt'93, Lecture Notes in Computer Science,
Vol. 765,
pp. 126-141,
1993.
-
W.Ogata,
K.Kurosawa,
S.Tsujii.
Nonperfect Secret Sharing Schemes,
Proc. of Auscrypt'92, Lecture Notes in Computer Science,
Vol. 718,
pp. 56-66,
1992.
-
Wakaha Ogata,
Kaoru Kurosawa.
On Claw free Families,
Asiacrypt'91,
Proc. of Asiacrypt'91, Lecture Notes in Computer Science,
Vol. 739,
pp. 111-123,
1991.
-
K.Kurosawa,
Y.Katayama W.Ogata,
Wakaha Ogata,
S.Tsujii.
General Public key residue cryptosystem and mental poker protocols,
Eurocrypt'90,
Proc. of Eurocrypt'90, Lecture Notes in Computer Science,
Vol. 473,
pp. 374-388,
1990.
国内会議発表 (査読なし・不明)
-
冨田斗威,
尾形わかは,
黒澤馨.
選択暗号文攻撃に対してoptimally leakage-resilientなIDベース暗号,
暗号と情報セキュリティシンポジウムSCIS2020,
暗号と情報セキュリティシンポジウム予稿集,
Jan. 2020.
公式リンク
-
冨田斗威,
尾形わかは,
黒澤馨.
標準的な仮定のもとでleakage resilient かつCCA安全なIDベースKEM,
暗号と情報セキュリティシンポジウムSCIS2019,
暗号と情報セキュリティシンポジウム予稿集,
Jan. 2019.
-
Le Trieu Phong,
Kaoru Kurosawa,
Wakaha Ogata.
Provably Secure Convertible Undeniable Signatures with Unambiguity,
the 2010 Simposium on Cryptography and Information Security,
Proceedings of the 2010 Simposium on Cryptography and Information Security,
Jan. 2010.
-
Le Trieu Phong,
Kaoru Kurosawa,
Wakaha Ogata.
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes,
2009年暗号と情報セキュリティシンポジウム,
暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009,3C1-1,
3B4-4,
Jan. 2009.
-
尾形わかは,
黒澤馨.
安全性が証明可能な metering scheme,
暗号と情報セキュリティシンポジウム,
暗号と情報セキュリティシンポジウム予稿集,
pp. 875-880,
2001.
-
板倉征男,
岩田哲,
尾形わかは,
黒澤馨,
辻井重男.
DNA情報を組み込んだ公開鍵暗号方式,
電子情報通信学会技術研究報告,
Vol. ISEC2000-42,
2000.
-
黒澤馨,
尾形わかは.
効率の良いRabin型デジタル署名方式,
暗号と情報セキュリティシンポジウム,
暗号と情報セキュリティシンポジウム予稿集,
pp. 539-544,
1999.
-
C.Blundo,
A.De Santis,
黒澤 馨,
尾形 わかは.
認証コードのある下界の誤りとその訂正,
暗号と情報セキュリティシンポジウム,
暗号と情報セキュリティシンポジウム予稿集,
Vol. SCIS'98-6.3.B,
1998.
-
尾形 わかは,
黒澤 馨,
Kazunori TAKATANI.
(k,n)閾値匿名通信路とその応用,
暗号と情報セキュリティシンポジウム,
Vol. SCIS'97-27F,
1997.
-
尾形わかは,
黒澤馨.
不正者に対して最も安全な秘密分散共有法,
電子情報通信学会技術研究報告,
Vol. ISEC96-41,
1996.
-
尾形 わかは,
黒澤 馨.
Some new results on nonperfect secret sharing schemes,
電子情報通信学会技術研究報告,
Vol. ISEC95-44,
1995.
-
黒澤 馨,
Y.Katayama,
尾形 わかは.
Reshufflable and laziness tolerant mantal card game protocol,
応用数理学会平成6年度年会,
応用数理学会平成6年度年会予稿集,
pp. 164,
1994.
-
尾形わかは,
阪野恵市,
黒澤馨.
Multivalued hard core,
暗号と情報セキュリティシンポジウム,
Vol. SCIS'93-9B,
1993.
-
岡田光司,
尾形わかは,
黒澤馨.
An Optimal share size in a perfect secret sharing scheme,
暗号と情報セキュリティシンポジウム,
暗号と情報セキュリティシンポジウム,
Vol. SCIS'93-11C,
1993.
-
尾形わかは,
黒澤馨,
辻井重男.
Nonperfect secret sharing scheme,
暗号と情報セキュリティシンポジウム,
Vol. SCIS'93-16D,
1993.
-
尾形わかは,
阪野恵市,
黒澤馨.
多値のハードコアのインバータ,
暗号と情報セキュリティシンポジウム,
暗号と情報セキュリティシンポジウム予稿集,
Vol. SCIS'92-4D,
1992.
-
黒澤馨,
尾形わかは,
伊東利哉,
辻井重男.
4-move zero-knowledge interactive proof systems,
電子情報通信学会技術研究報告,
Vol. ISEC90-39,
1990.
-
黒澤馨,
尾形わかは,
辻井重男.
2 move ゼロ知識証明,
電子情報通信学会技術研究報告,
Vol. ISEC90-14,
1990.
-
黒澤馨,
尾形わかは,
辻井重男.
4 move ゼロ知識証明,
電子情報通信学会技術研究報告,
Vol. ISEC90-15,
1990.
-
尾形わかは,
黒澤馨.
Claw free familyの構成法,
電子情報通信学会技術研究報告,
Vol. ISEC90-22,
1990.
-
黒澤馨,
板倉わかは,
片山裕.
多次剰余のゼロ知識証明とそのmental pokerへの応用,
第12回情報理論とその応用シンポジウム,
第12回情報理論とその応用シンポジウム予稿集,
pp. 453-458,
1989.
-
片山裕,
板倉わかは,
黒澤馨.
ゼロ知識証明における通信量の削減について,
電子情報通信学会技術研究報告,
Vol. ISEC89-37,
1989.
学位論文
[ BibTeX 形式で保存 ]
[ 論文・著書をCSV形式で保存
]
[ 特許をCSV形式で保存
]
|