|
田中圭介 2010年 研究業績一覧 (18件 / 367件)
論文
-
KEISUKE TANAKA,
Takato HIRANO.
Key Generation for Fast Inversion of the Paillier Encryption Function,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E93-A,
No. 6,
pp. 1111-1121,
June 2010.
-
KEISUKE TANAKA,
Toshiyuki ISSHIKI,
Koichiro WADA.
A Rational Secret-Sharing Scheme Based on RSA-OAEP,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E93-A,
No. 1,
pp. 42-49,
Jan. 2010.
国際会議発表 (査読有り)
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
A Multi-trapdoor Commitment Scheme from the RSA Assumption,
Australasian Conference on Information Security and Privacy,
pp. 182-199,
July 2010.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki.
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model,
13th International Conference on Practice and Theory in Public Key Cryptography,
Public Key Cryptography – PKC 2010,
pp. 261-278,
May 2010.
-
KEISUKE TANAKA,
Akinori Kawachi,
Akira Numayama,
Keita Xagawa.
Security of Encryption Schemes in Weakened Random Oracle Models,
13th International Conference on Practice and Theory in Public Key Cryptography,
Public Key Cryptography,
pp. 403-419,
May 2010.
国内会議発表 (査読なし・不明)
-
田中圭介,
並木均,
安永憲司.
公開鍵暗号の乱数漏洩に関する一考察,
コンピュテーション研究会(COMP),
Dec. 2010.
-
KEISUKE TANAKA,
Hitoshi Namiki,
Kenji Yasunaga.
On Randomness leakage in public-Key Encryption,
コンピュテーション研究会,
Nov. 2010.
-
河内亮周,
岡本吉央,
田中圭介,
安永憲司.
合理的なプレイヤーは合理的な暗号プロトコルを避ける,
2009年度冬のLAシンポジウム,
Feb. 2010.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki.
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
田中圭介,
河内 亮周,
草川 恵太.
ルジャンドル列の擬似乱数性と頑健な量子状態復号,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
田中圭介,
西巻 陵,
藤﨑 英一郎.
標準仮定に基づいた非対話型かつ再利用可能で頑強なコミットメント方式,
The 2010 Symposium on Cryptography and information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Hitoshi Namiki,
Kenji Yasunaga.
public-Key Encryption Resilient to Randomness Leakage.,
The 2010 Symposium on Cryptography and information security,
Jan. 2010.
-
KEISUKE TANAKA,
AKINORI KAWACHI,
Yoshio Okamoto,
Kenji Yasunaga.
One-round reconstruction for rational secret sharing,
2010年暗号と情報セキュリティシンポジウム,
Jan. 2010.
-
KEISUKE TANAKA,
Mario Larangeira.
Weakened Random oracle Models Without Programmability.,
The 2010 symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Keita Xagawa.
Proxy Re-Encryption based on learning with Errors,
The 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Akihiro Yamada,
Kenji Yasunaga.
Weak Oblivious Transfer from Strong One-Way Permutations,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Yuki Tan,
Kenji Yasunaga.
Non-Malleability on Trapdoors in Public-Key Encryption with Keyword Search.,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
その他の論文・著書など
[ BibTeX 形式で保存 ]
[ 論文・著書をCSV形式で保存
]
[ 特許をCSV形式で保存
]
|