|
西巻陵 研究業績一覧 (24件)
論文
-
Fuyuki Kitagawa,
Ryo Nishimaki,
Keisuke Tanaka:.
Obfustopia Built on Secret-Key Functional Encryption,
Journal of Cryptology,
35,
June 2022.
-
Fuyuki Kitagawa,
Ryo Nishimaki,
Keisuke Tanaka.
Simple and Generic Constructions of Succinct Functional Encryption,
Journal of Cryptology,
Vol. 34,
May 2021.
-
KEISUKE TANAKA,
Eiichiro Fujisaki,
AKINORI KAWACHI,
Ryo Nishimaki,
Kenji Yasunaga.
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E98-A,
No. 3,
pp. 853-862,
Mar. 2015.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
An Efficient Non-interactive Universally Composable String-Commitment Scheme,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E95-A,
No. 1,
pp. 167-175,
Jan. 2012.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
A Multi-Trapdoor Commitment Scheme from the RSA Assumption,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E95-A,
No. 1,
pp. 176-184,
Jan. 2012.
国際会議発表 (査読有り)
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki,
Takashi Yamakawa.
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.,
39th Annual International Cryptology Conference(CRYPTO 2019),
Advances in Cryptology – CRYPTO 2019,
pp. 521-551,
Aug. 2019.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki.
Simple and Generic Constructions of Succinct Functional Encryption,
21st IACR International Conference on Practice and Theory of Public-Key Cryptography,
pp. 187-217,
Mar. 2018.
-
Keisuke Tanaka,
Fuyuki Kitagawa,
Ryo Nishimaki.
Obfustopia Built on Secret-Key Functional Encryption,
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques,
pp. 603-648,
Mar. 2018.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
A Multi-trapdoor Commitment Scheme from the RSA Assumption,
Australasian Conference on Information Security and Privacy,
pp. 182-199,
July 2010.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki.
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model,
13th International Conference on Practice and Theory in Public Key Cryptography,
Public Key Cryptography – PKC 2010,
pp. 261-278,
May 2010.
-
KEISUKE TANAKA,
Eiichiro Fujisaki,
Ryo Nishimaki.
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions,
Provable Security2009,
pp. 118-128,
Nov. 2009.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
Efficient Non-interactive Universally Composable String-Commitment Schemes,
Provable Security2009,
pp. 3-18,
Nov. 2009.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki,
Akira Numayama.
Security on Hybrid Encryption with the Tag-KEM/DEM Framework,
Australasian Conference on Information Security and Privacy,
pp. 343-359,
July 2009.
国内会議発表 (査読なし・不明)
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki.
On Succinctness and Collusion-Resistance of Secret Key Functional Encryption.,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki.
All You Need Is Slight Compression,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
KEISUKE TANAKA,
Yoshihiro Koseki,
Ryo Nishimaki,
Eiichiro Fujisaki.
Constructions for Complete Context Hiding Homomorphic Signature from Standard Assumptions,
2014年 暗号と情報セキュリティシンポジウム.,
Jan. 2014.
-
田中圭介,
小関義博,
西巻陵,
藤崎英一郎.
準同型署名方式の構成について,
2013年度冬のLAシンポジウム,
Jan. 2014.
-
KEISUKE TANAKA,
Takayuki Otsubo,
Manh Ha Nguyen,
Ryo Nishimaki.
On Master Secret-Key Leakage-Resilient Identity-Based Encryption,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
田中圭介,
大坪峻之,
グエンマインハー,
西巻陵.
マスター鍵の漏洩を考慮したIDベース暗号の一般的構成,
Jan. 2013.
-
田中圭介,
小関義博,
西巻陵,
藤崎英一郎.
秘密鍵の漏洩に対して安全なデュアルフォーム署名,
2013年 暗号と情報セキュリティシンポジウム,
Jan. 2013.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki.
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
田中圭介,
西巻 陵,
藤﨑 英一郎.
標準仮定に基づいた非対話型かつ再利用可能で頑強なコミットメント方式,
The 2010 Symposium on Cryptography and information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki,
Akira Numayama.
Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Extended Abstruct),
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 2B2-4,
Jan. 2009.
-
田中圭介,
西巻陵,
藤崎 英一郎.
二つのモデルの差を示す新たな暗号の実例,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 2F1-4,
Jan. 2008.
[ BibTeX 形式で保存 ]
[ 論文・著書をCSV形式で保存
]
[ 特許をCSV形式で保存
]
|