Fiscal Year 2012
-
Shunsuke Sakai, Masahiro Mambo,
Experiments on the Diversion Resistance in Image Authentication,
Proceedings CD-ROM of the 2013 Symposium on Cryptography and Information Security, SCIS2013, 2D4-1, January 2013.
-
Hiroki Nakamura, Masahiro Mambo,
Study on the eCK security of a key exchange scheme based on mOT,
Proceedings CD-ROM of the 2013 Symposium on Cryptography and Information Security, SCIS2013, 2F2-3, January 2013.
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto,
A Study on Construction of Multisignatures and Aggregate Signatures,
Proceedings CD-ROM of the 2013 Symposium on Cryptography and Information Security, SCIS2013, 3A4-3, January 2013.
-
Tomoki Hayafuji, Masahiro Mambo,
Application of Fully Homomorphic Encryption for Resource-Saving Devices,
Proceedings CD-ROM of the 2013 Symposium on Cryptography and Information Security, SCIS2013, 4D1-1, January 2013.
Fiscal Year 2013
-
Hiroki Nakamura, Masahiro Mambo,
鍵の部分的な漏洩を考慮したRSAベース鍵共有方式,
平成25年度電気関係学会北陸支部連合大会, E-19, September 21, 2013.
-
Kazuya Ito, Masahiro Mambo,
マイクロブログでのプライバシー保護機能について,
平成25年度電気関係学会北陸支部連合大会, E-20, September 21, 2013.
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo, Goichirou Hanaoka, Eiji Okamoto,
多者多重署名とその応用,
FIT2013, L-027, 第4分冊, pp.281-282, September, 2013.
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto,
A Note on BGP-Aiding Aggregate Signatures,
Proceedings CSS2013, 2C3-1, pp.510-517, October, 2013.
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto,
Efficient CDH-based Ordered Multisignature Schemes without Random Oracles,
The 36th Symposium on Information Theory and its Applications (SITA 2013), November 26-29, 2013.
-
Takuya Funakoshi, Masahiro Mambo,
Application of Location Information to the Authentication Systems,
Proceedings CD-ROM of the 2014 Symposium on Cryptography and Information Security, SCIS2014, 1B1-4, January 2014.
-
Tomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo,
A Study on the Accountable Anonymous Channel,
Proceedings CD-ROM of the 2014 Symposium on Cryptography and Information Security, SCIS2014, 2D4-4, January 2014.
-
Kosuke Yuzawa, Kenji Yasunaga, Masahiro Mambo,
A Study on Computational Fuzzy Extractors,
Proceedings CD-ROM of the 2014 Symposium on Cryptography and Information Security, SCIS2014, 3B4-1, January 2014.
-
Hirooki Nakamura, Masahiro Mambo,
A Certificateless Identity-Based Authenticated Key Exchange Scheme,
Proceedings CD-ROM of the 2014 Symposium on Cryptography and Information Security, SCIS2014, 3D5-1, January 2014.
-
Shunsuke Sakai, Masahiro Mambo,
On the Online Multistage Secret Sharing Schemes,
Proceedings CD-ROM of the 2014 Symposium on Cryptography and Information Security, SCIS2014, 3D5-2, January 2014.
-
Yuki Doi, Masahiro Mambo,
Revisiting the Video Authentication Method,
Proceedings CD-ROM of the 2014 Symposium on Cryptography and Information Security, SCIS2014, 4F1-6, January 2014.
Fiscal Year 2014
-
Takuya Funakoshi, Masahiro Mambo,
How to Utilize Location Information for Distinguishing Users,
IEICE Technical Report, ISEC2014-68, SITE2014-59, LOIS2014-38, Vol.114, No.319, pp.71-76, November 22, 2014.
-
Naoto Yanai, Masahiro Mambo, Eiji Okamoto,
Ordered Multisignatures Made shorter,
Proceedings the 37th Symposium on Information Theory and its Applications (SITA 2014), December 9-12, 2014.
-
Kosuke Yuzawa, Kenji Yasunaga, Masahiro Mambo
Effects of the partial password sharing for usability improvements,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 2C1-3, January 2015.
-
So Higashikawa, Masahiro Mambo,
On the Construction of Pattern Lock Strong against Shoulder Surfing,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 2C1-4, January 2015.
-
Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo,
Implementation of the method to prohibit abuse of stolen cookies,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 3E1-2, January 2015.
-
Keita Inasawa, Kenji Yasunaga, Masahiro Mambo,
Rational Proofs against Reward-Reducing Verifiers,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 3D3-4, January 2015.
-
Mitsuharu Ikeda, Kenji Yasunaga, Masahiro Mambo,
On the Study of Computational Entropic Security,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 4F1-1, January 2015.
-
Takuya Nishino, Kenji Yasunaga, Masahiro Mambo,
An analysis on PRNGs with entropy pools,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 4E2-4, January 2015.
-
Mitsuharu Ikeda, Kenji Yasunaga, Masahiro Mambo,
On the Study of Computational Entropic Security,
Proceedings CD-ROM of the 2015 Symposium on Cryptography and Information Security, SCIS2015, 2F1-1, January 2015.
-
Tomoki Hayafuji, Masahiro Mambo,
An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme,
IEICE Technical Report, ISEC2014-81, IT2014-68, WBS2014-60, Vol.114, No.471, pp.39-46, March 2, 2015.
Fiscal Year 2015
-
So Higashikawa, Tomoaki Kosugi, Masahiro Mambo,
A Further Approach toward Pattern Lock Resistant against Shoulder Surfing,
IEICE Technical Report, BioX2015-12, Vol.115, No.117, pp.85-89, June 30, 2015.
-
Keita Inasawa, Kenji Yasunaga, Masahiro Mambo,
合理的な検証者に対する合理的な証明,
Summer LA Symposium 2015, July 15, 2015.
-
Zhao Hanqing, Masahiro Mambo,
クライアント登録時間に依存したクッキーを用いた認証システム,
平成27年度電気関係学会北陸支部連合大会, September 2015.
-
Toshifumi Nishinaga, Masahiro Mambo,
Implementation of μNaCl on 32-bit ARM Cortex-M3,
Proceedings of Computer Security Symposium 2015, IPSJ Symposium Series Vol.2015, No.3, pp.102-109, 2015.
-
Satoshi Hiraiwa, Masahiro Mambo,
Application of the Wireless LAN Information to User Authentication,
IPSJ SIG Technical Report, Vol.2015-CSEC-71, No.6, pp.1-8, 2015.
Fiscal Year 2016
-
Hayato Etchuya, Kenji Yasunaga, Masahiro Mambo,
A Construction of Signdecryption Schemes from Obfuscation
Proceedings of the 2016 Symposium on Cryptography and Information Security, SCIS2016, 2C3-2 (January 20, 2016).
-
Toshifumi Nishinaga, Masahiro Mambo,
Implementation of μNaCl on 32-bit ARM Cortex-M0,
Proceedings of the 2016 Symposium on Cryptography and Information Security, SCIS2016, 2C4-5 (January 20, 2016).
-
Lihua Wang, Licheng Wang, Masahiro Mambo,
A Study on the Security Evaluation Methods of Proxy Re-Encryption Applied to Cloud Enviornments,
Proceedings of the 2016 Symposium on Cryptography and Information Security, SCIS2016, 2B4-5 (January 20, 2016).
-
Keita Inasawa, Kenji Yasunaga, Masahiro Mambo,
Rational Proofs against Cheating Verifiers and Their Application to Delegated Computation,
Proceedings of the 2016 Symposium on Cryptography and Information Security, SCIS2016, 3A3-2 (January 21, 2016).
-
Kosuke Yuzawa, Kenji Yasunaga, Masahiro Mambo,
On the Incentive to Generate Randomness in Repeated Games,
Proceedings of the 2016 Symposium on Cryptography and Information Security, SCIS2016, 3A3-4 (January 21, 2016).
-
Satoshi Hiraiwa, Masahiro Mambo,
User authentication using similarity search of the time-series data,
Proc. of Computer Security Symposium 2016,
IPSJ Symposium Series Vol.2016, No.2, pp.1299-1303 (2016).
-
Satoshi Hiraiwa, Masahiro Mambo,
Application of the Method for Similarity Search of Time-Series Data to User Authentication,
IEICE Technical Report, ISEC2016-46, SITE2016-46, LOIS2016-34, Vol.116, No.289, pp.33-38 (November 7, 2016).
-
Toshifumi Nishinaga, Masahiro Mambo,
Implementation and Evaluation of the Knuth-Yao Algorithm for ARM-Cortex-M0+,
Proceedings of the 2017 Symposium on Cryptography and Information Security, SCIS2017, 2A4-4 (January 25, 2017).
-
Kazuya Fukushima, Tomoaki Kosugi, Kenji Yasunaga, Masahiro Mambo,
Comparative evaluation of security indices used in data anonymization,
Proceedings of the 2017 Symposium on Cryptography and Information Security, SCIS2017, 3B3-6 (January 26, 2017).
-
Keita Inasawa, Hayato Etchuya, Kenji Yasunaga, Masahiro Mambo,
On the Impossibility Results of Permissionless Consensus Protocols,
Proceedings of the 2017 Symposium on Cryptography and Information Security, SCIS2017, 3F3-1 (January 26, 2017).
-
Tomohiro Hayashi, Kenji Yasunaga, Masahiro Mambo,
On the Security of Deterministic Encryption Schemes for Quantum Adversaries,
Proceedings of the 2017 Symposium on Cryptography and Information Security, SCIS2017, 4A1-1 (January 27, 2017).
-
Dedi Gunawan, Masahiro Mambo,
An Approach to Protecting Sensitive Items with Maintaining Data Size,
Proceedings of the 2017 Symposium on Cryptography and Information Security, SCIS2017, 4D1-5 (January 27, 2017).
Fiscal Year 2017
-
Shogo Kitajima, Masahiro Mambo,
"Verifiying the Validity of Public Key Certificates Using Edge Computing",
Computer Security Symposium 2017 (CSS2017), 1C3-3, 2017.
-
Kazuya Fukushima, Shogo Kitajima, Masahiro Mambo,
"A Study on Update Frequency of Pseudonym ID on Web Browsing History",
Computer Security Symposium 2017 (CSS2017), 3F3-3, 2017.
-
Satoshi Hiraiwa, Masahiro Mambo,
"How to Utilize Wireless LAN Information for Behavior Authentication",
Computer Security Symposium 2017 (CSS2017), 3E4-3, 2017.
-
Satoshi Hiraiwa, Naoki Sakamoto, Masahiro Mambo,
"On the Utilization of Wireless LAN Information for Behavior Authentication",
The Seventh Symposium on Biometrics, Recognition and Authentication (SBRA2017), S4-23, 2017.
-
Kazuya Fukushima, Shogo Kitajima, Masahiro Mambo,
"Re-identification of Web browsing history using time series property",
2018 Symposium on Cryptography and Information Security, SCIS2018, 2F4-4, Jan. 23 - 26, 2018.
-
Haruna Higo, Keisuke Tanaka, Kenji Yasunaga,
"Security against Risk-Averse Adversaries: Secure Two-Party Protocols from a Game-Theoretic Perspective",
2018 Symposium on Cryptography and Information Security, SCIS2018, 3A1-1, Jan. 23 - 26, 2018.
-
Toshifumi Nishinaga, Ryota Hirose, Masahiro Mambo,
"Implementation and Evaluation of Ring-LWE Cryptography on ARM Cortex-M0+ Microcontroller",
2018 Symposium on Cryptography and Information Security, SCIS2018, 4E1-3, Jan. 23 - 26, 2018.
-
Shogo Kitajima, Masahiro Mambo,
"Proposal of Similarity Index of Multivariate Datasets",
2018 Symposium on Cryptography and Information Security, SCIS2018, 4C2-1, Jan. 23 - 26, 2018.
Fiscal Year 2018
-
Dedi Gunawan, Masahiro Mambo,
"Hiding Personal Tendency in Set-valued Database Publication",
Proceedings of the 2019 Symposium on Cryptography and Information Security, SCIS2019, 1C2-1, Jan. 22 - 25, 2019.
-
Ryota Hirose, Toshifumi Nishinaga, Masahiro Mambo,
"Considerations of Efficient Modulo Algorithms for IoT Devices",
Proceedings of the 2019 Symposium on Cryptography and Information Security, SCIS2019, 1D2-1, Jan. 22 - 25, 2019.
-
Favian Dewanta, Masahiro Mambo,
"BPT: How to Establish Trusted Vehicular Fog Computing Service on Rural Area",
Proceedings of the 2019 Symposium on Cryptography and Information Security, SCIS2019, 2E3-5, Jan. 22 - 25, 2019.
-
Shogo Kitajima, Yuki Nagoya, Yuma Takeuchi, Kazuya Fukushima, Masahiro Mambo,
"Similarity evaluation for the analysis of web browsing activity",
Proceedings of the 2019 Symposium on Cryptography and Information Security, SCIS2019, 3C2-1, Jan. 22 - 25, 2019.
-
Kazuya Fukushima, Shogo Kitajima, Yuki Nagoya, Masahiro Mambo,
"Privacy Risk Evaluation for Pseudonym Update on Web-browsing History",
Proceedings of the 2019 Symposium on Cryptography and Information Security, SCIS2019, 3C2-2, Jan. 22 - 25, 2019.
-
YU ZHE, Masahiro Mambo,
"Detecting Adversarial Examples by Assistant Neural Networks",
Proceedings of the 2019 Symposium on Cryptography and Information Security, SCIS2019, 4F1-5, Jan. 22 - 25, 2019.
Fiscal Year 2019
-
Kazuya Fukushima, Hiroki Furusaka, Masahiro Mambo,
Consideration of Set-Partition Based Pseudonymisation Method,
Proc. of Computer Security Symposium 2019,IPSJ Symposium Series Vol.2019, pp.1273-1276 (2019).
-
Akira Yamada, Ayane Sano, Ayumu Kubota, Ichiro Shimada, Jun Nakajima,
Katsunari Yoshioka, Kojiro Seo, Masahiro Mambo, Masaya Sato, Reo
Matsumura, Rui Tanabe, Seiichi Ozawa, Shoma Tanaka, Shun Umemoto, So Matsuda,
Toshihiro Yamauchi, Yukiko Sawaya,
A Framework for Monitoring Web-based Attacks Targeting Smartphone:Design and Implementation,
Proceedings of the 2020 Symposium on Cryptography and Information Security, SCIS2020, 2F2-4 (January, 2020).
-
Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo,
White-Box Symmetric Cipher Using Quantum Memory,
Proceedings of the 2020 Symposium on Cryptography and Information Security, SCIS2020, 2B2-4 (January, 2020).
-
Kyi Thar Ko, Htet Htet Laign, Masahiro Mambo,
Application of PEKS to NDN for Name Privacy,
Proceedings of the 2020 Symposium on Cryptography and Information Security, SCIS2020, 4C1-4 (January, 2020).
-
Taiga HASUIKE , Masahiro MAMBO,
Improvement of the Backup Method Dealing with 2 Types of Damages,
SIG Technical Reports, ICSS2019-68 & Vol. 2020-SPT-36, No.1, pp.1-6 (2020).
Fiscal year 2020
-
Yuma Takeuchi, Masahiro Mambo,
User estimation considering time-series characteristics of web browsing History,
Proceedings of the 2021 Symposium on Cryptography and Information Security, SCIS2021, 4F1-4 (January 22, 2021).
Fiscal Year 2021
-
Kazuki SHIMIZU, MasahiroMAMBO
DeepFake Image Detections Based using Corneal Specular Highlight,
The 11th Symposium on Biometrics, Recognition and Authentication
A1-4 (Nov. 29, 2021)
-
Chun-An Lin, Chen-Mou Cheng, Masahiro Mambo,
An Access Control System for Verifiable Credentials with Selective
Disclosure
Proceedings of the 2022 Symposium on Cryptography and Information
Security, SCIS2022, 1B1-4 (January 18, 2022).
-
Kazuki SHIMIZU, MasahiroMAMBO
DeepFake Image Detections Based on Corneal Specular Highlight,
Proceedings of the 2022 Symposium on Cryptography and Information
Security, SCIS2022, 2D1-4 (January 19, 2022).
-
Ren Ujima, Taisei Ibayashi, Masahiro Mambo,
Designing Countermeasures of the Simple Black-box Attack
Proceedings of the 2022 Symposium on Cryptography and Information
Security, SCIS2022, 2D2-4 (January 19, 2022).
-
Takuya Kato, Masahiro Mambo,
Evaluation of Personal Match Rate in Web Browsing History Data,
Proceedings of the 2022 Symposium on Cryptography and Information
Security, SCIS2022, 3B2-3 (January 18, 2022).
Fiscal Year 2022
-
Danu Dwi Sanjoyo, Masahiro Mambo
Providing Accountability for Secure Zero Touch Provisioning,
Proceedings of the 2023 Symposium on Cryptography and Information
Security, SCIS2023, 2B4-2 (January 25, 2023).
-
Cheng-Yi Lee, Zi-Yuan Liu, Raylin Tso, Masahiro Mambo,
Fine-grained Secure Computing for Hierarchical Organization,
Proceedings of the 2023 Symposium on Cryptography and Information
Security, SCIS2023, 3A1-4 (January 26, 2023).
-
Zi-Yuan Liu, Raylin Tso, Masahiro Mambo,
Hierarchical Identity-Based Encryption with Simulation-Based Receiver
Selective Opening Security,
Proceedings of the 2023 Symposium on Cryptography and Information
Security, SCIS2023, 3A2-3 (January 25, 2023).
Fiscal Year 2023
-
Keisuke Kamijo, Masahiro Mambo
On the Relationship between Byzantine Robustness and Subsampling in
Federated Learning,
IPSJ SIG Technical Report, Vol.2023-CSEC-100, 2023-DPS-194, No.14,
pp.1-8, 2023.
-
Takumi Yamada, Masahiro Mambo
Application of the Access Control Using Decentralized Identities to
Blockchain-Based Selection Mechanism,
IPSJ SIG Technical Report, Vol.2023-CSEC-100, 2023-DPS-194, No.68,
pp.1-8, 2023.
-
Yuta Takabayashi, Masahiro Mambo,
Proposal of a Malware Classification Method Using FastText and Out-of-Distribution Detection,
DICOMO2023, 3A2-3 (July 5, 2023).
-
Keita Emura, Shingo Sato, Atsushi Takayasu
A Generic Construction of Keyed Homomorphic Attribute-based Encryption
Computer Security Symposium 2023 (CSS 2023) 3E3-2, 2023
-
Shuntaro Ema, Keita Emura, Toshihiro Ohigashi
Implementation and Evaluation of Lattice-based IBE with Security against
the Key Generation Center
信学技報, vol. 123, no. 269, ICSS2023-60, pp. 64-69, 2023年11月.
情報通信システムセキュリティ研究会(ICSS)
-
Hiroto Shiba, Masahiro Mambo
On the Differentially Private Federated Clustering over Non-IID Data
Computer Security Symposium 2023 (CSS 2023) 2C1-1, 2023
-
Chen Wang, Zi-Yuan Liu, Masahiro Mambo
On Proof of Ownership in Digital Wallets
Computer Security Symposium 2023 (CSS 2023) 3E3-1, 2023
-
Keita Emura, Shingo Sato, Atsushi Takayasu.
A Generic Construction ofAttribute-based Keyed Fully Homomorphic Encryption
Proceedings of the 2024 Symposium on Cryptography and Information Security,
SCIS2024, 3C2-3 (January 25, 2024).
-
Keita Emura, Atsushi Takayasu.
A pairing-free Public Key Authenticated Encryption with Keyword Search Scheme
Proceedings of the 2024 Symposium on Cryptography and Information Security,
SCIS2024, 3C1-4 (January 25, 2024).
-
Ryuichi Ogawa, Taika Kato, Keita Emura, Toshihiro Ohigashi.
Proposal of Anonymous FIDO Authentication and its Application.
The Institute of Electronics, Information and Communication Engineers,
General Conference 2024, A-7-14.
-
Habata Kyoya, Masahiro Mambo.
On the Security of Federated Learning with Dataset Distillation
IPSJ SIG Technical Report, Vol.2024-CSEC-104, No.10, pp.1-7, 2024.
-
Keita Emura.
Forward Secure Public Key Authenticated Encryption
with Keyword Search with Shortened Ciphertext.
IPSJ SIG Technical Report, Vol.2024-CSEC-104, No.60, pp.1-8, 2024.
-
Yuto Imura, Keita Emura.
An Identity Management System using Group Signatures with Message-Dependent Opening.
IEICE Tech. Rep., vol. 123, no. 424, ISEC2023-117, pp. 267-272, March 2024.
-
Hinata Nishino, Keita Emura.
Encrypted data sharing system based on IBE secure against the KGC.
IEICE Tech. Rep., vol. 123, no. 424, ISEC2023-118, pp. 273-278, March 2024.
Fiscal Year 2024
-
Yuta Takabayashi and Masahiro Mambo.
Proposal of eBPF-based Evasion Methods Against Detection of Linux
Fileless Malware and Their Countermeasures.
Computer Security Symposium 2024 (CSS 2024) 3D5-2, 2024.
-
Keita Emura.
Refundable Stealth Address from Key-Insulated and Privacy-Preserving
Signature Scheme with Publicly Derived Public Key.
Computer Security Symposium 2024 (CSS 2024) 2F1-1, 2024.
-
Takeshi Yoshida and Keita Emura.
On the Relations between Matchmaking Public Key Encryption and Public Key Authenticated Encryption with
Keyword Search.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
2B1-1 (January 29, 2025).
-
Mizuki Hayashi and Keita Emura.
Security Analysis on Gao et al's Public-Key Inverted-Index Keyword Search with Designated Tester.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
2B1-2 (January 29, 2025).
-
Atsuki Fukuzawa and Masahiro Mambo.
Decoy File Evasion by Ransomware and Its Countermeasure.
The 42nd Symposium on Cryptography and Information Security (SCIS
2025), 2F2-1 (January 29, 2025).
-
Shogo Murasaki, Kazumasa Omote, and Keita Emura.
On the Consideration of Vanity Address Generation via Identity-Based Signatures.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
2A2-5 (January 29, 2025).
-
Yuki Funamoto, Keitarou Shibata, and Masahiro Mambo.
On Verifying Public Keys Using NDN.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
2F4-2 (January 29, 2025).
-
Shunsuke Ito and Masahiro Mambo.
Side-Channel Attacks against Key Generation of HAWK.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
3E1-2 (January 30, 2025).
-
Hinata Nishino, Kazumasa Omote, and Keita Emura.
A Smart Contract-based Non-Transferable Signature Verification System using Nominative Signatures.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
2A3-1 (January 29, 2025).
-
Yuto Imura and Keita Emura.
Group Signatures with Message-Dependent Opening Directly Imply Timed-Release Encryption.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
3C2-1 (January 30, 2025).
-
Keita Emura.
On the Traceability of Group Signatures.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
3C2-2 (January 30, 2025).
-
Masahiro Mambo and Kouichi Sakurai.
Towards Designing Secure Remote Signature Systems.
The 42nd Symposium on Cryptography and Information Security (SCIS 2025),
3F2-4 (January 30, 2025).
Fiscal Year 2025
-
Keita Emura. Generic Construction of Dual-Server PAEKS
IEICE Tech. Rep., vol. 125, no. 99, ISEC2025-49, pp. 210-215, July 2025.
-
Yuto Imura and Keita Emura.
On Token Unforgeability of Group Signatures with Message-Dependent Opening
Computer Security Symposium 2025 (CSS 2025) 4G4-1, 2025.
-
Takeshi Yoshida and Keita Emura.
On the Security of Identity-Based Group Encryption With Keyword Search
Computer Security Symposium 2025 (CSS 2025) 4G4-2, 2025.
-
Hinata Nishino and Keita Emura.
Security Analysis on a Blockchain-based Public-Key Authenticated Encryption Scheme with Multi-Keyword Search
Computer Security Symposium 2025 (CSS 2025) 4I2-2, 2025.
-
Keita Emura.
On Beyond Unforgeability Features of ECDSA with Key Recovery
Computer Security Symposium 2025 (CSS 2025) 4I2-4, 2025.
-
Ryo Mizuno, Keita Emura.
Generic Construction of CCA-Secure PKE from Key-Insulated and Privacy-Preserving Signatures with Publicly Derived Public Key
The 43rd Symposium on Cryptography and Information Security (SCIS 2026) 3E3-2 (January 28, 2026).
-
Keita Emura, Toshihiro Ohigashi, Nobuyuki Sugio.
Generic Construction of Searchable Public-key Ciphertexts with Hidden Structures
The 43rd Symposium on Cryptography and Information Security (SCIS 2026) 4C4-2 (January 29, 2026).
-
Takuma Watanabe, Keita Emura.
On Public Verifiability of Tokens in Group Signatures with Message-Dependent Opening
The 43rd Symposium on Cryptography and Information Security (SCIS 2026) 4D2-1 (January 29, 2026).
-
Cao Shiqi, Keita Emura.
On Non-Frameability in Group Signatures
The 43rd Symposium on Cryptography and Information Security (SCIS 2026) 4D2-2 (January 29, 2026).
-
Akiya Sueki, Yuta Watanabe, Ryuichi Ogawa, Keita Emura, Toshihiro Ohigashi.
Anonymous Authentication System for Guest Wi-Fi Using Group Signatures with Time-Bound Keys
IEICE Tech. Rep., vol. 125, no. 405, ISEC2025-109, pp. 139-146, March 2026.