Fiscal Year 2011
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo,
A Secure Structured Multisignature Scheme Based on a Non-Commutative Ring Homomorphism,
IEICE Trans. on Fundamentals, Vol.E94-A, No.6, pp.1346-1355, June 2011.
-
Hiroki Akiyama, Masahiro Mambo, Eiji Okamoto,
A Hidden Vector Encryption Scheme Hiding Wild Cards of a Search Query,
IPSJ Journal, Vol.52, No.9, pp.2662-2673, September 2011.
-
Lihua Wang, Lichen Wang, Masahiro Mambo, Eiji Okamoto,
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities,
IEICE Trans. on Fundamentals, Vol.E95-A, No.1, pp.70-88, January 2012.
-
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto,
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adversaries,
Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), ISYOU, Vol.3,
No.1/2, pp.30-54, March 2012.
Fiscal Year 2012
-
Hirotaka Kokubo, Akira Kanaoka, Masahiro Mambo, Eiji Okamoto,
A Combined Machine Learning Method for the Detection of Attacks,
IPSJ Journal, Vol.53, No.9, pp.2086-2093, September 2012.
Fiscal Year 2013
-
Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka,
Leakage-resilience of stateless/stateful public-key encryption from hash proofs,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, volume E96-A, No.6,
pp.1100-1111, June 2013.
-
Kenji Yasunaga,
List decoding of Reed-Muller codes based on a generalized Plotkin construction,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E96-A, No.7,
pp.1662-1666, July 2013.
-
Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang,
Certificate-based proxy decryption systems with revocability in the standard model,
Information Sciences, Vol.247, pp.188-201, Elsevier, October 20, 2013.
-
Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga,
Randomness leakage in the KEM/DEM frame-work,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No.1,
pp.191-199, January 2014.
Fiscal Year 2014
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto,
A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles,
Journal of Information Processing, Vol.22, No.2, pp.366-375, April 15, 2014.
-
Shunsuke Saskai, Masahiro Mambo,
Experiments on the Diversion Resistance of Secret Information in Authentication Using Image: With Main Focus on
Random Art,
IEICE Trans. on Information and Systems, Vol.J97-D, No.5, pp.944-952, May 2014.
-
Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, Kenji Yasunaga,
Post-challenge leakage resilient public-key cryptosystem in split state model,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E98-A, No.3,
pp.853-862, March 2015.
Fiscal Year 2015
-
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu,
On the Security of a User Equipment Registration Procedure in Femtocell-Enabled Networks,
Journal of Universal Computer Science, Vol.21, No.3, pp.406-418, 2015.
-
Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng,
Certificateless aggregate signature with efficient verification,
Security and Communication Networks, John Wiley & Sons, Vol.8, Issue 13, pp.2232-2243, September 2015.
-
K. Yasunaga,
Public-key encryption with lazy parties,
IEICE Transactions on Fundamentals, E99-A(2),pp.590-600, 2016.2.
Fiscal Year 2016
-
Toshifumi Nishinaga, Masahiro Mambo,
Implementation of μNaCl on 32-bit ARM Cortex-M0,
IEICE Trans. Info&Systems, Vol.E99-D, No.8, pp.2056-2060 (August 1, 2016).
Special Issue: Security, Privacy and Anonymity of Internet of Things
-
Satoshi Hiraiwa, Masahiro Mambo,
On the Application of Wireless LAN Information to User Authentication
The IEICE Trans. on Information and Systems, Vol.J99-D, No.10, pp.1034-1044 (October 2016).
Special Section on Life Log Processing and Office Information Systems
-
Abdul Wahid, Masahiro Mambo,
Implementation of Certificateless Signcryption based on Elliptic Curve Using Javascript,
International Journal of Computing and Informatics (IJCANDI), Vo.1, No.3, pp.90-100 (August 2016).
Fiscal Year 2017
-
Rodrigo Roman, Javier Lopez, Masahiro Mambo,
Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges,
Future Generation Computer Systems, Elsevier, Volume 78, Part 2, pp.680-698 (January 2018).
-
So Higashikawa, Tomoaki Kosugi, Shogo Kitajima, Masahiro Mambo,
Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock,
IEICE Trans. Info&Systems, Vol.E101-D, No.1, pp.45-52 (January, 2018).
-
A. Kawachi, Y. Okamoto, K. Tanaka, K. Yasunaga,
General constructions of rational secret sharing with expected constant-round reconstruction,
The Computer Journal, 60(5), pp.711-728, 2017.5.
Fiscal Year 2019
-
Dedi Gunawan, Masahiro Mambo,
Data Anonymization for Hiding Personal Tendency in Set-valued Database Publication,
Future Internet, MDPI, Vol.11, Issue 6, Article 138, 16 pages (June 20, 2019).
-
Kazuya Fukushima, Shogo Kitajima, Masahiro Mambo,
A Quantitative Evaluation Method of Pseudonym Update by Using Re-identification Rate,
IPSJ Journal, Vol.60, No.9, pp.1509-1517 (September 2019). (in Japanese)
-
Favian Dewanta and Masahiro Mambo,
A Mutual Authentication Scheme for Secure Fog Computing Service Handover in Vehicular Network Environment,
IEEE Access, Vo.7, Issue 1, pp.103095-103114 (December 2019).
Fiscal year 2020
-
Kyi Thar Ko, Htet Htet Hlaing, Masahiro Mambo,
A PEKS-based NDN for Name Privacy,
Future Internet, Vol.12, No.8, Article 130, MDPI (July 31, 2020).
https://doi.org/10.3390/fi12080130
-
Favian Dewanta, Masahiro Mambo,
BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain
Approach,
IEEE Trans. on Vehicular Technology, Vol. 70, No. 2, pp. 1752-1769, IEEE (February, 2021).
https://doi.org/10.1109/TVT.2021.3051258
Fiscal year 2021
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo,
Designated-ciphertext Searchable Encryption,
Journal of Information Security and Applications,
Elsevier, Vol.58, Article 102709 (May 2021).
https://doi.org/10.1016/j.jisa.2020.102709
-
Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo,
Secure Content Distribution with Access Control Enforcement in Named
Data Networking,
Sensors, Vol.21, No.13, Article 4477, MDPI (June 30, 2021).
https://doi.org/10.3390/s21134477
Fiscal year 2022
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen,
Quantum-resistant anonymous identity-based encryption with traceable identities,
IET Information Security, Vol.16, No.2, Wiley, pp.111-126 (March 2022).
https://doi.org/10.1049/ise2.12049
-
Jan Wantoro, Masahiro Mambo,
Efficient and Privacy-Preserving Certificate Activation for V2X
Pseudonym Certificate Revocation,
Journal of Sensor and Actuator Networks, MDPI, Vol.11, Issue 3, Article
51 (September 1, 2022).
https://doi.org/10.3390/jsan11030051
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo,
Identity-certifying Authority-aided Identity-based Searchable Encryption
Framework in Cloud Systems,
IEEE Systems Journal, Volume 16, Issue 3, pp.4629-4640 (September 2022).
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen,
Public-key Authenticated Encryption with Keyword Search: A Generic
Construction and Its Quantum-resistant Instantiation,
The Computer Journal, Vol. 65, No. 10, pp.2828-2844 (2022).
-
Hendra Kurniawan, Masahiro Mambo,
Homomorphic Encryption-based Federated Privacy Preservation for Deep
Active Learning,
Entropy, MDPI, Vol.24, No.11, Article 1545 (2022).
https://doi.org/10.3390/e24111545
-
Danu Dwi Sanjoyo, Masahiro Mambo,
Accountable Bootstrapping based on Attack Resilient Public Key
Infrastructure and Secure Zero Touch Provisioning,
IEEE Access, Vol.10, pp.134086-134112, 2022.
DOI: 10.1109/ACCESS.2022.3231015
Fiscal year 2023
-
Hendra Kurniawan, Masahiro Mambo,
A Reliable Application of MPC for Securing the Tri-training Algorithm,
IEEE Access, Vol.11, pp.34718-34735, 2023.
https://doi.org/10.1109/ACCESS.2023.3264903
-
Keita Emura. Generic construction of fully anonymous broadcast
authenticated encryption with keyword search with adaptive corruptions.
IET Information Security, 2023:9922828:1-9922828:12, 2023.
https://doi.org/10.1049/2023/9922828
-
Hari Purnama, Masahiro Mambo.
IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments.
Sensors 2024, 24(3), 979.
-
Keita Emura.
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 107(3): 248-259 (2024)
-
Kyoichi Asano, Keita Emura, Atsushi Takayasu.
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 107(3): 260-274 (2024)
Fiscal year 2024
-
Kota Chin, Keita Emura, Shingo Sato, Kazumasa Omote.
A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage.
IEICE Transactions on Information and Systems. 107(5): 615-624 (2024)
-
Keita Emura, Kaisei Kajita, Go Ohtake:
Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with
Sublinear Ciphertexts.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 107(9): 1465-1477 (2024)
-
Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems.
Computer Standards & Interfaces 89: 103817 (2024)
-
Chen Wang, Zi-Yuan Liu, Masahiro Mambo. On the Proof of Ownership of
Digital Wallets
Cryptography 2024, 8(4), 57
-
Kota Chin, Keita Emura, Kazumasa Omote. An anonymous yet accountable
contract wallet system using account abstraction
Journal of Information Security and Applications 89(103978) 2025
-
Shuntaro Ema, Yuta Sato, Hinata Nishino, Keita Emura, Toshihiro Ohigashi
Implementation and Evaluation of an Identity-based Encryption with Security Against the KGC
Journal of Information Processing 33 185-196, 2025
Fiscal year 2025
-
Keita Emura. Generic Construction of Dual-Server Public Key Authenticated Encryption With Keyword Search
IET Information Security 2025 6610587:1-6610587:14
-
Keita Emura. On the Feasibility of Identity-Based Encryption with Equality Test against Insider Attacks from Weaker Assumptions.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 108(9): 1128-1138 (2025)
-
Keita Emura. Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 108(9): 1152-1163 (2025)
-
Keita Emura: Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key, Revisited: Consistency, Outsider Strong Unforgeability, and Generic Construction. IACR Communications in Cryptology,. 2(3): 17, 2025
-
Keita Emura. Comments on "Blockchain-Assisted Public-Key Encryption With Keyword Search Against Keyword Guessing Attacks for Cloud Storage"
IEEE Transactions on Cloud Computing 13(4) 1498-1499, 2025
-
Keita Emura: On the Traceability of Group Signatures: Uncorrupted User Must Exist.
Theoretical Computer Science, Volume 1073, May 2026, 115898
Fiscal year 2026
-
Mizuki Hayashi, Keita Emura: Security analysis on a public-key inverted-index keyword search scheme with designated tester.
Journal of Information Security and Applications,98: 104410, May 2026