2011年度
-
Naoto YANAI, Eikoh CHIDA, Masahiro MAMBO,
A Secure Structured Multisignature Scheme Based on a Non-Commutative
Ring Homomorphism,
IEICE Trans. on Fundamentals, Vol.E94-A, No.6, pp.1346-1355, June 2011.
-
秋山浩岐, 満保雅浩, 岡本栄司,
検索クエリ中のワイルドカードを秘匿する隠れベクトル暗号システム,
情報処理学会論文誌, Vol.52, No.9, pp.2662-2673, September 2011.
-
Lihua Wang, Lichen Wang, Masahiro Mambo, Eiji Okamoto,
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical
Confidentialities,
IEICE Trans. on Fundamentals, Vol.E95-A, No.1, pp.70-88, January 2012.
-
Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto,
A Certificateless Ordered Sequential Aggregate Signature Scheme Secure
against Super Adversaries,
Journal of Wireless Mobile Networks, Ubiquitous Computing, and
Dependable Applications (JoWUA), ISYOU, Vol.3, No.1/2, pp.30-54, March
2012.
2012年度
-
小久保 博崇, 金岡晃, 満保雅浩, 岡本栄司,
攻撃通信検知のための合成型機械学習手法の一検討,
情報処理学会論文誌, Vol.53, No.9, pp.2086-2093, September 2012.
2013年度
-
Manh Ha Nguyen, Kenji Yasunaga, Keisuke Tanaka,
Leakage-resilience of stateless/stateful public-key encryption from hash
proofs,
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, volume E96-A, No.6, pp.1100-1111, June 2013.
-
Kenji Yasunaga,
List decoding of Reed-Muller codes based on a generalized Plotkin
construction,
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, Vol.E96-A, No.7, pp.1662-1666, July 2013.
-
Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura,
Licheng Wang,
Certificate-based proxy decryption systems with revocability in the
standard model,
Information Sciences, Vol.247, pp.188-201, Elsevier, October 20, 2013.
-
Hitoshi Namiki, Keisuke Tanaka, Kenji Yasunaga,
Randomness leakage in the KEM/DEM frame-work,
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, Vol. E97-A, No.1, pp.191-199, January 2014.
2014年度
-
Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto,
A CDH-based Ordered Multisignature Scheme Provably Secure without Random
Oracles,
Journal of Information Processing, Vol.22, No.2, pp.366-375, April 15,
2014.
-
坂井俊亮, 満保雅浩,
画像認証における秘密情報の横流し耐性実験:ランダムアートを中心として,
電子情報通信学会和文論文誌 D, Vol.J97-D, No.5, pp.944-952, May 2014.
-
Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, Kenji
Yasunaga,
Post-challenge leakage resilient public-key cryptosystem in split state
model,
IEICE Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, Vol.E98-A, No.3, pp.853-862, March 2015.
2015年度
-
Chien-Ming Chen, Tsu-Yang Wu, Raylin Tso, Masahiro Mambo, Mu-En Wu,
On the Security of a User Equipment Registration Procedure in
Femtocell-Enabled Networks,
Journal of Universal Computer Science, Vol.21, No.3, pp.406-418, 2015.
-
Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng,
Certificateless aggregate signature with efficient verification,
Security and Communication Networks, John Wiley & Sons, Vol.8, Issue
13, pp.2232-2243, September 2015.
-
K. Yasunaga,
Public-key encryption with lazy parties,
IEICE Transactions on Fundamentals, E99-A(2),pp.590-600, 2016.2.
2016年度
-
Toshifumi Nishinaga, Masahiro Mambo,
Implementation of μNaCl on 32-bit ARM Cortex-M0,
IEICE Trans. Info&Systems, Vol.E99-D, No.8, pp.2056-2060 (August 1,
2016).
Special Issue: Security, Privacy and Anonymity of Internet of Things
-
Abdul Wahid, Masahiro Mambo,
Implementation of Certificateless Signcryption based on Elliptic Curve
Using Javascript,
International Journal of Computing and Informatics (IJCANDI), Vo.1,
No.3, pp.90-100 (August 2016).
-
平岩啓, 満保雅浩,
無線LAN情報の認証への応用の検討,
電子情報通信学会和文論文誌 D, Vol.J99-D, No.10, pp.1034-1044 (October
2016).
ライフインテリジェンスとオフィス情報システム特集
2017年度
-
Rodrigo Roman, Javier Lopez, Masahiro Mambo,
Mobile edge computing, Fog et al.: A survey and analysis of security
threats and challenges,
Future Generation Computer Systems, Elsevier, Volume 78, Part 2,
pp.680-698 (January 2018).
-
So Higashikawa, Tomoaki Kosugi, Shogo Kitajima, Masahiro Mambo,
Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern
Lock,
IEICE Trans. Info&Systems, Vol.E101-D, No.1, pp.45-52 (January, 2018).
-
A. Kawachi, Y. Okamoto, K. Tanaka, K. Yasunaga,
General constructions of rational secret sharing with expected
constant-round reconstruction,
The Computer Journal, 60(5), pp.711-728, 2017.5.
2019年度
-
Dedi Gunawan, Masahiro Mambo,
Data Anonymization for Hiding Personal Tendency in Set-valued Database
Publication,
Future Internet, MDPI, Vol.11, Issue 6, Article 138, 16 pages (June 20,
2019).
-
福嶋雄也, 北島祥伍, 満保雅浩,
仮名の再同定率に基づく仮名更新頻度の定量的評価,
情報処理学会論文誌, Vol.60, No.9, pp.1509-1517 (September 2019).
-
Favian Dewanta and Masahiro Mambo,
A Mutual Authentication Scheme for Secure Fog Computing Service Handover
in Vehicular Network Environment,
IEEE Access, Vo.7, Issue 1, pp.103095-103114 (December 2019).
2020年度
-
Kyi Thar Ko, Htet Htet Hlaing, Masahiro Mambo,
A PEKS-based NDN for Name Privacy,
Future Internet, Vol.12, No.8, Article 130, MDPI (July 31, 2020).
https://doi.org/10.3390/fi12080130
-
Favian Dewanta, Masahiro Mambo,
BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for
Rural Area Based on Blockchain Approach,
IEEE Trans. on Vehicular Technology, Vol. 70, No. 2, pp. 1752-1769, IEEE
(February, 2021).
https://doi.org/10.1109/TVT.2021.3051258
2021年度
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo,
Designated-ciphertext Searchable Encryption,
Journal of Information Security and Applications, Elsevier, Vol.58,
Article 102709 (May 2021).
https://doi.org/10.1016/j.jisa.2020.102709
-
Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo,
Secure Content Distribution with Access Control Enforcement in Named
Data Networking,
Sensors, Vol.21, No.13, Article 4477, MDPI (June 30, 2021).
https://doi.org/10.3390/s21134477
2022年度
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen,
Quantum-resistant anonymous identity-based encryption with traceable identities,
IET Information Security, Vol.16, No.2, Wiley, pp.111-126 (March 2022).
https://doi.org/10.1049/ise2.12049
-
Jan Wantoro, Masahiro Mambo,
Efficient and Privacy-Preserving Certificate Activation for V2X
Pseudonym Certificate Revocation,
Journal of Sensor and Actuator Networks, MDPI, Vol.11, Issue 3, Article
51 (September 1, 2022).
https://doi.org/10.3390/jsan11030051
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo,
Identity-certifying Authority-aided Identity-based Searchable Encryption
Framework in Cloud Systems,
IEEE Systems Journal, Volume 16, Issue 3, pp.4629-4640 (September 2022).
-
Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen,
Public-key Authenticated Encryption with Keyword Search: A Generic
Construction and Its Quantum-resistant Instantiation,
The Computer Journal, Vol. 65, No. 10, pp.2828-2844 (2022).
-
Hendra Kurniawan, Masahiro Mambo,
Homomorphic Encryption-based Federated Privacy Preservation for Deep
Active Learning,
Entropy, MDPI, Vol.24, No.11, Article 1545 (2022).
https://doi.org/10.3390/e24111545
-
Danu Dwi Sanjoyo, Masahiro Mambo,
Accountable Bootstrapping based on Attack Resilient Public Key
Infrastructure and Secure Zero Touch Provisioning,
IEEE Access, Vol.10, pp.134086-134112, 2022.
DOI: 10.1109/ACCESS.2022.3231015
2023年度
-
Hendra Kurniawan, Masahiro Mambo,
A Reliable Application of MPC for Securing the Tri-training Algorithm,
IEEE Access, Vol.11, pp.34718-34735, 2023.
https://doi.org/10.1109/ACCESS.2023.3264903
-
Keita Emura. Generic construction of fully anonymous broadcast
authenticated encryption with keyword search with adaptive corruptions.
IET Information Security, 2023:9922828:1-9922828:12, 2023.
https://doi.org/10.1049/2023/9922828
-
Hari Purnama, Masahiro Mambo.
IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments.
Sensors 2024, 24(3), 979.
-
Keita Emura.
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 107(3): 248-259 (2024)
-
Kyoichi Asano, Keita Emura, Atsushi Takayasu.
More Efficient Adaptively Secure Lattice-based IBE with Equality Test in the Standard Model.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 107(3): 260-274 (2024)
2024年度
-
Kota Chin, Keita Emura, Shingo Sato, Kazumasa Omote.
A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage.
IEICE Transactions on Information and Systems. 107(5): 615-624 (2024)
-
Keita Emura, Kaisei Kajita, Go Ohtake:
Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with
Sublinear Ciphertexts.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 107(9): 1465-1477 (2024)
-
Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng:
Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing
systems.
Computer Standards & Interfaces 89: 103817 (2024)
-
Chen Wang, Zi-Yuan Liu, Masahiro Mambo. On the Proof of Ownership of
Digital Wallets
Cryptography 2024, 8(4), 57
-
Kota Chin, Keita Emura, Kazumasa Omote. An anonymous yet accountable
contract wallet system using account abstraction
Journal of Information Security and Applications 89(103978) 2025
-
Shuntaro Ema, Yuta Sato, Hinata Nishino, Keita Emura, Toshihiro Ohigashi
Implementation and Evaluation of an Identity-based Encryption with Security Against the KGC
Journal of Information Processing 33 185-196, 2025