お知らせ: セキュアシステム研究部門は、2015年4月1日に改組・統合され、情報技術研究部門になりました。
以下のページ内容は、原則として2015年3月31日現在の内容となります。

セキュアシステム研究部門 (RISEC) について
産総研 > RISEC > RISECについて > 組織構成 > 次世代暗号研究グループ > 主な対外発表(査読付き国際学会及び論文誌)

主な対外発表(査読付き国際学会及び論文誌)

2011年〜2014年3月現在のもの。青斜体 は当研究グループのメンバー。

暗号基礎理論

  1. Kenneth G. Paterson, Jacob C. N. Schuldt, Dale L. Sibborn, "Related Randomness Attacks for Public Key Encryption", (PKC2014)
  2. T. Matsuda, G. Hanaoka, "Chosen Ciphertext Security via UCE", (PKC2014)
  3. T. Matsuda, G. Hanaoka, "Chosen Ciphertext Security via Point Obfuscation", (TCC2014)
  4. T. Matsuda, "On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations", (TCC2014)
  5. T. Yamakawa, S. Yamada, T. Matsuda, G. Hanaoka, N. Kunihiro, "Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism", (ASIAPKC2013)
  6. T. Matsuda, G. Hanaoka, "Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption", (IWSEC2013)
  7. T. Matsuda, G. Hanaoka, "Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited", (PKC2013)
  8. K. Nuida, G. Hanaoka, "On the security of pseudorandomized information-theoretically secure schemes", (IEEE Transactions on Information Theory, vol.59, no.1 2013.)
  9. G. Hanaoka, T. Matsuda, J.C.N. Schuldt, "On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups", (CRYPTO2012)
  10. T. Matsuda, G. Hanaoka, K. Matsuura, "Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms", (PKC2012)
  11. Y. Sakemi, G. Hanaoka, T. Izu, M. Takenaka, and M. Yasuda, "Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-bit Elliptic Curve", (PKC2012)
  12. K. Nuida, T. Abe, S. Kaji, T. Maeno, Y. Numata, "A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators", (IWSEC2011)
  13. M.J. Mihaljevic and H. Imai, "An Information-Theoretic and Computational Complexity Security Analysis of a Randomized Stream Cipher Model", (WEWoRC2011)
  14. T. Matsuda, K. Matsuura, "On Black-Box Separations among Injective One-Way Functions", (TCC2011)
  15. T. Matsuda, K. Matsuura, "Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks", (PKC2011)
  16. Y. Sakai, G. Hanaoka, K. Kurosawa, K. Ohta, "How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model", (IEICE Transactions 94-A, 2011)

高機能暗号技術、電子署名

  1. N. Attrapadung, "Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More", (EUROCRYPT2014).
  2. Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Jacob C. N. Schuldt, "Group signature implies public-key encryption with non-interactive opening", (Int. J. Inf. Sec. 13(1), 2014.)
  3. S. Yamada, N. Attrapadung, G. Hanaoka, N. Kunihiro, "A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption", (PKC2014).
  4. T. Kitagawa, H. Kojima, N. Attrapadung, H. Imai, "Efficient and Fully Forward-Secure Ciphertext-Policy Attribute-Based Encryption", (ISC2013).
  5. K. Ohara, Y. Sakai, K. Emura, G. Hanaoka, "A Group Signature Scheme with Unbounded Message-Dependent Opening", (ASIACCS2013)
  6. N. Attrapadung, B. Libert, T. Peters, "Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures", (PKC2013).
  7. K. Emura, G. Hanaoka, G. Ohtake, T. Matsuda, S. Yamada, "Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption", (PKC2013)
  8. N. Attrapadung, B. Libert, "Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation", (Journal of Mathematical Cryptology 5(2), 2012).
  9. K. Kasamatsu, T. Matsuda, G. Hanaoka, H. Imai, "Ciphertext Policy Multi-dimensional Range Encryption", (ICISC2012)
  10. N. Attrapadung, B. Libert, T. Peters, "Computing on Authenticated Data: New Privacy Definitions and Constructions", (ASIACRYPT2012)
  11. M.J. Mihaljevic, "An Approach for Light-Weight Encryption Employing Dedicated Coding", (IEEE GLOBECOM2012)
  12. K. Kasamatsu, T. Matsuda, K. Emura, N. Attrapadung, G. Hanaoka, Hideki Imai, “Time-Specific Encryption from Forward-Secure Encryption”, (SCN2012)
  13. S. Yamada, G. Hanaoka, N. Kunihiro, "Space Efficient Signature Schemes from the RSA Assumption", (PKC2012)
  14. S. Yamada, N. Attrapadung, B. Santoso, G. Hanaoka, J.C.N. Schuldt, N. Kunihiro, "Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication", (PKC2012)
  15. Y. Sakai, J.C.N. Schuldt, K. Emura, G. Hanaoka, K. Ohta, "On the Security of Dynamic Group Signatures", (PKC2012)
  16. Y. Sakai, K. Emura, G. Hanaoka, Y. Kawai, T. Matsuda, K. Omote, "Group Signatures with Message-Dependent Opening", (Pairing2012)
  17. G. Hanaoka, Y. Kawai, N. Kunihiro, T. Matsuda, J. Weng, R. Zhang, Y. Zhao, "Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption", (CT-RSA2012)
  18. N. Attrapadung, J. Herranz, F. Laguillaumie, B. Libert, E. Panafieu, C. Ràfols, "Attribute-based encryption schemes with constant-size ciphertexts", (Theor. Comput. Sci. 422, 2012)
  19. K.G. Paterson, J.C.N. Schuldt, M.S.S. Thomson, "On the Joint Security of Encryption and Signature, Revisited", (ASIACRYPT2011)
  20. M.J. Mihaljevic, H. Imai, M. David, K. Kobara and H. Watanabe, "On Advanced Cryptographic Techniques for Information Security of Smart Grid AMI", (CSIIRW2011)
  21. D. Chiba, T. Matsuda, J.C.N. Schuldt, K. Matsuura, "Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting", (ACNS2011)
  22. J.C.N. Schuldt, G. Hanaoka, "Non-transferable User Certification Secure against Authority Information Leaks and Impersonation Attacks", (ACNS2011)
  23. Y. Sakai, K. Emura, G. Hanaoka, Y. Kawai, K. Omote, "Towards Restricting Plaintext Space in Public Key Encryption", (IWSEC2011)
  24. J. Weng, Y. Zhao, G. Hanaoka, "On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010", (PKC2011)
  25. S. Yamada, N. Attrapadung, G. Hanaoka, N. Kunihiro, "Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption", PKC(2011)
  26. J.C.N. Schuldt, K. Matsuura, "On-line Non-transferable Signatures Revisited", (PKC2011)
  27. N. Attrapadung, B. Libert, "Homomorphic Network Coding Signatures in the Standard Model", (PKC2011)
  28. N. Attrapadung, B. Libert, E. Panafieu, "Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts", (PKC2011)
  29. M.J. Mihaljevic, H. Imai, "Employment of Homophonic Coding for Improvement of Certain Encryption Approaches Based on the LPN Problem", (SKEW2011)
  30. G. Hanaoka, S. Hirose, A. Miyaji, K. Miyazaki, B. Santoso, P. Yang, "Sequential Bitwise Sanitizable Signature Schemes", (IEICE Transactions 94-A, 2011)
  31. B. Santoso, K. Ohta, K. Sakiyama, G. Hanaoka, "An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness", (IEICE Transactions 94-A, 2011)
  32. R. Dowsley, J.M. Quade, A. Otsuka, G. Hanaoka, H. Imai, A.C.A. Nascimento, "Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data", (IEICE Transactions 94-A, 2011)
  33. A. Fujii, G. Ohtake, G. Hanaoka, N. Attrapadung, H. Watanabe, K. Ogawa, H. Imai, "Secure Broadcast System with Simultaneous Individual Messaging", (IEICE Transactions 94-A, 2011)