@article{CTT100861876, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa}, title = {Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK}, journal = {IEICE Trans. on Fundamentals}, year = 2022, } @article{CTT100841656, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa and Ryo Kuwayama}, title = {CCA-Secure Leakege-Resilient Identity-Based Encryption without q-Type Assumptions}, journal = {IEICE Trans. on Fundamentals}, year = 2020, } @article{CTT100789808, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {No-Dictionary Searchable Symmetric Encryption}, journal = {IEICE Trans. on Fundamentals}, year = 2019, } @article{CTT100645150, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {Undeniable and Unpretendable Signatures}, journal = {IEICE Trans. on Fundamentals}, year = 2012, } @article{CTT100597734, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes}, journal = {IEICE Trans. on Fundamentals}, year = 2010, } @article{CTT100446080, author = {K.Okada and K.Kurosawa}, title = {MDS secret sharing scheme secure against cheaters}, journal = {IEEE Trans. on IT}, year = 2000, } @article{CTT100446081, author = {S.Obana and K.Kurosawa}, title = {``Combinatorial classification of optimal authentication codes with arbitration}, journal = {Designs, Codes and Cryptography}, year = 2000, } @article{CTT100446079, author = {K.Kurosawa and F.Sato and T.Sakata and W.Kishimoto}, title = {A relatiohship between linear complexity and k-error linear complexity}, journal = {IEEE Trans. on IT}, year = 2000, } @article{CTT100433112, author = {K. Kurosawa and T. Yoshida}, title = {Strongly universal hashing and identification codes via channels}, journal = {IEEE Trans. on IT}, year = 1999, } @article{CTT100433108, author = {T. Satoh and M. Haga and K. Kurosawa}, title = {Towards secure and fast hash functions}, journal = {IEICE, Trans.E82-A}, year = 1999, } @article{CTT100433109, author = {Y. Desmedt and K. Kurosawa}, title = {Practical and proven zero knwoledge constant round variant of GQ and Schnorr}, journal = {IEICE, Trans.E82-A}, year = 1999, } @article{CTT100433110, author = {T. Satoh and K. Kurosawa}, title = {Highly nonlinear vector Boolean functions}, journal = {IEICE, Trans.E82-A}, year = 1999, } @article{CTT100433114, author = {T. Iwata and K. Kurosawa}, title = {Probabilistic higher order differential attack and higher order bent functions}, journal = {Proc. of Asiacrypt'99, LNCS 1716, Springer Verlag}, year = 1999, } @article{CTT100433113, author = {T. Satoh and T. Iwata and K. Kurosawa}, title = {On cryptographically secure vectorial Boolean functions}, journal = {Proc. of Asiacrypt'99, LNCS 1716, Springer Verlag}, year = 1999, } @article{CTT100634781, author = {K. Kurosawa and Wakaha Ogata}, title = {Efficient Rabin-type Digital Signature Scheme}, journal = {Designs, Codes and Cryptography}, year = 1999, } @article{CTT100634783, author = {Carlo Blundo and Alfredo De Santis and K. Kurosawa and Wakaha Ogata}, title = {Fallacious Bound for Authentication Codes}, journal = {Journal of Cryptology}, year = 1999, } @article{CTT100438752, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Some Basic Properties of General Nonperfect Secret Sharing Schemes}, journal = {Journal of Universal Computer Science}, year = 1998, } @article{CTT100438751, author = {K.Okada and W.Ogata and K.Sakano and K.Kurosawa}, title = {Analysis on Secret Sharing Schemes with Non-Graphical Access Structures}, journal = {IEICE Transaction}, year = 1997, } @article{CTT100438750, author = {Kaoru Kurosawa and Yutaka Katayama and Wakaha OGATA}, title = {Reshufflable and Laziness Tolerant Mental Card Game Protocol}, journal = {IEICE Transaction}, year = 1997, } @article{CTT100438764, author = {Wakaha OGATA and Keiichi SAKANO and Kaoru KUROSAWA}, title = {Multisymbol Majority Vote and Hard Core}, journal = {Information Processing Letters}, year = 1996, } @article{CTT100438749, author = {Kaoru Kurosawa and Wakaha Ogata and Shigeo Tsujii}, title = {4-move Perfect ZKIP for Some Promise Problem}, journal = {IEICE Transaction}, year = 1995, } @article{CTT100438748, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {On claw free families}, journal = {IEICE Transaction}, year = 1994, } @inproceedings{CTT100826582, author = {冨田斗威 and 尾形わかは and 黒澤馨}, title = {選択暗号文攻撃に対してoptimally leakage-resilientなIDベース暗号}, booktitle = {暗号と情報セキュリティシンポジウム予稿集}, year = 2020, } @inproceedings{CTT100810554, author = {Toi Tomita and Wakaha Ogata and Kaoru Kurosawa}, title = {CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions}, booktitle = {}, year = 2019, } @inproceedings{CTT100789807, author = {冨田斗威 and 尾形わかは and 黒澤馨}, title = {標準的な仮定のもとでleakage resilient かつCCA安全なIDベースKEM}, booktitle = {暗号と情報セキュリティシンポジウム予稿集}, year = 2019, } @inproceedings{CTT100792796, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Efficient no-dictionary verifiable searchable symmetric encryption}, booktitle = {Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)}, year = 2017, } @inproceedings{CTT100608166, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {Provably Secure Convertible Undeniable Signatures with Unambiguity}, booktitle = {Proc. of 7th International Conference, SCN 2010, LNCS Vol. 6280}, year = 2010, } @inproceedings{CTT100608160, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {Provably Secure Convertible Undeniable Signatures with Unambiguity}, booktitle = {Proceedings of the 2010 Simposium on Cryptography and Information Security}, year = 2010, } @inproceedings{CTT100588671, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes}, booktitle = {Progress in Cryptology -- AFRICACRYPT 2009, LNCS}, year = 2009, } @inproceedings{CTT100574750, author = {Le Trieu Phong and Kaoru Kurosawa and Wakaha Ogata}, title = {New RSA-Based (Selectively) Convertible Undeniable Signature Schemes}, booktitle = {暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009,3C1-1}, year = 2009, } @inproceedings{CTT100450035, author = {尾形わかは and 黒澤馨}, title = {安全性が証明可能な metering scheme}, booktitle = {暗号と情報セキュリティシンポジウム予稿集}, year = 2001, } @inproceedings{CTT100439495, author = {K.Kurosawa and W.Ogata and Toshihiko Matsuo and S.Makishima}, title = {IND-CCA Public Key Schemes Equivalent to Factoring N=pq}, booktitle = {Lecture Notes in Computer Science, Proc. of PKC2001}, year = 2001, } @inproceedings{CTT100439865, author = {板倉征男 and 岩田哲 and 尾形わかは and 黒澤馨 and 辻井重男}, title = {DNA情報を組み込んだ公開鍵暗号方式}, booktitle = {電子情報通信学会技術研究報告}, year = 2000, } @inproceedings{CTT100439859, author = {黒澤馨 and 尾形わかは}, title = {効率の良いRabin型デジタル署名方式}, booktitle = {暗号と情報セキュリティシンポジウム予稿集}, year = 1999, } @inproceedings{CTT100439096, author = {C.Blundo and A.De Santis and 黒澤 馨 and 尾形 わかは}, title = {認証コードのある下界の誤りとその訂正}, booktitle = {暗号と情報セキュリティシンポジウム予稿集}, year = 1998, } @inproceedings{CTT100439093, author = {尾形 わかは and 黒澤 馨 and Kazunori TAKATANI}, title = {(k,n)閾値匿名通信路とその応用}, booktitle = {暗号と情報セキュリティシンポジウム}, year = 1997, } @inproceedings{CTT100439493, author = {Wakaha OGATA and Kaoru KUROSAWA and Kazue Sako and Kazunori TAKATANI}, title = {Fault Tolerant Anonymous Channel}, booktitle = {Proc. of ICICS'97, Lecture Notes in Computer Science}, year = 1997, } @inproceedings{CTT100439092, author = {尾形わかは and 黒澤馨}, title = {不正者に対して最も安全な秘密分散共有法}, booktitle = {電子情報通信学会技術研究報告}, year = 1996, } @inproceedings{CTT100439492, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {Optimum Secret Sharing Scheme Secure against Cheating}, booktitle = {Proc. of Eurocrypt'96, Lecture Notes in Computer Science}, year = 1996, } @inproceedings{CTT100439491, author = {Kaoru Kurosawa and Satoshi Obana and Wakaha Ogata}, title = {t-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes}, booktitle = {Proc. of CRYPTO'95, Lecture Notes in Computer Science}, year = 1995, } @inproceedings{CTT100439091, author = {尾形 わかは and 黒澤 馨}, title = {Some new results on nonperfect secret sharing schemes}, booktitle = {電子情報通信学会技術研究報告}, year = 1995, } @inproceedings{CTT100439089, author = {黒澤 馨 and Y.Katayama and 尾形 わかは}, title = {Reshufflable and laziness tolerant mantal card game protocol}, booktitle = {応用数理学会平成6年度年会予稿集}, year = 1994, } @inproceedings{CTT100439490, author = {K.Kurosawa and K.Okada and K.Sakano and W.Ogata and S.Tsujii}, title = {Nonperfect Secret Sharing Schemes and Matroids}, booktitle = {Proc. of Eurocrypt'93, Lecture Notes in Computer Science}, year = 1993, } @inproceedings{CTT100439336, author = {尾形わかは and 阪野恵市 and 黒澤馨}, title = {Multivalued hard core}, booktitle = {暗号と情報セキュリティシンポジウム}, year = 1993, } @inproceedings{CTT100439337, author = {岡田光司 and 尾形わかは and 黒澤馨}, title = {An Optimal share size in a perfect secret sharing scheme}, booktitle = {暗号と情報セキュリティシンポジウム}, year = 1993, } @inproceedings{CTT100439338, author = {尾形わかは and 黒澤馨 and 辻井重男}, title = {Nonperfect secret sharing scheme}, booktitle = {暗号と情報セキュリティシンポジウム}, year = 1993, } @inproceedings{CTT100439489, author = {W.Ogata and K.Kurosawa and S.Tsujii}, title = {Nonperfect Secret Sharing Schemes}, booktitle = {Proc. of Auscrypt'92, Lecture Notes in Computer Science}, year = 1992, } @inproceedings{CTT100439541, author = {尾形わかは and 阪野恵市 and 黒澤馨}, title = {多値のハードコアのインバータ}, booktitle = {暗号と情報セキュリティシンポジウム予稿集}, year = 1992, } @inproceedings{CTT100439488, author = {Wakaha Ogata and Kaoru Kurosawa}, title = {On Claw free Families}, booktitle = {Proc. of Asiacrypt'91, Lecture Notes in Computer Science}, year = 1991, } @inproceedings{CTT100439487, author = {K.Kurosawa and Y.Katayama W.Ogata and Wakaha Ogata and S.Tsujii}, title = {General Public key residue cryptosystem and mental poker protocols}, booktitle = {Proc. of Eurocrypt'90, Lecture Notes in Computer Science}, year = 1990, } @inproceedings{CTT100439540, author = {黒澤馨 and 尾形わかは and 伊東利哉 and 辻井重男}, title = {4-move zero-knowledge interactive proof systems}, booktitle = {電子情報通信学会技術研究報告}, year = 1990, } @inproceedings{CTT100439537, author = {黒澤馨 and 尾形わかは and 辻井重男}, title = {2 move ゼロ知識証明}, booktitle = {電子情報通信学会技術研究報告}, year = 1990, } @inproceedings{CTT100439538, author = {黒澤馨 and 尾形わかは and 辻井重男}, title = {4 move ゼロ知識証明}, booktitle = {電子情報通信学会技術研究報告}, year = 1990, } @inproceedings{CTT100439539, author = {尾形わかは and 黒澤馨}, title = {Claw free familyの構成法}, booktitle = {電子情報通信学会技術研究報告}, year = 1990, } @inproceedings{CTT100439536, author = {黒澤馨 and 板倉わかは and 片山裕}, title = {多次剰余のゼロ知識証明とそのmental pokerへの応用}, booktitle = {第12回情報理論とその応用シンポジウム予稿集}, year = 1989, } @inproceedings{CTT100439496, author = {片山裕 and 板倉わかは and 黒澤馨}, title = {ゼロ知識証明における通信量の削減について}, booktitle = {電子情報通信学会技術研究報告}, year = 1989, } @misc{CTT100595155, author = {Kaoru Kurosawa}, title = {通信網の構成とフロー問題に関する研究}, year = 1976, } @mastersthesis{CTT100595155, author = {Kaoru Kurosawa}, title = {通信網の構成とフロー問題に関する研究}, school = {東京工業大学}, year = 1976, }