|
田中圭介 研究業績一覧 (369件)
論文
-
Hiroki Yamamuro,
Keisuke Hara,
Masayuki Tezuka,
Yusuke Yoshida,
Keisuke Tanaka.
Forward Secure Message Franking with Updatable Reporting Tags,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
106,
9,
pp. 1164-1176,
Jan. 2023.
-
Yi Lu,
Keisuke Hara,
Keisuke Tanaka.
Multikey Verifiable Homomorphic Encryption.,
IEEE Access,
10,
Aug. 2022.
-
Fuyuki Kitagawa,
Ryo Nishimaki,
Keisuke Tanaka:.
Obfustopia Built on Secret-Key Functional Encryption,
Journal of Cryptology,
35,
June 2022.
-
Pengfei Wang,
Xiangyu Su,
Maxim Jourenko,
Zixian Jiang,
Mario Larangeira,
Keisuke Tanaka.
Environmental Adaptive Privacy Preserving Contact Tracing System: A Construction From Public Key Rerandomizable BLS Signatures.,
IEEE Access,
Vol. 10,
37181 - 37199,
Apr. 2022.
-
Keisuke Hara,
Takahiro Matsuda,
Keisuke Tanaka.
Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Volume E105,
Issue 3,
Page 160-172,
Mar. 2022.
-
Keisuke Hara,
Takahiro Matsuda,
Goichiro Hanaoka,
Keisuke Tanaka.
Generic transformation from broadcast encryption to round-optimal deniable ring authentication,
Designs, Codes and Cryptography,
Vol. 90,
277–316,
Feb. 2022.
-
Fuyuki Kitagawa,
Takahiro Matsuda,
Keisuke Tanaka.
CCA Security and Trapdoor Functions via Key-Dependent-Message Security,
Journal of Cryptology,
35,
Feb. 2022.
-
Xiangyu Su,
Mario Larangeira,
Keisuke Tanaka.
How to Prove Work: With Time or Memory.,
IEEE Access,
Vol. 10,
1192 - 1201,
Dec. 2021.
-
Keisuke Hara,
Keisuke Tanaka.
Tightly secure ring signatures in the standard model,
Theoretical Computer Science,
Volume 892,
Page 208-237,
Sept. 2021.
-
Kyohei Sudo,
Masayuki Tezuka,
Keisuke Hara,
Yusuke Yoshida,
Keisuke Tanaka.
Watermarkable Signature with Computational Function Preserving,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
E104.,
9,
pp. 1255-1270,
Sept. 2021.
-
Yi Lu,
Keisuke Hara,
Keisuke Tanaka.
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
E104,
9,
pp. 1206-1218,
Sept. 2021.
-
Fuyuki Kitagawa,
Ryo Nishimaki,
Keisuke Tanaka.
Simple and Generic Constructions of Succinct Functional Encryption,
Journal of Cryptology,
Vol. 34,
May 2021.
-
Shohei Egashira,
Yuyu Wang,
Keisuke Tanaka.
Fine-Grained Cryptography Revisited,
Journal of Cryptology,
Vol. 34,
No. 3,
May 2021.
-
Masayuki Tezuka,
Keisuke Tanaka.
Redactable Signature with Compactness from Set-Commitment,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
E104,
9,
1175-1187,
Jan. 2021.
-
KEISUKE TANAKA,
Keisuke Hara.
Ring Signature With Unconditional Anonymity in the Plain Model,
IEEE Access,
Vol. 9,
pp. 7762-7774,
Jan. 2021.
-
KEISUKE TANAKA,
Keisuke Hara,
Fuyuki Kitagawa,
Takahiro Matsuda,
Goichiro Hanaoka.
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions,
Theoretical Computer Science,
Volume 795,
Page 570-597,
Nov. 2019.
-
KEISUKE TANAKA,
Kotoko YAMADA,
Nuttapong ATTRAPADUNG,
Keita EMURA,
Goichiro HANAOKA.
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Volume E101.A,
No. 9,
Page 1456-1472,
Sept. 2018.
-
Yuyu WANG,
KEISUKE TANAKA.
Generic Transformation for Signatures in the Continual Leakage Model,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E100-A,
No. 9,
pp. 1857-1869,
Sept. 2017.
-
KEISUKE TANAKA,
Ai ISHIDA,
Keita EMURA,
Goichiro HANAOKA,
Yusuke SAKAI .
Group Signature with Deniability: How to Disavow a Signature,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E100-A,
No. 9,
pp. 1825-1837,
Sept. 2017.
-
KEISUKE TANAKA,
Ta Minh Thanh,
Luu Hong Dung,
Nguyen Tuan Tai,
Hai Nguyen Nam.
Performance analysis of robust watermarking using linear and nonlinear feature matching,
Multimedia Tools and Applications,
Volume 77,
No. 2,
pp. 2901–2920,
Feb. 2017.
-
KEISUKE TANAKA,
AKINORI KAWACHI,
Yoshio Okamoto,
Kenji Yasunaga.
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction,
THE COMPUTER JOURNAL,
Volume 60,
5,
711-728,
Dec. 2016.
-
Yuyu Wang,
Zongyang Zhang,
Takahiro Matsuda,
Goichiro Hanaoka,
Keisuke Tanaka.
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones,
Cryptology ePrint Archive,
Dec. 2016.
-
KEISUKE TANAKA,
Thanh Minh Ta.
The novel and robust watermarking method based on q-logarithm frequency domain,
Multimedia Tools and Applications,
Volume 75,
No. 18,
pp. 11097–11125,
Sept. 2016.
-
KEISUKE TANAKA,
Thanh Minh Ta.
An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information,
Multimedia Tools and Applications,
Vol. 76,
Number 11,
pp. 13455–13471,
June 2016.
-
Yuyu Wang,
KEISUKE TANAKA.
Generic transformations for existentially unforgeable signature schemes in the bounded leakage model,
Security and Communication Networks,
Volume 9,
No. 12,
pp. 1829-1842,
Feb. 2016.
-
KEISUKE TANAKA,
Ai Ishida,
Keita Emura,
Goichiro Hanaoka,
Yusuke Sakai.
Disavowable Public Key Encryption with Non-Interactive Opening,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E98-A,
No. 12,
pp. 2446-2455,
Dec. 2015.
-
田中圭介,
南雲.
検証委託署名に対する安全性について,
電子情報通信学会論文誌A,
Vol. J98-A,
No. 6,
pp. 417-426,
June 2015.
-
Yuyu Wang,
KEISUKE TANAKA.
Strongly simulation-extractable leakage-resilient NIZK,
International Journal of Information Security,
Volume 15,
No. 1,
pp. 67–79,
May 2015.
-
KEISUKE TANAKA,
Eiichiro Fujisaki,
AKINORI KAWACHI,
Ryo Nishimaki,
Kenji Yasunaga.
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E98-A,
No. 3,
pp. 853-862,
Mar. 2015.
-
KEISUKE TANAKA,
Pham Thanh Hiep,
Ta Minh Tam.
Robust semi-blind video watermarking based on frame-patch matching,
International Journal of Electronics and Communications,
Vol. 68,
No. 10,
pp. 1007-1015,
Oct. 2014.
-
KEISUKE TANAKA,
Hitoshi Namiki,
Kenji Yasunaga.
Randomness Leakage in the KEM/DEM Framework,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E97-A,
No. 1,
pp. 191-199,
Jan. 2014.
-
KEISUKE TANAKA,
Manh Ha Ngyuyen,
Kenji Yasunaga.
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E96-A,
No. 6,
pp. 1100-1111,
June 2013.
-
KEISUKE TANAKA,
Tatsuya Akutsu,
Daiji Fukagawa,
Magnús M. Halldórsson,
Atsuhiro Takasu.
Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees,
Theoretical Computer Science,
Vol. 470,
pp. 10-22,
Jan. 2013.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
An Efficient Non-interactive Universally Composable String-Commitment Scheme,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E95-A,
No. 1,
pp. 167-175,
Jan. 2012.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
A Multi-Trapdoor Commitment Scheme from the RSA Assumption,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E95-A,
No. 1,
pp. 176-184,
Jan. 2012.
-
KEISUKE TANAKA,
Mario Larangeira.
Programmability in the Generic Ring and Group Models,
Journal of Internet Services and Information Security,
Vol. 1,
No. 2/3,
pp. 57-73,
Aug. 2011.
-
KEISUKE TANAKA,
Christopher Portmann.
Information-Theoretic Secrecy with Access to Decryption Oracles,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E94-A ,
No. 7,
pp. 1585-1590,
July 2011.
-
KEISUKE TANAKA,
Takato HIRANO.
Key Generation for Fast Inversion of the Paillier Encryption Function,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E93-A,
No. 6,
pp. 1111-1121,
June 2010.
-
KEISUKE TANAKA,
Toshiyuki ISSHIKI,
Koichiro WADA.
A Rational Secret-Sharing Scheme Based on RSA-OAEP,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E93-A,
No. 1,
pp. 42-49,
Jan. 2010.
-
KEISUKE TANAKA,
Takato Hirano,
Koichiro Wada.
primitive power roots of Unity and Its Application to Encryption,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E92-a,
No. 8,
pp. 1836-1844,
Aug. 2009.
-
田中圭介.
暗号のための基礎理論,
オペレーションズ・リサーチ 3月号,
Vol. 54,
No. 3,
Mar. 2009.
-
KEISUKE TANAKA,
Daisuke Inoue.
Symmetricity of the Protocols Related to Oblivious Transfer,
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. 92-A,
No. 1,
Jan. 2009.
-
Daisuke Inoue,
Keisuke Tanaka.
Conditional converge cast,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E91-A,
No. 6,
pp. 1537-1540,
June 2008.
-
Harunaga Hiwatari,
Keisuke Tanaka.
A Cramer-Shoup Variant Related to the Quadratic Residuosity Problem,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E89-A,
No. 1,
pp. 203-205,
Jan. 2006.
-
Ryotaro Hayashi,
Keisuke Tanaka.
Schemes for Encryption with Anonymity and Ring Signature,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E89-A,
No. 1,
pp. 66-73,
Jan. 2006.
-
Takao Onodera,
Keisuke Tanaka.
Shuffle for Paillier's Encryption Scheme,
IEICE Transactions on Fundamentals,
Vol. E88-A,
No. 5,
pp. 1241-1248,
May 2005.
-
三原 章裕,
田中 圭介.
Short Signatures with Message Recovery in the Random Oracle Model,
Proceedings of the 2004 Symposium on Cryptography and Information Security,
pp. 637-640,
2004.
-
一色 寿幸,
田中 圭介.
An Efficient Anonymous Group Identification Scheme with Short Secret Keys,
Proceedings of the 2004 Symposium on Cryptography and Information Security,
pp. 1431-1434,
2004.
-
林 良太郎,
田中 圭介.
Families of RSA-type Trap-door Permutations with a Common Domain,
Proceedings of the 2004 Symposium on Cryptography and Information Security,
pp. 1505-1510,
2004.
-
林 良太郎,
田中 圭介.
Anonymity on Public-Key Cryptosystems,
Proceedings of the 2004 Symposium on Cryptography and Information Security,
pp. 1511-1516,
2004.
-
林 良太郎,
田中 圭介.
同じ値域をもつ RSA 関数族の構成,
2004 年冬の LA シンポジウム,
2004.
-
一色 寿幸,
田中 圭介.
(n-t)-out-of-n しきい値付きリング署名,
2004 年冬の LA シンポジウム,
2004.
-
Keiji Omura,
Keisuke Tanaka.
Density Attack to the Knapsack Cryptosystems with Enumerative Source Encoding,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences ,
Vol. E87-A,
No. 6,
pp. 1564-1569,
2004.
-
Toshiyuki Isshiki,
Keisuke Tanaka.
An Efficient Anonymous Group Identification Scheme with Short Secret Keys,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E87-A,
No. 3,
pp. 757-760,
2004.
-
Shao Chin Sung,
Keisuke Tanaka.
Limiting negations in bounded-depth circuits: An extension of Markov's theorem,
Information Processing Letters,
Vol. 90,
No. 1,
pp. 15-20,
2004.
-
一色 寿幸,
田中 圭介.
Threshold Ring Signatures in the Random Oracle Model,
Proceedings of the 2004 Symposium on Cryptography and Information Security,
pp. 1185-1190,
2004.
-
小野寺 貴男,
田中 圭介.
A Verifiable Secret Shuffle of the Paillier's Encryption Scheme,
Proceedings of the 2004 Symposium on Cryptography and Information Security,
pp. 955-960,
2004.
-
林 良太郎,
岡本 龍明,
田中 圭介.
Key-Privacy in Digital Signature,
2003 年暗号と情報セキュリティシンポジウム,
pp. 55-60,
2003.
-
一色 寿幸,
田中 圭介.
一方向性置換に基づく小さい保存領域のための量子ビットコミットメント,
2003 年冬の LA シンポジウム,
pp. 27-32,
2003.
-
大村 慶二,
田中 圭介.
別の数え上げ符号を用いたナップザック暗号,
2003 年冬の LA シンポジウム,
pp. 128-133,
2003.
-
大村 慶二,
田中 圭介.
Density atack and Different Enumerative Source Encoding (Extended Abstract),
2003 年暗号と情報セキュリティシンポジウム,
pp. 529-534,
2003.
-
Chao Chin Sung,
Keisuke Tanaka.
Limiting Negations in Bounded-Depth Circuits: An Extension of Markov's Theorem,
Proceedings of the 14th International Symposium on Algorithms and Computation,
pp. 108-116,
2003.
-
KEISUKE TANAKA.
Quantum Bit-Commitment for Small Storage Based on Quantum One-Way Permutations,
New Generation Computing,
Vol. 21,
pp. 339-345,
2003.
-
一色 寿幸,
田中 圭介.
Quantum Bit-Commitment for Small Strage Based on Quantum One-Way Permutations,
2003 年暗号と情報セキュリティシンポジウム,
pp. 1041-1046,
2003.
-
田中圭介,
岡本龍明.
量子公開鍵暗号,
電子情報通信学会誌,
Vol. 85,
No. 8,
pp. 613-617,
2002.
-
Tatsuaki Okamoto,
Keisuke Tanaka.
A New Approach to Knapsack Cryptosystems (Extended Abstract),
Proceedings of the 3rd International Workshop on Information Security Applications,
2002.
-
田中圭介,
岡本龍明.
量子ゼロ知識対話証明について,
2002年冬のLAシンポウジウム,
2002.
-
Shao Chin Sung,
Keisuke Tanaka.
An exponential gap with the removal of one negation gate,
Information Processing Letters,
Vol. 82,
pp. 155-157,
2002.
-
Keisuke Tanaka,
Tatsuaki Okamoto.
A Quantum Public-Key Encryption Scheme and Its Improvement,
2001年暗号と情報セキュリティシンポジウム,
2001.
-
岡本 龍明,
田中 圭介.
量子公開鍵暗号と量子計算暗号,
電子情報通信学会 第5回量子情報技術研究会 招待講演,
2001.
-
田中 圭介,
岡本 龍明.
量子公開鍵暗号とその改良,
2001年冬のLAシンポジウム,
2001.
-
Tatsuaki Okamoto,
Keisuke Tanaka,
Osamu Watanabe.
Succinct Quantum Proofs for Graph Non-Isomorphism,
2001年夏のLAシンポジウム,
2001.
-
岡本 龍明,
田中 圭介.
量子公開鍵暗号,
Computer Today 2001 年 9 月号, サイエンス社,
pp. 30-35,
2001.
-
田中圭介.
素因数分解とデータベース検索に対する量子アルゴリズム,
電子情報通信学会 ソサイエティ大会 情報システムソサイエティ チュートリアル講演 「量子計算機構」,
2000.
-
Shao-Chin Sung,
Keisuke Tanaka.
Lower Bounds on Negation-Limited Inverters,
Discrete Mathematics and Theoretical Computer Science,
pp. 360-368,
1999.
-
Keisuke Tanaka,
Milan Vlach.
Minimizing the Maximum Absolute Lateness and Range of Lateness under Generalized Due Dates on a Single Machine,
Annals of Operations Research,
Vol. 86,
pp. 507-526,
1999.
-
Robert Beals,
Tetsuro Nishino,
Keisuke Tanaka.
On the Complexity of Negation-Limited Boolean Networks,
SIAM Journal on Computing,
Vol. 27,
No. 5,
pp. 1334-1347,
1998.
-
Keisuke Tanaka,
Milan Vlach.
Minimizing the Range of Lateness on a Single Machine under Generalized Due Dates,
Information Systems and Operational Research,
Vol. 35,
pp. 286-296,
1997.
-
Keisuke Tanaka,
Milan Vlach.
Single Machine Scheduling with Fuzzy Due Dates,
7th International Fuzzy Systems Association World Congress,
pp. 195-199,
1997.
-
Keisuke Tanaka,
Milan Vlach.
Single Machine Scheduling to Minimize the Maximum Lateness with Both Specific and Generalized Due Dates,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
Vol. E80-A,
No. 3,
pp. 557-563,
1997.
-
Magnus M. Halldorsson,
Keisuke Tanaka.
Approximation and Special Cases of Common Subtrees and Editing Distance,
Proceedings of the 7th International Symposium on Algorithms and Computation,
pp. 75-84,
1996.
-
Keisuke Tanaka,
Milan Vlach.
Improved Algorithms for Single Machine Scheduling with Fuzzy Due Dates,
Proceedings of the Second International Symposium on Operations Research and its Applications,
pp. 260-269,
1996.
-
Keisuke Tanaka,
Tetsuro Nishino.
A Relationship between the Number of Negations and the Circuit Size,
IEICE Transactions on Information and Systems,
Vol. E79-D,
No. 9,
pp. 1355-1357,
1996.
-
Keisuke Tanaka,
Tetsuro Nishino,
Robert Beals.
Negation-Limited Circuit Complexity of Symmetric Functions,
Infomation Processing Letters,
Vol. 59,
No. 5,
pp. 273-279,
1996.
-
Keisuke Tanaka,
Milan Vlach.
Single Machine Scheduling with Generalized Due Dates,
Symposium on Combinatorial Optimization,
1996.
-
Keisuke Tanaka,
Milan Vlach.
Single Machine Scheduling to Minimize the Maximum Lateness with Both Specific and Generalized Due Dates,
Proceedings of the Second International Symposium on Operations Research and its Applications,
pp. 250-259,
1996.
-
Robert Beals,
Tetsuro Nishino,
Keisuke Tanaka.
More on the Complexity of Negation-Limited Circuits,
Proceedings of the 27th Annual ACM Symposium on Theory of Computing,
pp. 585-595,
1995.
-
Tetsuro Nishino,
Keisuke Tanaka.
On the Negation-Limited Circuit Complexity of Clique Functions,
IEICE Transactions on Information and Systems,
Vol. E78-D,
No. 1,
pp. 86-89,
1995.
-
Keisuke Tanaka,
Tetsuro Nishino.
On the Complexity of Negation-Limited Boolean Networks (Preliminary Version),
Proceedings of the 26th Annual ACM Symposium on Theory of Computing,
pp. 38-47,
1994.
著書
-
Michael Sipser,
太田和夫,
阿部正幸,
植田広樹,
田中圭介,
藤岡淳,
渡辺治.
計算理論の基礎 [原著第2版] 2. 計算可能性の理論,
共立出版,
May 2008.
-
Michael Sipser,
太田和夫,
阿部正幸,
植田広樹,
田中圭介,
藤岡淳,
渡辺治.
計算理論の基礎 [原著第2版] 3. 複雑さの理論,
共立出版,
May 2008.
-
Michael Sipser,
太田和夫,
阿部正幸,
植田広樹,
田中圭介,
藤岡淳,
渡辺治.
計算理論の基礎 [原著第2版] 1. オートマトンと言語,
共立出版,
May 2008.
-
Michael Sipser 著,
渡辺 治,
太田 和夫 監訳,
阿部 正幸,
植田 広樹,
田中 圭介,
藤岡 淳 訳.
計算理論の基礎,
共立出版,
共立出版,
2000.
国際会議発表 (査読有り)
-
KEISUKE TANAKA,
Shuya Hanai,
Masayuki Tezuka,
Yusuke Yoshida.
Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange,
14th International Conference, SCN 2024,,
Security and Cryptography for Networks,
pp. 272–293,
Sept. 2024.
-
Keisuke Tanaka,
Pengfei Wang,
Xiangyu Su,
Mario Larangeira.
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing,
International Conference on Applied Cryptography and Network Security,
Applied Cryptography and Network Security - 22nd International Conference, ACNS 2024,
Springer,
pp. 88–118,
Mar. 2024.
公式リンク
-
Masayuki Tezuka,
Keisuke Tanaka.
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature,
Information Security and Cryptology - ICISC 2022 - 25th International Conference,
pp. 317–336,
Mar. 2023.
-
Ichiro Iwata,
Yusuke Yoshida,
Keisuke Tanaka:.
Analysis of (U, U+V)-code Problem with Gramian over Binary and Ternary Fields,
Information Security and Cryptology - ICISC 2022 - 25th International Conference,
435-449,
Mar. 2023.
-
Hiroki Yamamuro,
Keisuke Hara,
Masayuki Tezuka,
Yusuke Yoshida,
Keisuke Tanaka.
Forward Secure Message Franking,
ICISC 2021:International Conference on Information Security and Cryptology,
Information Security and Cryptology – ICISC 2021,
339–358,
July 2022.
-
Yi Lu,
Keisuke Hara,
Kazuma Ohara,
Jacob C. N. Schuldt,
Keisuke Tanaka:.
Efficient Two-Party Exponentiation from Quotient Transfer,
ACNS 2022: Applied Cryptography and Network Security,
June 2022.
-
Pengfei Wang,
Xiangyu Su,
Maxim Jourenko,
Zixian Jiang,
Mario Larangeira,
Keisuke Tanaka.
Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases,
CSS 2021:International Symposium on Cyberspace Safety and Security,
Cyberspace Safety and Security,
131-144,
Jan. 2022.
-
Carlo Brunetta,
Mario Larangeira,
Bei Liang,
Aikaterini Mitrokotsa,
Keisuke Tanaka.
Turn-Based Communication Channels,
Provable and Practical Security - 15th International Conference, ProvSec 2021,
Nov. 2021.
-
Maxim Jourenko,
Mario Larangeira,
Keisuke Tanaka.
Payment Trees: Low Collateral Payments for Payment Channel Networks,
International Conference on Financial Cryptography and Data Security,
Financial Cryptography and Data Security,
189–208,
Oct. 2021.
-
Xiangyu Su,
Mario Larangeira,
Keisuke Tanaka.
How to Prove Work: With Time or Memory,
IEEE International Conference on Blockchain and Cryptocurrency (ICBC),
June 2021.
-
Yuyu Wang,
Takahiro Matsuda,
Goichiro hanaoka,
KEISUKE TANAKA.
Impossibility on Tamper Resilient Cryptography with Uniqueness Properties,
24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event,
Public-Key Cryptography – PKC 2021,
pp. 389-420,
May 2021.
-
Keisuke Hara,
Takahiro Matsuda,
Keisuke Tanaka.
Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption,
the 8th ACM on ASIA Public-Key Cryptography Workshop,
Proceedings of the 8th ACM on ASIA Public-Key Cryptography Workshop,
pp. 51-59,
May 2021.
-
Daiki Hiraga,
Keisuke Hara,
Masayuki Tezuka,
Yusuke Yoshida,
Keisuke Tanaka.
Security Definitions on Time-Lock Puzzles,
International Conference on Information Security and Cryptology,
Information Security and Cryptology – ICISC 2020,
pp. 3-15,
Feb. 2021.
-
Tasuku Narita,
Fuyuki Kitagawa,
Yusuke Yoshida,
Keisuke Tanaka.
Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability,
International Conference on Information Security and Cryptology,
Information Security and Cryptology – ICISC 2020,
pp. 16-39,
Feb. 2021.
-
Maxim Jourenko,
Mario Larangeira,
Keisuke Tanaka.
Lightweight Virtual Payment Channels,
Cryptology and Network Security - 19th International Conference, CANS 2020,
Cryptology and Network Security,
pp. 365-384,
Dec. 2020.
-
Yusuke Yoshida,
Fuyuki Kitagawa,
Keita Xagawa,
Keisuke Tanaka.
Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions,
26th International Conference on the Theory and Application of Cryptology and Information Security,
Advances in Cryptology – ASIACRYPT 2020,
pp. 36-65,
Dec. 2020.
-
Kyohei Sudo,
Masayuki Tezuka,
Keisuke Hara,
Yusuke Yoshida,
Keisuke Tanaka.
Watermarkable Signature with Computational Function Preserving,
Provable and Practical Security - 14th International Conference,
Provable and Practical Security,
pp. 124-144,
Nov. 2020.
-
Yi Lu,
Keisuke Hara,
Keisuke Tanaka.
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions,
International Conference on Provable Security,
Provable and Practical Security,
pp. 213-233,
Nov. 2020.
-
KEISUKE TANAKA,
Masayuki Tezuka.
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme,
Australasian Conference on Information Security and Privacy(ACISP 2020),
Information Security and Privacy,
pp. 225-243,
Aug. 2020.
-
KEISUKE TANAKA,
Shohei Egashira,
Yuyu Wang.
Fine-Grained Cryptography Revisited,
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security,
pp. 637-666,
Nov. 2019.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda.
Simple and Efficient KDM-CCA Secure Public Key Encryption,
25th International Conference on the Theory and Application of Cryptology and Information Security(ASIACRYPT 2019),
pp. 97-127,
Nov. 2019.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki,
Takashi Yamakawa.
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.,
39th Annual International Cryptology Conference(CRYPTO 2019),
Advances in Cryptology – CRYPTO 2019,
pp. 521-551,
Aug. 2019.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda.
CCA Security and Trapdoor Functions via Key-Dependent-Message Security.,
39th Annual International Cryptology Conference,
Advances in Cryptology – CRYPTO 2019,
pp. 33-64,
Aug. 2019.
-
KEISUKE TANAKA,
Ai Ishida,
Yusuke Sakai,
Keita Emura,
Goichiro Hanaoka.
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2,
Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security,
Page 515–528,
July 2019.
-
KEISUKE TANAKA,
Masayuki Tezuka,
Yusuke Yoshida.
Weakened Random Oracle Models with Target Prefix.,
International Conference on Security for Information Technology and Communications (SECITC 2018),
May 2019.
-
KEISUKE TANAKA,
Yusuke Yoshida,
Fuyuki Kitagawa.
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem,
25th ASIACRYPT 2019,
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security,
pp. 128-158,
2019.
-
KEISUKE TANAKA,
Fuyuki Kitagawa.
A Framework for Achieving KDM-CCA Secure Public-Key Encryption,
International Conference on the Theory and Application of Cryptology and Information Security,
pp. 127-157,
Oct. 2018.
-
KEISUKE TANAKA,
Ai Ishida,
Yusuke Sakai,
Keita Emura,
Goichiro Hanaoka.
Fully Anonymous Group Signature with Verifier-Local Revocation,
Security and Cryptography for Networks(SCN2018),
Sept. 2018.
-
KEISUKE TANAKA,
Keisuke Hara,
Fuyuki Kitagawa,
Takahiro Matsuda,
Goichiro Hanaoka.
Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions,
Security and Cryptography for Networks(SCN 2018),
pp. 140-159,
Sept. 2018.
-
Keisuke Tanaka,
Fuyuki Kitagawa,
Ryo Nishimaki.
Obfustopia Built on Secret-Key Functional Encryption,
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques,
pp. 603-648,
Mar. 2018.
-
Yuyu Wang,
Takahiro Matsuda,
Goichiro Hanaoka,
KEISUKE TANAKA.
Memory Lower Bounds of Reductions Revisited,
37th Annual International Conference on the Theory and Applications of Cryptographic Techniques,
pp. 61-90,
Mar. 2018.
-
KEISUKE TANAKA,
Fuyuki Kitagawa.
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption,
21st IACR International Conference on Practice and Theory of Public-Key Cryptography,
Mar. 2018.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki.
Simple and Generic Constructions of Succinct Functional Encryption,
21st IACR International Conference on Practice and Theory of Public-Key Cryptography,
pp. 187-217,
Mar. 2018.
-
KEISUKE TANAKA,
Kotoko Yamada,
Nuttapong Attrapadung,
Keita Emura,
Goichiro Hanaoka.
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption,
European Symposium on Research in Computer Security (ESORICS) 2017,
pp. 532-551,
Sept. 2017.
-
KEISUKE TANAKA,
Yusuke Yoshida,
Kirill Morozov.
CCA2 Key-Privacy for Code-Based Encryption in the Standard Model,
International Workshop on Post-Quantum Cryptography,
Post-Quantum Cryptography,
June 2017.
-
Yuyu Wang,
Zongyang Zhang,
Takahiro Matsuda,
Goichiro Hanaoka,
Keisuke Tanaka.
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones,
22nd International Conference on the Theory and Application of Cryptology and Information Security,
Advances in Cryptology – ASIACRYPT 2016,
Dec. 2016.
-
KEISUKE TANAKA,
Ai Ishida,
Keita Emura,
Goichiro Hanaoka,
Yusuke Sakai.
Group Signature with Deniability: How to Disavow a Signature.,
International Conference on Cryptology and Network Security,
Cryptology and Network Security,
pp. 228-244,
Oct. 2016.
-
KEISUKE TANAKA,
AKINORI KAWACHI,
hirotoshi takebe.
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes,
11th International Workshop on Security,
Advances in Information and Computer Security,
pp. 195-211,
Sept. 2016.
-
Yuyu Wang,
Takahiro Matsuda,
Goichiro Hanaoka,
KEISUKE TANAKA.
Signatures Resilient to Uninvertible Leakage,
International Conference on Security and Cryptography for Networks,
Security and Cryptography for Networks,
pp. 372-390,
Aug. 2016.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda,
Takahiro Matsuda.
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions,
19th IACR International Conference on Practice and Theory in Public-Key Cryptography,
Public-Key Cryptography – PKC 2016,
Feb. 2016.
-
KEISUKE TANAKA,
Thanh Minh Ta.
Comparison of Watermarking Schemes Using Linear and Nonlinear Feature Matching,
2015 Seventh International Conference on Knowledge and Systems Engineering,
pp. 262-267,
Oct. 2015.
-
Yuyu Wang,
KEISUKE TANAKA.
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency,
Australasian Conference on Information Security and Privacy,
pp. 213-229,
June 2015.
-
KEISUKE TANAKA,
Ai Ishida,
Keita EMURA,
Goichiro HANAOKA,
Yusuke SAKAI .
Disavowable Public Key Encryption with Non-interactive Opening,
10th ACM Symposium on Information, Computer and Communications Security,
page 667,
Apr. 2015.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda,
Goichiro Hanaoka.
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption,
The Cryptographers’ Track at the RSA Conference 2015,
Topics in Cryptology –- CT-RSA 2015,
pp. 201-219,
Mar. 2015.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Takahiro Matsuda,
Goichiro Hanaoka.
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks,
International Conference on Information Security and Cryptology,
Vol. 8949,
pp. 84-100,
Mar. 2015.
-
KEISUKE TANAKA,
Thanh Minh Ta.
Blind Watermarking using QIM and the Quantized SVD Domain based on the q-Logarithm Function,
10th International Conference on Computer Vision Theory and Applications,
Proceedings of the 10th International Conference on Computer Vision Theory and Applications,
Vol. 3,
pp. 14-25,
Mar. 2015.
-
KEISUKE TANAKA,
Thanh Minh Ta.
A proposal of novel q-DWT for blind and robust image watermarking,
2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication,
pp. 2061-2065,
Sept. 2014.
-
KEISUKE TANAKA,
Haruna Higo,
Kenji Yasunaga.
Game-Theoretic Security for Bit Commitment,
8th International Workshop on Security,
pp. 303-318,
Nov. 2013.
-
KEISUKE TANAKA,
Toshiyuki Isshiki,
Manh Ha Nguyen.
Attacks to the Proxy Re-Encryption Schemes from IWSEC2011.,
8th International Workshop on Security,
pp. 290-302,
Oct. 2013.
-
KEISUKE TANAKA,
Toshiyuki Isshiki,
Manh Ha Nguyen.
Factoring-Based Proxy Re-Encryption Schemes,
7th International Conference on Provable Security,
pp. 309-329,
Oct. 2013.
-
KEISUKE TANAKA,
hirotoshi takebe.
Grey-Box Public-Key Steganography,
Theory and Applications of Models of Computation,
pp. 294-305,
May 2013.
-
KEISUKE TANAKA,
Toshiyuki Isshiki,
Manh Ha Nguyen.
Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012,
Cryptographers’ Track at the RSA Conference,
pp. 277-292,
Feb. 2013.
-
KEISUKE TANAKA,
Shinzo Koyama,
Kazutoshi Onozawa,
Yoshihisa Kato.
A 3D vision 2.1Mpixel image sensor for single-lens camera systems,
2013 IEEE International Solid-State Circuits Conference,
pp. 492-493,
Feb. 2013.
-
KEISUKE TANAKA,
Akinori Kawachi,
Hirotoshi Takebe.
Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability,
7th International Workshop on Security,
Advances in Information and Computer Security,
pp. 123-137,
Oct. 2012.
-
KEISUKE TANAKA,
Haruna Higo,
Akihiro Yamada,
Kenji Yasunaga.
A Game-Theoretic Perspective on Oblivious Transfer,
Australasian Conference on Information Security and Privacy,
Information Security and Privacy,
pp. 29-42,
July 2012.
-
KEISUKE TANAKA,
Manh Ha Nguyen,
Kenji Yasunaga.
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs,
17th Australasian Conference on Information Security and Privacy,
Information Security and Privacy,
pp. 208-222,
July 2012.
-
Mario Larangeira,
KEISUKE TANAKA.
Reduction-centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model,
13th International Workshop on Information Security Applications,
Information Security Applications,
pp. 124-143,
Jan. 2012.
-
KEISUKE TANAKA,
Hitoshi Namiki,
Kenji Yasunaga.
Randomness Leakage in the KEM/DEM Framework,
International Conference on Provable Security,
Provable Security,
pp. 309-323,
Oct. 2011.
-
KEISUKE TANAKA,
Akihiro Yamada,
Kenji Yasunaga.
Weak Oblivious Transfer from Strong One-Way Functions,
5th International Conference on Provable Security,
Provable Security,
pp. 34-51,
Oct. 2011.
-
KEISUKE TANAKA,
Manh Ha Nguyen,
kenji yasunaga.
Leakage-Resilient CCA2 Public-Key Encryption from 4-wise independent hash functions,
2011 International Conference on Advanced Technologies for Communications,
Aug. 2011.
-
Mario Larangeira,
Keisuke Tanaka.
Programmability in the Generic Ring and Group Models,
Presented at International Conference on Provable Security-ProvSec,
Journal Internet Services and Information Security,
vol. 1,
number 2/3,
pp. 57--73,
June 2011.
-
KEISUKE TANAKA,
Akinori Kawachi,
Christopher Portmann.
Characterization of the Relations between Information-Theoretic Non-malleability, Secrecy, and Authenticity,
5th International Conference on Information Theoretic Security,
Information Theoretic Security,
pp. 6-24,
May 2011.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
A Multi-trapdoor Commitment Scheme from the RSA Assumption,
Australasian Conference on Information Security and Privacy,
pp. 182-199,
July 2010.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki.
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model,
13th International Conference on Practice and Theory in Public Key Cryptography,
Public Key Cryptography – PKC 2010,
pp. 261-278,
May 2010.
-
KEISUKE TANAKA,
Akinori Kawachi,
Akira Numayama,
Keita Xagawa.
Security of Encryption Schemes in Weakened Random Oracle Models,
13th International Conference on Practice and Theory in Public Key Cryptography,
Public Key Cryptography,
pp. 403-419,
May 2010.
-
KEISUKE TANAKA,
Keita Xagawa.
Zero-Knowledge Protocols for NTRU:Application to Identification and Proof of Plaintext Knowledge.,
Provable Security2009,
pp. 198-213,
Nov. 2009.
-
KEISUKE TANAKA,
Eiichiro Fujisaki,
Ryo Nishimaki.
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions,
Provable Security2009,
pp. 118-128,
Nov. 2009.
-
KEISUKE TANAKA,
Ryo Nishimaki,
Eiichiro Fujisaki.
Efficient Non-interactive Universally Composable String-Commitment Schemes,
Provable Security2009,
pp. 3-18,
Nov. 2009.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki,
Akira Numayama.
Security on Hybrid Encryption with the Tag-KEM/DEM Framework,
Australasian Conference on Information Security and Privacy,
pp. 343-359,
July 2009.
-
KEISUKE TANAKA,
Harunaga Hiwatari,
Tomoyuki Asano,
Koichi Sakumoto.
Multi-recipient Public-Key Encryption from Simulators in Security Proofs,
Australasian Conference on Information Security and Privacy,
pp. 293-308,
July 2009.
-
KEISUKE TANAKA,
Akira Numayama.
On the Weak Ideal Compression Functions,
Information Security and Privacy, 14th Australasian Conference,
Information Security and Privacy,
pp. 232-248,
Jan. 2009.
-
AKINORI KAWACHI,
KEISUKE TANAKA,
Keita Xagawa.
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems,
Advances in Cryptology - Asiacrypt 2008 (ASIACRYPT 2008),
Advances in Cryptology - Asiacrypt 2008 (ASIACRYPT 2008),
Vol. 5350,
pp. 372-389,
Dec. 2008.
-
KEISUKE TANAKA,
Takato Hirano,
Koichiro Wada.
Public-Key Cryptosystems with Primitive Power Roots of Unity,
13th Australasian Conference, ACISP 2008,
Information Security and Privacy - 13th Australasian Conference, ACISP 2008,
pp. 98-112,
July 2008.
-
Takato Hirano,
Koichiro Wada,
Keisuke Tanaka.
Public-key cryptosystems with primitive power roots of unity,
The 13th Australasian Conference on Information Security and Privacy (ACISP 2008),
Lecture Notes in Computer Science,
Vol. 5107,
pp. 98-112,
July 2008.
-
Keita Xagawa,
Keisuke Tanaka.
A compact signature scheme with ideal lattice,
The First AAAC Annual Meeting (AAAC 2008),
The First AAAC Annual Meeting (AAAC 2008),
Apr. 2008.
-
Takato Hirano,
Koichiro Wada,
Keisuke Tanaka.
Encryption with partial information deletion,
The First AAAC Annual Meeting (AAAC 2008),
The First AAAC Annual Meeting (AAAC 2008),
Apr. 2008.
-
Naoyuki Yamashita,
Keisuke Tanaka.
Secret Handshake with Multiple Groups,
7th International Workshop on Information Security Applications - WISA2006,
Information Security Applications: 7th International Workshop - WISA 2006, Lecture Notes in Computer Science 4298,
pp. 339-348,
Aug. 2007.
-
Ryotaro Hayashi,
Keisuke Tanaka.
Anonymity on Paillier's trap-door permutation,
The 12th Australasian Conference on Information Security and Privacy (ACISP 2007),
Lecture Notes in Computer Science,
Vol. 4586,
pp. 200-214,
July 2007.
-
Akinori Kawachi,
Keisuke Tanaka,
Keita Xagawa.
Multi-bit cryptosystems based on lattice problems,
Public Key Cryptography - PKC 2007,
Lecture Notes in Computer Science,
Vol. 4450,
pp. 315-329,
June 2007.
-
AKINORI KAWACHI,
KEISUKE TANAKA,
Keita Xagawa.
Multi-Bit Cryptosystems Based on Lattice Problems,
PKC 2007, 110th International Workshop on Practice and Theory in Public Key Cryptography (PKC2007),
Public Key Cryptography - PKC 2007, 10th International Workshop on Practice and Theory in Public Key Cryptography, Lecture Notes in Computer Science 4450,
pp. 315-329,
Apr. 2007.
-
Akira Numayama,
Toshiyuki Isshiki,
Keisuke Tanaka.
Security of digital signature schemes in weakened random oracle models,
The 11th International Workshop on Practice and Theory in Public Key Cryptography (PKC 2008),
Lecture Notes in Computer Science,
Vol. 4939,
pp. 268-287,
Mar. 2007.
国内会議発表 (査読有り)
国際会議発表 (査読なし・不明)
-
Yuyu Wang,
KEISUKE TANAKA.
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency,
International Conference on Provable Security,
pp. 117-129,
Oct. 2014.
-
Yuyu Wang,
Keisuke Tanaka.
Strongly Simulation-Extractable Leakage-Resilient NIZK,
Australasian Conference on Information Security and Privacy 2014,
Information Security and Privacy,
Vol. 8544,
pp. 66-81,
July 2014.
-
Ryotaro Hayashi,
Keisuke Tanaka.
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity,
11th Australasian conference - ACISP 2006,
Information Security and Privacy - 11th Australasian Conference, ACISP 2006,
pp. 271-282,
July 2006.
-
Ryotaro Hayashi,
Keisuke Tanaka.
Universally Anonymizable Public-Key Encryption,
11th International Conference on the Theory and Application of Cryptology and Information Security,
Advances in Cryptology - ASIACRYPT 2005,
pp. 293-312,
Dec. 2005.
-
Toshiyuki Isshiki,
Keisuke Tanaka.
An (n-t)-out-of-n Threshold Ring Signature Scheme,
10th Australasian Conference on Information Security and Privacy - ACISP 2005,
Information Security and Privacy - 10th Australasian Conference, ACISP 2005,
pp. 406-416,
July 2005.
-
Akihiro Mihara,
Keisuke Tanaka.
Universal Designated-Verifier Signature with Aggregation,
Third International Conference on Information Technology and Applications,
Third International Conference on Information Technology and Applications Vol. 2,
pp. 514-519,
July 2005.
-
Hiroki Hada,
Keisuke Tanaka.
Security for Authenticated Key Exchange Based on Non-Malleability,
Third International Conference on Information Technology and Applications,
Third International Conference on Information Technology and Applications, Vol. 2,
pp. 508-513,
July 2005.
-
Ryotaro Hayashi,
Keisuke Tanaka.
The Sampling Twice Technique for the RSA-based Cryptosystems with Anonymity,
PKC 2005 - The 8th International Workshop on Practice and Theory in Public Key Cryptography,
Springer-Verlag,
pp. 216-233,
Jan. 2005.
-
Ryotaro Hayashi,
Tatsuaki Okamoto,
Keisuke Tanaka.
An RSA Family of Trap-door Permutations with a Common Domain and its Applications,
Public Key Cryptography - PKC2004,
pp. 291-304,
2004.
-
Tatsuaki Okamoto,
Keisuke Tanaka,
Shigenori Uchiyama.
Quantum Public-Key Cryptosystems,
Advances in Cryptology - CRYPTO2000,
pp. 147-165,
2000.
国内会議発表 (査読なし・不明)
-
渋谷聡志,
石井将大,
田中圭介.
暗号化通信におけるマイニング検知,
2024年暗号と情報セキュリティシンポジウム (SCIS2024),
Jan. 2024.
-
吉田 雄祐,
田中 圭介.
Non-Committing暗号と紛失サンプル可能暗号の双対性,
2023年暗号と情報セキュリティシンポジウム,
Jan. 2023.
-
濱田 花風,
吉田 雄祐,
田中 圭介.
ハッシュ時生成落し戸付きカメレオンハッシュの安全性について,
2023年暗号と情報セキュリティシンポジウム,
Jan. 2023.
-
Kyohei Sudo,
Masayuki Tezuka,
Keisuke Hara,
Yusuke Yoshida,
KEISUKE TANAKA.
A Quantum Search-to-Decision Reduction for the LPN Problem,
2022年暗号と情報セキュリティシンポジウム,
Jan. 2022.
-
Yugo Koyanagi,
Masahiro Ishii,
KEISUKE TANAKA.
Concurrent Group Operations on TreeKEM,
2022年暗号と情報セキュリティシンポジウム (SCIS2022),
2022年暗号と情報セキュリティシンポジウム (SCIS2022),
Jan. 2022.
-
数藤 恭平,
手塚 真徹,
原 啓祐,
吉田 雄祐,
田中 圭介.
計算量的機能保存性をもつ電子透かし署名,
Jan. 2021.
-
成田資,
吉田雄祐,
田中圭介.
秘密分散における複数メッセージに対する緩和した改ざん耐性,
情報とセキュリティシンポジウム(SCIS2021),
Jan. 2021.
-
山室宏貴,
原啓祐,
手塚真徹,
吉田雄祐,
田中圭介.
フォワード安全な認証付きコミッティング暗号,
情報とセキュリティシンポジウム(SCIS2021),
Jan. 2021.
-
Maxim Jourenko,
Mario Larangeira,
Keisuke Tanaka.
Payment Trees: Low Collateral Payments for Payment Channel Networks,
情報とセキュリティシンポジウム(SCIS2021),
Jan. 2021.
-
KEISUKE TANAKA,
Keisuke Hara,
Yi Lu.
Receiver Selective Opening CCA Secure Public-key Encryption from Weaker Assumptions,
2020年暗号と情報セキュリティシンポジウム,
Jan. 2020.
-
田中圭介,
数藤恭平,
手塚真徹,
原啓祐,
吉田雄祐.
署名回路に対する秘匿可能な電子透かし,
2020年暗号と情報セキュリティシンポジウム,
Jan. 2020.
-
田中圭介,
大圖健史.
少額デポジットによる離脱者数の上界を達成するメンタルポーカープロトコル,
2020年暗号と情報セキュリティシンポジウム,
Jan. 2020.
-
田中圭介,
平賀大揮,
手塚真徹,
原啓祐,
吉田雄祐.
タイムロックパズルに対する安全性定義の考察,
2020年暗号と情報セキュリティシンポジウム,
Jan. 2020.
-
田中圭介,
吉田雄祐,
北川冬航.
暗号文拡大率が定数のNon-Committing暗号,
2020年暗号と情報セキュリティシンポジウム,
Jan. 2020.
-
遠藤さや,
石井将大,
田中圭介.
暗号通貨マイニング通信の深層学習による分類,
2020年暗号と情報セキュリティシンポジウム (SCIS2020),
Jan. 2020.
-
Takeshi Oozu,
Masahiro Ishii,
KEISUKE TANAKA.
Dropout-Tolerant Mental Poker Protocol with Small Deposit and Optimal Upper Bound on Number of Dropouts,
2020年暗号と情報セキュリティシンポジウム (SCIS2020),
Jan. 2020.
-
Maxim Jourenko,
Kanta Kurazumi,
Mario Larangeira,
Keisuke Tanaka.
Notes on Offchain Protocols,
Symposium on Cryptography and Information Security,
Jan. 2019.
-
田中圭介,
北川冬航,
松田 隆宏.
鍵依存平文安全な暗号方式に基づく選択暗号文攻撃に対し安全な公開鍵暗号の構成,
2019年暗号と情報セキュリティシンポジウム,
Jan. 2019.
-
田中圭介,
吉野慎司,
手塚真徹,
品川和雅.
Intel SGXを用いた入力を制御できる複数入力関数型暗号,
2019年暗号と情報セキュリティシンポジウム,
Jan. 2019.
-
田中圭介,
吉田雄祐,
北川冬航.
Diffie-Hellman判定問題に基づく暗号文サイズの小さなNon-Committing暗号,
2019年暗号と情報セキュリティシンポジウム,
Jan. 2019.
-
田中圭介,
成田資,
北川冬航,
吉田雄祐.
計算量的改ざん耐性を満たす秘密分散,
2019年暗号と情報セキュリティシンポジウム,
Jan. 2019.
-
Kanta Kurazumi,
Mario Larangeira,
Keisuke Tanaka.
A Timeout Anonymous Payment Channel for Decentralized Currencies,
Jan. 2019.
-
Maxim Jourenko,
Mario Larangeira,
Keisuke Tanaka.
Lightweight Virtual Payment Channels,
Symposium on Cryptography and Information Security,
Jan. 2019.
-
Xiangyu Su,
Mario Larangeira,
Keisuke Tanaka.
Verifiable Sequential Work with Trusted Generator,
Jan. 2019.
-
田中圭介,
手塚真徹.
集合構造を持つメッセージに対する n-out-of-n 消去署名方式,
2019年暗号と情報セキュリティシンポジウム,
Jan. 2019.
-
田中圭介,
大圖 健史,
山田 古都子,
石井 将大.
k匿名化の複雑さについて,
冬のLAシンポジウム2017,
Feb. 2018.
-
田中圭介,
山田 古都子,
大圖 健史,
石井 将大.
k匿名化の近似アルゴリズムについて,
冬のLAシンポジウム2017,
Feb. 2018.
-
田中圭介,
山田 古都子,
大圖 健史,
石井 将大.
大きいkに対するk匿名化近似アルゴリズム,
2018年暗号と情報セキュリティシンポジウム (SCIS2018),
Jan. 2018.
-
田中圭介,
北川 冬航.
鍵依存平文安全性を満たすIDベース暗号,
2018年暗号とセキュリティシンポジウム,
Jan. 2018.
-
田中圭介,
原 啓祐,
北川 冬航,
松田 隆宏,
花岡 悟一郎.
標準的仮定に基づくSIM-RSO-CCA安全性を満たす公開鍵暗号方式,
2018年情報とセキュリティシンポジウム,
Jan. 2018.
-
田中圭介,
石田愛,
坂井祐介,
江村恵太,
花岡悟一郎.
ISO/IEC 20008におけるグループ署名方式の安全性に関する考察,
2018年暗号とセキュリティシンポジウム(SCIS2018),
Jan. 2018.
-
田中圭介,
肥後春菜,
安永憲司.
リスク回避型敵対者に対する安全性:ゲーム理論的観点による安全な二者間プロトコル,
2018年暗号とセキュリティシンポジウム(SCIS2018),
Jan. 2018.
-
田中圭介,
手塚 真徹,
吉田 雄祐.
弱められたランダムオラクルモデルの拡張と署名方式の安全性,
2018年暗号とセキュリティシンポジウム,
Jan. 2018.
-
田中圭介,
石井将大,
猪俣漸,
Chingun Oyunbileg,
京山剛大,
黒田渓介,
佐藤敦,
菅谷光啓,
千葉龍一郎,
西脇利知,
橋本幸典,
廣野壮志,
松浦知史,
森健人.
プロキシログのクラスタ間遷移に着目した異常検知手法の評価,
2018年暗号と情報セキュリティシンポジウム (SCIS2018),
Jan. 2018.
-
田中圭介,
大圖 健史,
山田 古都子,
石井 将大.
大きいkに対するk匿名化の複雑さ,
2018年暗号と情報セキュリティシンポジウム (SCIS2018),
Jan. 2018.
-
KEISUKE TANAKA,
Yusuke Yoshida,
Kirill Morozov.
CCA2 Key-Privacy for Code-Based Encryption in the Standard Model,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki.
On Succinctness and Collusion-Resistance of Secret Key Functional Encryption.,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
KEISUKE TANAKA,
Fuyuki Kitagawa,
Ryo Nishimaki.
All You Need Is Slight Compression,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
田中圭介,
安田聖,
北川冬航.
Multi-Identity設定におけるMulti-Hop IDベース準同型暗号の構成,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
田中圭介,
山田古都子,
アッタラパドゥン・ナッタポン,
江村恵太,
花岡悟一郎.
適応的安全な無効化可能属性ベース暗号の一般的構成,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
田中圭介,
石田愛,
坂井祐介,
江村恵太,
花岡悟一郎.
完全匿名性を満たす検証者ローカル失効グループ署名の一般的構成,
2017年暗号と情報セキュリティシンポジウム,
Jan. 2017.
-
田中圭介,
山田古都子,
アッタラパドゥン・ナッタポン,
江村恵太,
花岡悟一郎.
復号可否を指摘できる属性ベース暗号,
冬のLAシンポジウム2016,
Feb. 2016.
-
田中圭介,
吉田雄祐,
モロゾフキリル.
符号ベース暗号の匿名性について,
冬のLAシンポジウム2016,
Feb. 2016.
-
田中圭介,
原啓祐,
Mario.
CryptoNoteに対するサイズ効率化,
冬のLAシンポジウム2016,
Feb. 2016.
-
田中圭介,
石田愛,
江村恵太,
花岡悟一郎,
坂井祐介,
山田翔太.
グループ署名におけるセルフレス匿名性,
冬のLAシンポジウム2015,
Jan. 2016.
-
田中圭介,
北川冬航,
松田隆宏,
花岡悟一郎.
ランダムオラクルモデルにおける鍵依存平文安全性,
冬のLAシンポジウム2015,
Jan. 2016.
-
田中圭介,
遠山裕之,
猪俣漸.
対象関数に対する秘匿回路の効率,
冬のLAシンポジウム2015,
Jan. 2016.
-
田中圭介,
安田聖,
北川冬航.
IND-CCA1安全性を満たす完全準同型暗号,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
田中圭介,
遠山裕之.
秘匿回路の変形とその安全性,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
田中圭介,
北川冬航,
松田隆宏,
花岡悟一郎.
構成の鍵依存平文安全性に関する考察,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
王 煜宇,
松田 隆宏,
花岡悟一郎,
田中圭介.
一方向完全漏洩に対して安全な署名方式,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
田中圭介,
石田愛,
江村恵太,
花岡悟一郎,
坂井祐介,
山田翔太.
セルフレス匿名性を満たすグループ署名の一般的構成,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
田中圭介,
黒田圭介,
北川冬航,
安田聖.
秘密鍵設定における関数型暗号の安全性について,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
田中圭介,
山田古都子,
石田愛.
改ざん不可能性符号と漏洩,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
澤井優樹,
田中圭介,
王煜宇.
格子に基づく鍵失効機能付き属性ベース暗号,
冬のLAシンポジウム2015,
Jan. 2016.
-
田中圭介,
猪俣漸,
遠山裕之.
対象関数クラスに対する秘匿回路,
2016年暗号と情報セキュリティシンポジウム,
Jan. 2016.
-
田中圭介,
石田愛,
江村恵太,
花岡悟一郎,
坂井祐介.
非対話否認開示機能付き公開鍵暗号,
第7回 暗号及び情報セキュリティと数学の相関ワークショップ(CRISMATH 2015),
Dec. 2015.
-
田中圭介,
石田愛,
江村恵太,
花岡悟一郎,
坂井祐介.
否認開示機能付き公開鍵暗号,
夏のLAシンポジウム2015,
July 2015.
-
KEISUKE TANAKA,
Maxim Jourenko,
Ryosuke Nakata.
Streaming Signature,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
田中圭介,
石田愛,
江村恵太,
花岡悟一郎,
坂井祐介.
否認可能グループ署名,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
遠山裕之,
小松智之.
回路のエンコード鍵を持つ秘匿回路,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
西山双輝,
遠山裕之.
疑似ランダム関数をもとにした効率的な秘匿回路の構成,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
澤井優樹,
中田亮介.
属性ベース暗号の秘密鍵サイズの効率化,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
見村朔,
澤井優樹,
中田亮介.
代理人再暗号化におけるCCA1安全性に対する再暗号化オラクルの導入,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
小松智之.
効率的な万能算術回路の構成,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
北川冬航,
松田隆宏,
花岡悟一郎.
1ビットProjection-KDM安全性の完備性,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
安田聖,
北川冬航,
松田隆宏,
花岡悟一郎.
IND-CCA1安全性を満たすN-ary完全準同型暗号,
2015年暗号と情報セキュリティシンポジウム,
Jan. 2015.
-
田中圭介,
石田愛,
江村恵太,
花岡悟一郎,
坂井祐介.
否定に関する非対話ゼロ知識証明とその応用,
2014年度冬のLAシンポジウム,
Jan. 2015.
-
田中圭介,
中田亮介.
サンプリングのためのストリーミングアルゴリズムとその応用,
2014年度冬のLAシンポジウム,
Jan. 2015.
-
田中圭介,
小松智之.
秘匿算術回路について,
2014年度冬のLAシンポジウム,
Jan. 2015.
-
KEISUKE TANAKA,
Ryosuke Nakata.
Anonymity for Fully Homomorphic Encryption,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Maxim Jourenko,
Ryosuke Nakata.
Streaming Algorithms for Sampling from Discrete Gaussian Distributions,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Ta Minh Thanh.
Image watermarking based on the nonlinear scale spaces feature,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
KEISUKE TANAKA,
Ta Minh Thanh.
Blind watermarking using the quantized q-logarithm SVD domain,
The 32nd Symposium on Cryptography and Information Security,
Jan. 2015.
-
田中圭介,
北川冬航,
石田愛.
plan-ahead receiver deniable encryption の構成,
2014年 暗号と情報セキュリティシンポジウム.,
Jan. 2014.
-
田中圭介,
石田 愛.
Gentry-Sahai-Waters方式の変形と効率,
2014年 暗号と情報セキュリティシンポジウム,
Jan. 2014.
-
田中圭介,
肥後春菜,
一色寿幸.
Private Set Intersectionに対する委託可能な方式,
The 31st Symposium on Cryptography and Information Security,
Jan. 2014.
-
田中圭介,
中田亮介.
匿名性をもつ整数上の完全準同型暗号,
2014年 暗号と情報セキュリティシンポジウム,
Jan. 2014.
-
Yuyu Wang,
KEISUKE TANAKA.
Strongly Simulation-Extractable Leakage-Resilient NIZK,
2014年 暗号と情報セキュリティシンポジウム,
Jan. 2014.
-
KEISUKE TANAKA,
Toshiyuki Isshiki,
Manh Ha Nguyen.
Factoring-Based Proxy Re-Encryption Schemes,
2014年 暗号と情報セキュリティシンポジウム,
Jan. 2014.
-
田中圭介,
小関義博,
西巻陵,
藤崎英一郎.
準同型署名方式の構成について,
2013年度冬のLAシンポジウム,
Jan. 2014.
-
田中圭介,
肥後春菜,
一色寿幸.
集合を秘匿したまま共通部分を求めるための委託可能な方式,
2013年度冬のLAシンポジウム,
Jan. 2014.
-
Yuyu Wang,
KEISUKE TANAKA.
Generic Transformation to Strongly Unforgeable Signature with Leakage Resiliency,
2014年 暗号と情報セキュリティシンポジウム,
Jan. 2014.
-
田中圭介,
南雲 皓介.
検証委託署名方式とその安全性について,
2014年 暗号と情報セキュリティシンポジウム,
Jan. 2014.
-
KEISUKE TANAKA,
Yoshihiro Koseki,
Ryo Nishimaki,
Eiichiro Fujisaki.
Constructions for Complete Context Hiding Homomorphic Signature from Standard Assumptions,
2014年 暗号と情報セキュリティシンポジウム.,
Jan. 2014.
-
田中圭介,
小松 智之.
universal circuitを用いないXOR効率化,
2014年 暗号と情報セキュリティシンポジウム.,
Jan. 2014.
-
KEISUKE TANAKA,
Hirotoshi Takebe.
Public-Key Steganography with the Grey-Box Channel,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
田中圭介,
中田亮介,
木下雄介,
グエン・マイン・ハー,
一色寿幸.
異なるドメインにおけるIDベースプロキシ再暗号化方式の再考,
2013年 暗号と情報セキュリティシンポジウム.,
Jan. 2013.
-
KEISUKE TANAKA,
Takayuki Otsubo,
Manh Ha Nguyen,
Ryo Nishimaki.
On Master Secret-Key Leakage-Resilient Identity-Based Encryption,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
田中圭介,
肥後,
安永憲司.
二者間プロトコルのゲーム理論的な安全性に向けて,
2013年 暗号と情報セキュリティシンポジウム,
Jan. 2013.
-
田中圭介,
石田愛,
小関義博.
Hohenberger-Waters署名の帰着と変形方式についての考察,
2013年 暗号と情報セキュリティシンポジウム,
Jan. 2013.
-
田中圭介,
河内亮周,
竹部裕俊.
K-wise almost independent permutationの記述長の下界,
2012年度冬のLAシンポジウム,
Jan. 2013.
-
田中圭介,
大坪峻之,
グエンマインハー,
西巻陵.
マスター鍵の漏洩を考慮したIDベース暗号の一般的構成,
Jan. 2013.
-
田中圭介,
小関義博,
西巻陵,
藤崎英一郎.
秘密鍵の漏洩に対して安全なデュアルフォーム署名,
2013年 暗号と情報セキュリティシンポジウム,
Jan. 2013.
-
KEISUKE TANAKA,
Yusuke Kinoshita,
Manh Ha Nguyen,
Toshiyuki Isshiki.
Threshold Proxy Broadcast Re-Encryption,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
KEISUKE TANAKA,
Yusuke Kinoshita,
Manh Ha Nguyen,
Toshiyuki Isshiki.
Proxy Broadcast Re-Encryption with CCA security,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
田中圭介,
南雲 皓介.
non-malleability による circular security の定義とその性質,
2013年 暗号と情報セキュリティシンポジウム,
Jan. 2013.
-
KEISUKE TANAKA,
Toshiyuki Isshiki,
Manh Ha Nguyen.
On the Hardness of the Assumptions Employed in the Proxy Re-Encryption Schemes from IWSEC2011,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
KEISUKE TANAKA,
Akinori Kawachi,
Hirotoshi Takebe.
Lower Bounds for Key Length of Non-malleable Symmetric-Key Encryption Schemes,
The 30th Symposium on Cryptography and Information Security,
Jan. 2013.
-
KEISUKE TANAKA,
Toshiyuki Isshiki,
Manh Ha Nguyen.
A Proxy Re-Encryption Scheme with CCA Security on Re-Encrypted Ciphertext,
2012年 暗号と情報セキュリティシンポジウム,
Jan. 2012.
-
KEISUKE TANAKA,
Yusuke Kinoshita.
Non-malleability of Broadcast Encryption,
2012年暗号とセキュリティシンポジウム,
Jan. 2012.
-
KEISUKE TANAKA,
hirotoshi takebe,
AKINORI KAWACHI.
Symmetric-Key Encryption Schemes with Approximate Non-malleability,
2012年暗号とセキュリティシンポジウム,
Jan. 2012.
-
KEISUKE TANAKA,
Akihiro Yamada.
Relationships among variants of the trapdoor functions,
2012年暗号とセキュリティシンポジウム,
Jan. 2012.
-
田中圭介,
Haruna higo,
Akihiro Yamada,
Kenji yasunaga.
紛失通信のゲーム理論的考察,
the 2012 Symposium on Cryptography and information Security,
Jan. 2012.
-
KEISUKE TANAKA,
Akihiro Yamada,
kenji yasunaga.
Constructions for Weak Oblivious Transfer,
Feb. 2011.
-
田中圭介,
並木 均,
安永 憲司.
KEM/DEM方式における乱数漏洩,
Generic Construction of leakage-resilient CCA2 Stateless/Stateful Public-key Encryption,
Jan. 2011.
-
KEISUKE TANAKA,
Hirotoshi takebe,
Kenji Yasunaga.
Quadratically Secure Oblivious Transfer from Strong one-Way Functions.,
the 2011 Symposium on Cryptography and information Security,
Jan. 2011.
-
KEISUKE TANAKA,
Hirotoshi Takebe,
Kenji Yasunaga.
Security Notions on Selective Opening,
the2011 Symposium on Cryptography and Information Security,
Jan. 2011.
-
KEISUKE TANAKA,
Manh Ha Ngyuyen,
Kenji Yasunaga.
Generic Construction of leakage-resilient CCA2 Stateless/Stateful Public-key Encryption,
the2011 Symposium on Cryptography and Information Security,
Jan. 2011.
-
KEISUKE TANAKA,
Kousuke Nagumo,
Kenji Yasunaga.
On the Security of the matsuda-Nishimaki-Tanaka Proxy Re-Encryption Scheme,
Generic Construction of leakage-resilient CCA2 Stateless/Stateful Public-key Encryption,
Jan. 2011.
-
田中圭介,
並木均,
安永憲司.
公開鍵暗号の乱数漏洩に関する一考察,
コンピュテーション研究会(COMP),
Dec. 2010.
-
KEISUKE TANAKA,
Hitoshi Namiki,
Kenji Yasunaga.
On Randomness leakage in public-Key Encryption,
コンピュテーション研究会,
Nov. 2010.
-
河内亮周,
岡本吉央,
田中圭介,
安永憲司.
合理的なプレイヤーは合理的な暗号プロトコルを避ける,
2009年度冬のLAシンポジウム,
Feb. 2010.
-
KEISUKE TANAKA,
AKINORI KAWACHI,
Yoshio Okamoto,
Kenji Yasunaga.
One-round reconstruction for rational secret sharing,
2010年暗号と情報セキュリティシンポジウム,
Jan. 2010.
-
KEISUKE TANAKA,
Hitoshi Namiki,
Kenji Yasunaga.
public-Key Encryption Resilient to Randomness Leakage.,
The 2010 Symposium on Cryptography and information security,
Jan. 2010.
-
田中圭介,
西巻 陵,
藤﨑 英一郎.
標準仮定に基づいた非対話型かつ再利用可能で頑強なコミットメント方式,
The 2010 Symposium on Cryptography and information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Mario Larangeira.
Weakened Random oracle Models Without Programmability.,
The 2010 symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Keita Xagawa.
Proxy Re-Encryption based on learning with Errors,
The 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Akihiro Yamada,
Kenji Yasunaga.
Weak Oblivious Transfer from Strong One-Way Permutations,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Yuki Tan,
Kenji Yasunaga.
Non-Malleability on Trapdoors in Public-Key Encryption with Keyword Search.,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki.
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
田中圭介,
河内 亮周,
草川 恵太.
ルジャンドル列の擬似乱数性と頑健な量子状態復号,
the 2010 Symposium on Cryptography and Information Security,
Jan. 2010.
-
KEISUKE TANAKA,
Takato Hirano.
key Generation for Fast inversion of the Paillier Encryption Function,
The 4th International Workshop on Securitu,IWSEC2009,information of Processing Society of Japan,
pp. 1-16,
Oct. 2009.
-
平野 貴人,
田中圭介.
暗号化関数とその性質についてーRSA関数とPaillier関数,
2008年度冬のLAシンポジウム,
Feb. 2009.
-
田中圭介,
草川恵太.
イデアル版 LWE 仮定に基づく IND-CCA2 安全な暗号方式,
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 4A2-5,
Jan. 2009.
-
KEISUKE TANAKA,
Toshihide Matsuda,
Ryo Nishimaki,
Akira Numayama.
Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Extended Abstruct),
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 2B2-4,
Jan. 2009.
-
KEISUKE TANAKA,
Yuuki Tan,
Hirotoshi Takebe.
New Security Notions for Public-Key Encryption with Keyword Search,
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 3B1-3,
Jan. 2009.
-
KEISUKE TANAKA,
AKINORI KAWACHI,
Akira Numayama,
Keita Xagawa.
Security of the OAEP Encryption Scheme in the Weakened Random Oracle Models,
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 3D1-2,
Jan. 2009.
-
KEISUKE TANAKA,
Akira Numayama.
On the Weak Ideal Compression Functions,
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 3D1-3,
Jan. 2009.
-
Takato Hirano,
Keisuke Tanaka.
Key generation on fast inversion of the Paillier encryption function,
暗号と情報セキュリティシンポジウム2009,
2009年 暗号と情報セキュリティシンポジウム,
pp. 3F2-1,
Jan. 2009.
-
田中圭介,
河内亮周,
沼山晃,
草川恵太.
近似サンプリング法の精度保証,
2009年 暗号とセキュリティシンポジウム,
2009年 暗号とセキュリティシンポジウム,
pp. 3D1-1,
Jan. 2009.
-
田中圭介,
草川恵太.
NTRU 暗号に関するゼロ知識証明,
大津,
2009年 暗号とセキュリティシンポジウム,
2009年 暗号とセキュリティシンポジウム,
pp. 3F2-4,
Jan. 2009.
-
田中圭介,
草川恵太.
NFALSE : 多項式環に基づくより高速な公開鍵暗号,
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 3F2-5,
Jan. 2009.
-
KEISUKE TANAKA,
Mario Larangeira,
Akira Numayama.
A Random Oracle Model with Setting and Watching Queries,
2009年 暗号と情報セキュリティシンポジウム,
2009年 暗号と情報セキュリティシンポジウム,
pp. 3D1-4,
Jan. 2009.
-
沼山晃,
河内亮周,
草川恵太,
田中圭介.
統計的距離を考慮したサンプリング,
2008年夏のLAシンポジウム,
July 2008.
-
Keita Xagawa,
Keisuke Tanaka.
A Compact Signature Scheme with Ideal Lattice (Extended Abstract),
2008総合大会講演論文集 (Proceedings of the 2008 IEICE General Conference),
Proceedings of the 2008 IEICE General Conference,
Mar. 2008.
-
田中圭介,
作本紘一.
鍵交換可能署名,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 3F3-5,
Jan. 2008.
-
沼山晃,
一色寿幸,
田中圭介.
ハッシュ関数に対する攻撃を考慮したIDベース暗号の安全性,
2008年暗号と情報セキュリティシンポジウム,
Jan. 2008.
-
沼山晃,
一色寿幸,
田中圭介.
ハッシュ関数に対する攻撃を考慮した電子署名の安全性,
2008年暗号と情報セキュリティシンポジウム,
Jan. 2008.
-
田中圭介,
井上大輔.
忘却通信に関連するプロトコルの対称性,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 2E4-5,
Jan. 2008.
-
平野 貴人,
田中圭介,
和田幸一郎.
暗号文の単純な分解,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 1F1-5,
Jan. 2008.
-
平野 貴人,
田中圭介,
和田幸一郎.
Schmidt-Takagi 暗号方式の変形,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 1F1-3,
Jan. 2008.
-
樋渡玄良,
Keisuke Tanaka.
Relations Among Combined Notions of Security for Public-Key Encryption Schemes,
2008年暗号と情報セキュリティシンポジウム,
Jan. 2008.
-
田中圭介,
ラランジエラマリオ.
ペアリングを用いた署名方式と Strong Diffie-Hellman 問題の関係,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 3F2-1,
Jan. 2008.
-
田中圭介,
西巻陵,
藤崎 英一郎.
二つのモデルの差を示す新たな暗号の実例,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 2F1-4,
Jan. 2008.
-
田中圭介,
草川恵太,
河内亮周.
格子問題に基づく高い安全性をもつ認証方式,
2008年 暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 3D3-1,
Jan. 2008.
-
田中圭介,
草川 恵太,
河内 亮周.
格子問題に基づくコンパクトな署名方式,
2008 年暗号と情報セキュリティシンポジウム,
Jan. 2008.
-
田中圭介,
竹部裕俊.
認証つき公開鍵ステガノグラフィー,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 3F1-5,
Jan. 2008.
-
林良太郎,
Keisuke Tanaka.
The semantic security and the non-mailleability with the randomness revealed for public-key encryption,
2008年暗号と情報セキュリティシンポジウム,
Jan. 2008.
-
井上大輔,
田中圭介.
条件付き紛失通信の対称性,
2008年冬のLAシンポジウム,
Jan. 2008.
-
田中圭介,
草川恵太.
イデアル格子問題に基づくコンパクトな署名方式,
2008年暗号と情報セキュリティシンポジウム,
2008年 暗号と情報セキュリティシンポジウム,
pp. 3D3-2,
Jan. 2008.
-
草川恵太,
河内亮周,
田中圭介.
格子問題に基づく認証および署名方式,
2007年度夏のLAシンポジウム,
July 2007.
-
平野 貴人,
田中圭介.
誤り訂正符号を用いた公開鍵暗号方式,
2007年夏のLAシンポジウム,
July 2007.
-
Keita Xagawa,
AKINORI KAWACHI,
Keisuke Tanaka.
Multi-Bit Cryptosystems based on Lattice Problems,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 2A4-4,
Jan. 2006.
-
Ryotaro Hayashi,
Keisuke Tanaka.
Universally Anonymizable Public-Key Encryption,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 1F3-2,
Jan. 2006.
-
Ryotaro Hayashi,
Keisuke Tanaka.
Generic Conversion for the Anonymity against the Adaptive Chosen Ciphertext Attack,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 1F3-1,
Jan. 2006.
-
Keisuke Tanaka,
Ryotaro Hayashi.
Relationships between Data-Privacy and Key-Privacy,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 1A2-1,
Jan. 2006.
-
Shizu Kanauchi,
Keisuke Tanaka.
Signcryption with Batch Verification,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 2A3-4,
Jan. 2006.
-
Manabu Suzuki,
Toshiyuki Isshiki,
Keisuke Tanaka.
Sanitizable Signature with Secret Information,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 4A1-2,
Jan. 2006.
-
Harunaga Hiwatari,
Keisuke Tanaka.
Fair Exchange of Signatures in the Many-to-One Model,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 3A4-4,
Jan. 2006.
-
Hiroki Hada,
Keisuke Tanaka.
A Password-Based Authenticated Key Exchange Protocol in the Three Party Setting,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 3D3-2,
Jan. 2006.
-
Chihiro Ohyama,
Keisuke Tanaka.
Universal Designated-Verifier Ring Signature,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 3A3-2,
Jan. 2006.
-
Masatoshi Yashiro,
Keisuke Tanaka.
Analysis of the Waseda-Soshi-Miyaji scheme and on Quantum Computation Signature,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 3C2-1,
Jan. 2006.
-
Naoyuki Yamashita,
Keisuke Tanaka.
Secret Handshake with Multiple Groups,
2006年 暗号と情報セキュリティシンポジウム,
2006年 暗号と情報セキュリティシンポジウム 予稿集,
pp. 4D2-3,
Jan. 2006.
-
Manabu Suzuki,
Keisuke Tanaka.
ランダムオラクルモデルを用いたプロトコルの指標と方式,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 151-156,
Jan. 2005.
-
Shizu Kanauchi,
Keisuke Tanaka.
Computational Bilinear Diffie-Hellman問題に基づく複数キーワード検索つき公開鍵暗号方式,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 343-348,
Jan. 2005.
-
Harunaga Hiwatari,
Keisuke Tanaka.
Cramer-Shoup の構成法による平方剰余問題と関連する暗号方式,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 481-486,
Jan. 2005.
-
Akihiro Mihara,
Keisuke Tanaka.
指定検証者署名への変換が可能な Aggregate Signature,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 1453-1458,
Jan. 2005.
-
Ryotaro Hayashi,
Keisuke Tanaka.
匿名性をもつ RSA 暗号方式のための Sampling Twice テクニック,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 1321-1326,
Jan. 2005.
-
Ryotaro Hayashi,
Keisuke Tanaka.
ElGamal 暗号と Cramer-Shoup 暗号をもとにした匿名性を持つ暗号方式,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 1315-1320,
Jan. 2005.
-
Hiroki Hada,
Keisuke Tanaka.
認証付き鍵交換プロトコルにおける non-malleability に基づく安全性,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 1087-1092,
Jan. 2005.
-
Takao Onodera,
Keisuke Tanaka.
中程度の難しさをもつ関数のモデルと方式,
2005年 暗号と情報セキュリティシンポジウム,
2005 年暗号と情報セキュリティシンポジウム 予稿集,
pp. 799-804,
Jan. 2005.
その他の論文・著書など
-
Yuyu Wang,
KEISUKE TANAKA.
How to strengthen the security of Signature Schemes in the leakage Models: A Survey,
Mathematical Modeling for Next-generation Cryptography,
Aug. 2017.
-
KEISUKE TANAKA,
Satoshi Yasuda,
Fuyuki Kitagawa.
Constructions for the INDCCA1 secure Fully Homomorphic Encryption,
Mathematical Modeling for Next-generation Cryptography,
Aug. 2017.
-
田中圭介.
クラウド環境における組織暗号機密通信のための暗号化状態処理を廻って,
MELT up フォーラム「組織間機密通信のための組織暗号の研究開発と社会的利用」,
June 2015.
-
田中圭介.
公開鍵暗号技術の最新動向について,
CRYPTRECシンポジウム,
Mar. 2010.
-
田中圭介.
イデアル格子を用いた Fully Homomorphic Encryption について,
第8回「代数学と計算」研究集会,
Dec. 2009.
-
田中圭介.
サンプリングアルゴリズムとその暗号への応用,
電子情報通信学会 コンピュテーション研究会,
May 2009.
-
田中圭介.
弱められたランダムオラクルモデルと公開鍵の安全性,
第3回公開鍵暗号の安全な構成とその応用ワークショップ,
Feb. 2009.
-
田中圭介.
公開鍵暗号における匿名性,
公開鍵暗号の安全な構成とその応用ワークショップ,
Feb. 2006.
-
田中圭介.
量子公開鍵暗号について,
第 12 回 理財工学研究センターシンポジウム 「量子暗号最前線 - 基礎から最新の話題まで」,
June 2002.
-
田中圭介.
量子公開鍵暗号,
電子情報通信学会 総合大会,
Mar. 2002.
特許など
学位論文
[ BibTeX 形式で保存 ]
[ 論文・著書をCSV形式で保存
]
[ 特許をCSV形式で保存
]
|