Pairing-Based Cryptography - Pairing 2010
4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
Article
This study aimed to investigate the frequency of COVID-19 vaccine-induced reactive change and potential factors including blood type correlated with increased FDG uptake on positron emission tomography (PET)/c...
Living Reference Work Entry In depth
Chapter and Conference Paper
Electronic cash (e-cash) systems need to satisfy the property of anonymity, unforgeability, and transparency which prevent criminal activities from abuse of anonymity. Observers proposed by Chaum et al. and Br...
Article
This study presents a novel approach for estimating vital capacity using cough sounds and proposes a neural network-based model that utilizes the reference vital capacity computed using the lambda-mu-sigma met...
Chapter and Conference Paper
Micropayments are one of the challenges in cryptocurrencies. The problems in realizing micropayments in the blockchain are the low throughput and the high blockchain transaction fee. As a solution, decentraliz...
Chapter and Conference Paper
Double-spending attacks on fast payments are one of the fatal architectural problems in Cryptocurrencies. Dmitrienko et al. proposed an offline fast payment scheme that relies on tamper-proof wallets produced ...
Chapter and Conference Paper
In this paper, we construct the Confidential and Auditable Payments (CAP) scheme. We keep the transaction confidential by writing ciphertexts of transactions in a ledger. We realize the soundness of the CAP sc...
Article
Oblivious polynomial evaluation (OPE) consists of a two-party protocol where a sender inputs a polynomial \(p(x)\) ...
Reference Work Entry In depth
Book and Conference Proceedings
4th International Conference, Yamanaka Hot Spring, Japan, December 2010. Proceedings
Chapter and Conference Paper
Governments and international standards bodies have established certification procedures for security-critical technologies, such as cryptographic algorithms. Such standards have not yet been established for c...
Chapter
In this chapter, we will show how to achieve unconditional or information-theoretic security in electronic voting with the following property:
Book and Conference Proceedings
8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings
Chapter and Conference Paper
We propose a matching algorithm secure against the wolf attack in one-to-one biometric authentications. Our proposed algorithm embeds a wolf-judgement function in a traditional matching algorithm. We show that...
Chapter and Conference Paper
In this paper, we propose a theoretical framework to construct matching algorithms for any biometric authentication systems. Conventional matching algorithms are not necessarily secure against strong intention...
Chapter and Conference Paper
Most electronic cash systems being deployed look very different from what academics have been envisioning over the last 3 decades. Experts on the panel gave different definitions for electronic cash, surveyed ...
Chapter and Conference Paper
Provision of context-dependent services is triggered when the context satisfies an execution condition. To deliver these services, users’ contexts have to be determined by terminals such as GPS. However, GPS h...
Chapter and Conference Paper
This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into...
Chapter and Conference Paper
We introduce an information theoretical model for oblivious polynomial evaluation relying on predistributed data, and prove very general lower bounds on the size of the predistributed data, as well as the size...
Chapter and Conference Paper
This paper presents a non-interactive verifiable secret sharing scheme (VSS) tolerating a dishonest majority based on data predistributed by a trusted authority. As an application of this VSS scheme we present...