Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Signature for Objects: Formalizing How to Authenticate Physical Data and More

    While the integrity of digital data can be ensured via digital signatures, ensuring the integrity of physical data, i.e., objects, is a more challenging task. For example, constructing a digital signature on d...

    Ryuya Hayashi, Taiki Asano, Junichiro Hayata in Financial Cryptography and Data Security (2024)

  2. No Access

    Chapter and Conference Paper

    Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality

    Fault-tolerant aggregate signature (FT-AS) is a special type of aggregate signature that is equipped with the functionality for tracing signers who generated invalid signatures in the case an aggregate signatu...

    Ryu Ishii, Kyosuke Yamashita, Zihao Song in Attacks and Defenses for the Internet-of-T… (2022)

  3. No Access

    Chapter and Conference Paper

    Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures

    Aggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices measure their...

    Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai in Applied Cryptography and Network Security … (2021)

  4. Chapter and Conference Paper

    Constant-Round Client-Aided Secure Comparison Protocol

    We present an improved constant-round secure two-party protocol for integer comparison functionality, which is one of the most fundamental building blocks in secure computation.

    Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata in Computer Security (2018)

  5. Chapter and Conference Paper

    Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem

    The hardness of the shortest vector problem for lattices is a fundamental assumption underpinning the security of many lattice-based cryptosystems, and therefore, it is important to evaluate its difficulty. He...

    Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka in Public-Key Cryptography – PKC 2018 (2018)

  6. No Access

    Chapter and Conference Paper

    Faster Explicit Formulae for Computing Pairings via Elliptic Nets and Their Parallel Computation

    In this paper, we discuss computations of optimal pairings over some pairing-friendly curves and a symmetric pairing over supersingular curves via elliptic nets. We show that optimal pairings can be computed m...

    Hiroshi Onuki, Tadanori Teruya in Advances in Information and Computer Secur… (2016)

  7. Chapter and Conference Paper

    Attribute Based Encryption with Direct Efficiency Tradeoff

    We propose the first fully secure unbounded Attribute-Based Encryption (ABE) scheme such that the key size and ciphertext size can be directly traded off. Our proposed scheme is parameterized by a positive int...

    Nuttapong Attrapadung, Goichiro Hanaoka in Applied Cryptography and Network Security (2016)

  8. No Access

    Chapter and Conference Paper

    On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data

    The human genome can identify an individual and determine the individual’s biological characteristics, and hence has to be securely protected in order to prevent privacy issues. In this paper we point out, how...

    Tadanori Teruya, Koji Nuida, Kana Shimizu in Advances in Information and Computer Secur… (2015)

  9. No Access

    Chapter and Conference Paper

    Round-Efficient Private Stable Matching from Additive Homomorphic Encryption

    In the present paper, we propose private stable matching protocols to solve the stable marriage problem with the round complexity ...

    Tadanori Teruya, Jun Sakuma in Information Security (2015)

  10. No Access

    Chapter and Conference Paper

    Constructing Symmetric Pairings over Supersingular Elliptic Curves with Embedding Degree Three

    In the present paper, we propose constructing symmetric pairings by applying the Ate pairing to supersingular elliptic curves over finite fields that have large characteristics with embedding degree three. We ...

    Tadanori Teruya, Kazutaka Saito in Pairing-Based Cryptography – Pairing 2013 (2014)

  11. No Access

    Chapter and Conference Paper

    High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves

    This paper describes the design of a fast software library for the computation of the optimal ate pairing on a Barreto–Naehrig elliptic curve. Our library is able to compute the optimal ate pairing over a 254-...

    Jean-Luc Beuchat, Jorge E. González-Díaz in Pairing-Based Cryptography - Pairing 2010 (2010)