Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Forward-Secure Public Key Encryption Without Key Update from Proof-of-Stake Blockchain

    A forward-secure public-key encryption (PKE) scheme prevents eavesdroppers from decrypting past ciphertexts in order to mitigate the damage caused by a potential secret key compromise. In prior works, forward ...

    Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide in Progress in Cryptology – INDOCRYPT 2021 (2021)

  2. No Access

    Chapter and Conference Paper

    Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC

    Multiparty computation (MPC) is a cryptographic method that enables a set of parties to compute an arbitrary joint function of the private inputs of all parties and does not reveal any information other than t...

    Hikaru Tsuchida, Takashi Nishide in Information Security and Privacy (2021)

  3. No Access

    Chapter and Conference Paper

    Load Balancing for Sharded Blockchains

    Sharding is an approach to designing a highly scalable blockchain. A sharded blockchain achieves parallelism by dividing consensus nodes (validators) into groups called shards and making them process different...

    Naoya Okanami, Ryuya Nakamura, Takashi Nishide in Financial Cryptography and Data Security (2020)

  4. No Access

    Chapter and Conference Paper

    Regularization with Latent Space Virtual Adversarial Training

    Virtual Adversarial Training (VAT) has shown impressive results among recently developed regularization methods called consistency regularization. VAT utilizes adversarial samples, generated by injecting pertu...

    Genki Osada, Budrul Ahsan, Revoti Prasad Bora in Computer Vision – ECCV 2020 (2020)

  5. No Access

    Chapter and Conference Paper

    One-Time Delegation of Unlinkable Signing Rights and Its Application

    Delegation of signing rights can be useful to promote effective resource sharing and smooth cooperation among participants in distributed systems, and in many situations, we often need restricted delegation su...

    Takashi Nishide in Provable and Practical Security (2020)

  6. No Access

    Chapter and Conference Paper

    Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring

    Secure computation is the technology that computes an arbitrary function represented as a circuit without revealing input values. Typical technologies related to secure computation are secure multiparty comput...

    Hikaru Tsuchida, Takashi Nishide, Yusaku Maeda in Provable and Practical Security (2020)

  7. No Access

    Chapter and Conference Paper

    Identity-Based Key-Insulated Aggregate Signatures, Revisited

    Identity-based key-insulated cryptography is a cryptography which allows a user to update an exposed secret key by generating a temporal secret key as long as the user can keep any string as its own public key...

    Nobuaki Kitajima, Naoto Yanai, Takashi Nishide in Information Security and Cryptology (2018)

  8. Chapter and Conference Paper

    Network Intrusion Detection Based on Semi-supervised Variational Auto-Encoder

    Network intrusion detection systems (NIDSs) based on machine learning have been attracting much attention for its potential ability to detect unknown attacks that are hard for signature-based NIDSs to detect. ...

    Genki Osada, Kazumasa Omote, Takashi Nishide in Computer Security – ESORICS 2017 (2017)

  9. No Access

    Chapter and Conference Paper

    Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards

    We consider the problem of searchable encryption scheme which allows a user to search over encrypted data without decrypting it. Existing schemes in the symmetric setting only deal with equality search or a li...

    Fangming Zhao, Takashi Nishide in Network and System Security (2016)

  10. Chapter and Conference Paper

    Size-Hiding Computation for Multiple Parties

    Lindell, Nissim, and Orlandi (ASIACRYPT 2013) studied feasibility and infeasibility of general two-party protocols that hide not only the contents of the inputs of parties, but also some sizes of the inputs an...

    Kazumasa Shinagawa, Koji Nuida, Takashi Nishide in Advances in Cryptology – ASIACRYPT 2016 (2016)

  11. No Access

    Chapter and Conference Paper

    Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs

    Aggregate signatures are digital signatures where n signers sign n individual documents and can aggregate individual signatures into a single short signature. Although aggregate signatures are expected to enhance...

    Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide in Trusted Systems (2016)

  12. No Access

    Chapter and Conference Paper

    Revocable Decentralized Multi-Authority Functional Encryption

    Attribute-Based Encryption (ABE) is regarded as one of the most desirable cryptosystems realizing data security in the cloud storage systems. Functional Encryption (FE) which includes ABE and the ABE system wi...

    Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto in Progress in Cryptology – INDOCRYPT 2016 (2016)

  13. No Access

    Chapter and Conference Paper

    Secure \((M+1)\) st-Price Auction with Automatic Tie-Break

    In auction theory, little attention has been paid to a situation where the tie-break occurs because most of auction properties are not affected by the way the tie-break is processed. Meanwhile, in secure aucti...

    Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta in Trusted Systems (2015)

  14. No Access

    Chapter and Conference Paper

    Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards

    It is well-known that a protocol for any function can be constructed using only cards and various shuffling techniques (this is referred to as a card-based protocol). In this paper, we propose a new type of cards...

    Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida in Provable Security (2015)

  15. No Access

    Chapter and Conference Paper

    Secure Multi-Party Computation Using Polarizing Cards

    It is known that, using just a deck of cards, an arbitrary number of parties with private inputs can securely compute the output of any function of their inputs. In 2009, Mizuki and Sone constructed a six-card...

    Kazumasa Shinagawa, Takaaki Mizuki in Advances in Information and Computer Secur… (2015)

  16. No Access

    Chapter and Conference Paper

    A Short Fail-Stop Signature Scheme from Factoring

    Fail-stop signature (FSS) is information theoretically secure digital signature in the sense that even if a signature is forged, the signer can prove the forgery with overwhelming probability. There are many k...

    Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka in Provable Security (2014)

  17. Chapter and Conference Paper

    Supporting Secure Provenance Update by Kee** “Provenance” of the Provenance

    Provenance of data is a documentation of the origin and processes that produce the data. Many researchers argue that the provenance should be immutable: once a provenance is submitted, it should not be changed...

    Amril Syalim, Takashi Nishide, Kouichi Sakurai in Information and Communication Technology (2013)

  18. No Access

    Chapter and Conference Paper

    Analysis of Methods for Detecting Compromised Nodes and its Countermeasures

    The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first revie...

    Fangming Zhao, Takashi Nishide, Yoshiaki Hori in IT Convergence and Security 2012 (2013)

  19. No Access

    Chapter and Conference Paper

    Adaptive and Composable Non-interactive String-Commitment Protocols

    In this paper, a non-interactive string-commitment protocol in the common reference string model is presented and analyzed. We show that the proposed (length-flexible) commitment protocol realizes the universa...

    Huafei Zhu, Tadashi Araragi, Takashi Nishide in e-Business and Telecommunications (2012)

  20. No Access

    Chapter and Conference Paper

    Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries

    Designing non-committing encryptions tolerating adaptive adversaries is a challenging task. In this paper, a simple implementation of non-committing encryptions is presented and analyzed in the strongest secur...

    Huafei Zhu, Tadashi Araragi, Takashi Nishide in e-Business and Telecommunications (2012)

previous disabled Page of 2