Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    Quantum verifiable protocol for secure modulo zero-sum randomness

    We propose a new cryptographic resource, secure modulo zero-sum randomness, as a resource to implement a task of secure modulo summation, and its quantum protocol. Secure modulo summation is the calculation of...

    Masahito Hayashi, Takeshi Koshiba in Quantum Information Processing (2022)

  2. Article

    Open Access

    Frequent contiguous pattern mining over biological sequences of protein misfolded diseases

    Proteins are integral part of all living beings, which are building blocks of many amino acids. To be functionally active, amino acids chain folds up in a complex way to give each protein a unique 3D shape, wh...

    Mohammad Shahedul Islam, Md. Abul Kashem Mia, Mohammad Shamsur Rahman in BMC Bioinformatics (2021)

  3. No Access

    Chapter and Conference Paper

    A Guests Managing System with Lattice-Based Verifier-Local Revocation Group Signature Scheme with Time-Bound Keys

    this paper, we propose a visitors managing system using group signature schemes. The paper focuses on situations that guests who are residing in a hotel are like to keep their activities such as accessing h...

    Maharage Nisansala Sevwandi Perera in Proceedings of the Fifth International Con… (2021)

  4. No Access

    Chapter and Conference Paper

    Enhanced Secure Comparison Schemes Using Homomorphic Encryption

    Comparing two integers under the encrypted form is useful for privacy-preserving data mining, secure auction, and so on. Based on the ring-learning with errors (ring-LWE) assumption, Saha and Koshiba proposed ...

    Lihua Wang, Tushar Kanti Saha in Advances in Networked-Based Information Sy… (2021)

  5. No Access

    Article

    Arbitrable blind quantum computation

    Blind quantum computation (of a single-server case) is a two-party cryptographic protocol which involves a quantum computation server Bob and a client Alice who wants to delegate her quantum computation to Bob...

    Go Sato, Takeshi Koshiba, Tomoyuki Morimae in Quantum Information Processing (2019)

  6. No Access

    Chapter and Conference Paper

    New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption

    We introduce new isogeny-related assumptions called Isog-DDH and Isog-DBDH assumptions. By using the assumptions, we reinforce security of several existing (hierarchical) identity-/attribute-based encryption (...

    Takeshi Koshiba, Katsuyuki Takashima in Information Security and Cryptology – ICISC 2018 (2019)

  7. No Access

    Chapter and Conference Paper

    Perfectly Secure Message Transmission Against Independent Rational Adversaries

    Secure Message Transmission (SMT) is a two-party protocol by which the sender can privately transmit a message to the receiver through multiple channels. An adversary can corrupt a subset of channels and makes...

    Kenji Yasunaga, Takeshi Koshiba in Decision and Game Theory for Security (2019)

  8. No Access

    Chapter and Conference Paper

    Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation

    In group signature schemes, signers prove verifiers, their validity of signing through an interactive protocol in zero-knowledge. In lattice-based group signatures with Verifier-local revocation (VLR), group m...

    Maharage Nisansala Sevwandi Perera in Advances in Network-Based Information Syst… (2019)

  9. No Access

    Chapter and Conference Paper

    Fourier-Based Function Secret Sharing with General Access Structure

    Function secret sharing (FSS) scheme is a mechanism that calculates a function f(x) for \(x\in \{0,1\}^n\) which is shared amon...

    Takeshi Koshiba in Mathematics and Computing (2018)

  10. No Access

    Chapter and Conference Paper

    Private Comparison Protocol and Its Application to Range Queries

    We consider the problem of private comparison protocol and its application to private range queries for accessing a private database. Very recently, Saha and Koshiba (NBiS 2017) proposed an efficient privacy-p...

    Tushar Kanti Saha, Mayank, Deevashwer in Internet and Distributed Computing Systems (2018)

  11. Chapter and Conference Paper

    Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation

    Even though Verifier-local revocation mechanism seems to be the most flexible revocation method that suits for any size of groups it could not reach strong security yet. Verifier-local revocation technique nee...

    Maharage Nisansala Sevwandi Perera in Information and Communications Security (2018)

  12. No Access

    Chapter and Conference Paper

    Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation

    This paper presents a lattice-based group signature scheme that provides both member registration and member revocation with verifier-local revocation. Verifier-local revocation (VLR) seems to be the most suit...

    Maharage Nisansala Sevwandi Perera in Information Security Practice and Experien… (2018)

  13. No Access

    Chapter and Conference Paper

    Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership

    In proxy re-encrytpion (PRE) scheme, the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in variou...

    Ei Mon Cho, Lwin San, Takeshi Koshiba in Advances in Network-Based Information Systems (2018)

  14. No Access

    Chapter and Conference Paper

    An Efficient Privacy-Preserving Comparison Protocol

    We address an efficient privacy-preserving comparison protocol using somewhat homomorphic encryption based on ring learning with errors (ring-LWE) problem in the semi-honest model. Here we take two l-bit integers...

    Tushar Kanti Saha, Takeshi Koshiba in Advances in Network-Based Information Systems (2018)

  15. No Access

    Chapter and Conference Paper

    Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions

    Both member registration and member revocation are essential features in group signature schemes. In ASIACRYPT 2016 Libert, Ling, Mouhartem, Nguyen, and Wang suggested a simple joining mechanism with their lat...

    Maharage Nisansala Sevwandi Perera, Takeshi Koshiba in Security and Trust Management (2018)

  16. No Access

    Chapter and Conference Paper

    Perfectly Secure Message Transmission Against Rational Timid Adversaries

    Secure Message Transmission (SMT) is a two-party cryptographic protocol by which the sender can securely and reliably transmit messages to the receiver using multiple channels. It is assumed that an adversary ...

    Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba in Decision and Game Theory for Security (2018)

  17. No Access

    Chapter and Conference Paper

    Fully Dynamic Group Signature Scheme with Member Registration and Verifier-Local Revocation

    Since Bellare et al. (EUROCRYPT 2003) proposed a security model for group signature schemes, almost all the securities of group signature schemes have been discussed in their model (the BMW03 model). While the...

    Maharage Nisansala Sevwandi Perera, Takeshi Koshiba in Mathematics and Computing (2018)

  18. No Access

    Chapter and Conference Paper

    Function Secret Sharing Using Fourier Basis

    Function secret sharing (FSS) scheme, formally introduced by Boyle et al. at EUROCRYPT 2015, is a mechanism that calculates a function f(x) for ...

    Takuya Ohsawa, Naruhiro Kurokawa in Advances in Network-Based Information Syst… (2018)

  19. No Access

    Chapter and Conference Paper

    Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys

    One of the prominent requirements in group signature schemes is revoking group members who are misbehaved or resigned. Among the revocation approaches Verifier-local revocation (VLR) is more convenient than ot...

    Maharage Nisansala Sevwandi Perera in Internet and Distributed Computing Systems (2018)

  20. No Access

    Chapter and Conference Paper

    Privacy-Preserving Equality Test Towards Big Data

    In this paper, we review the problem of private batch equality test (PriBET) that was proposed by Saha and Koshiba (3rd APWConCSE 2016). They described this problem to find the equality of an integer within a ...

    Tushar Kanti Saha, Takeshi Koshiba in Foundations and Practice of Security (2018)

previous disabled Page of 3