Publication List

研究業績のリスト

2017年度

学術論文誌

  1. Naoto Yanai, Tomoya Iwasaki, Masaki Inamura, Keiichi Iwamura, “Provably Secure Structured Signature Schemes with Tighter Reductions”, "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E100-A (2017-9) (accepted).
  2. Naoto Yanai, Toru Fujiwara, “Tighter Reductions for Deterministic Identity-Based Signatures”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, (2018-01) (accepted).
  3. Thi Ngoc Diep Pham, Chai Kiat Yeo, Naoto Yanai, Toru Fujiwara, “Detecting Flooding Attack and Accommodating Burst Traffic in Delay Tolerant Networks”, IEEE Transactions on Vehicular Technology (accepted).

国際会議(査読あり)

  1. Takashi Hayata, Yasunori Ishihara, and Toru Fujiwara, ``The Absolute Consistency Problem of Graph Schema Mappings with Uniqueness Constraints,'' Proceedings of the 9th International Conference on Advances in Databases, Knowledge, and Data Applications, pp. 103-110 (2017-05).
  2. Naoto Yanai, “Tightly Secure Identity-Based Multisignatures,” 017 IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW 2017), pp.253-254, IEEE (2017-06).
  3. Hiroyuki Kato, Yasunori Ishihara and Torsten Grust, ``DDO-Free XQuery,'' Proceedings of the 16th International Symposium on Database Programming Languages (2017-09) (accepted).
  4. Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara, “Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model,” Proc. of the 12th International Workshop on Data Privacy Management (DPM 2017), LNCS 10436, Springer (2017-09) (accepted).

研究会発表

  1. 安藤 英里子, 森田 伸義, 河内 尚, 萱島 信, 薦田 憲久, 藤原 融, "車載システム向けセキュリティリスク評価支援システム," 電気学会研究会資料, IS-17-031, pp.17-22 (2017-05).

書籍

  1. Hikaru Kishimoto, Naoto Yanai, Shingo Okamura, “Smart Micro-Grid Systems Security and Privacy”, In Chapter of “An Anonymous Authentication Protocol for Smart Grid”, Springer Book Series on Advances in Information Security (Series Ed. Jajodia, Sushil), Springer (2018-03) (to be published).

招待講演

  1. 矢内 直人, 2017年度 人工知能学会全国大会(JSAI2017), 一般公開企画 “公開特別セッション3:JSTにおける先導的AI研究推進ファンドと若手研究者向け研究支援プログラムACT-Iの紹介”, 人工知能学会, (2017-05).

2016年度

学術論文誌

  1. 杉村 憲司, 石原 靖哲, 藤原 融, ``XPath充足可能性を判定する多項式時間アルゴリズムの提案と評価,'' 情報処理学会論文誌, Vol. 57, No. 5, pp. 1477-1488 (2016-05).
  2. Maki Yoshida and Toru Fujiwara, "Efficient Usage of Cover Free Families in Broadcast Encryption," IEICE Transactions on Fundamentals, Vol.E99-A, No.6, pp.1216-1221 (2016-06).
  3. Hikaru Kishimoto, Naoto Yanai, Shingo Okamura, “SPaCIS: Secure Payment Protocol for Charging Information over Smart Grid”, Journal of Information Processing, Vol.25, No.1, pp12-21 (2017-01).
  4. 田中 和磨, 矢内 直人, 岡田 雅之, 西出 隆志, 岡本栄司, "APAT: BGPSEC におけるアグリゲート署名の導入," 情報処理学会論文誌, Vol.58, No.2, pp.544-556 (2017-02).

国際会議(査読あり)

  1. Kazuma Tanaka, Naoto Yanai, Masayuki Okada, Takashi Nishide, Eiji Okamoto, "APAT: An Application of Aggregate Signatures to BGPSEC," The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Fast Abstract (2016-06).
  2. Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara, "ISDSR : Secure DSR with ID-based Sequential Aggregate Signature," Proc. of the 13th International Joint Conference on e-business and Telecommunications (ICETE 2016), Vol. 4, SECRYPT, pp. 376-387 (2016-07).
  3. Yudai Nagamine, Naoto Yanai, Shingo Okamura, Toru Fujiwara, "Malware for Protocol Misidentification," The 11th International Workshop on Security (IWSEC2016), poster (2016-09).
  4. Kento Takahashi and Yasunori Ishihara, "Formalizations of secrecy of encrypted databases against realistic attackers," Proc. of International Symposium on Information Theory and its Application (ISITA) (2016-11).
  5. Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Toru Fujiwara, “Web Security Model with Cache,” Proc. of International Symposium on Information Theory and its Application (ISITA) (2016-11).
  6. Ryo Fukuyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara, “Towards a Formal Foundation of Protection against Data-Oriented Attacks,” Proc. of International Symposium on Information Theory and its Application (ISITA) (2016-11).
  7. Naoto Yanai, "Towards Provable Security of Dynamic Source Routing Protocol and Its Applications," Proc. of ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, LNCS 9975, pp.231-239 (2016-11).
  8. Naoto Yanai, “On the Tightness of Deterministic Identity-Based Signatures”, Proc. of The Fourth International Symposium on Computing and Networking (CANDAR 2016), pp.168-173 (2016-11).
  9. Hikaru Kishimoto, Naoto Yanai and Shingo Okamura, "An Anonymous Authentication Protocol for Smart Grid," The 5th International Workshop on Security Intricacies in Cyber-Physical Systems and Services (INTRICATESEC 2017) (2016-12) (accepted)

研究会発表

  1. 岸本 光, 矢内 直人, 岡村 真吾, "スマートグリッドにおけるグループ署名を用いた利用者認証プロトコル," コンピュータセキュリティシンポジウム2016 (CSS2016), 3C1-3 (2016-10).
  2. 島本 隼人, 矢内 直人, 岡村 真吾, 藤原 融, "キャッシュを包括するウェブセキュリティモデル," コンピュータセキュリティシンポジウム2016 (CSS2016), 2E4-2 (2016-10).
  3. 福山 遼, 矢内 直人, 岡村 真吾, 藤原 融, "データ指向攻撃の防御に関する一考察," コンピュータセキュリティシンポジウム2016 (CSS2016), 2D4-3 (2016-10).
  4. 長嶺 優大, 矢内 直人, 岡村 真吾, 藤原 融, "MASQWARE: 通信プロトコルを偽装するマルウェア," コンピュータセキュリティシンポジウム2016 (CSS2016), 2B4-1 (2016-10).
  5. 村中 謙太, 矢内 直人, 岡村 真吾, 藤原 融, "IDベースシーケンシャルアグリゲート署名のDynamic Source Routingへの適用," コンピュータセキュリティシンポジウム2016 (CSS2016), 2D3-3 (2016-10).
  6. 矢内 直人, 大久保 隆夫, "非干渉性の再考と応用," 2017年暗号と情報セキュリティシンポジウム, 2A1-3 (2017-01).
  7. 岸本 光, 矢内 直人, 岡村 真吾, "スマートグリッドにおける利用者認証プロトコルの導入に向けた性能評価," 2017年暗号と情報セキュリティシンポジウム, 1C2-5 (2017-01).

解説

  1. 石原 靖哲, 矢内 直人, 藤原 融, ``クラウド時代のデータ秘匿性,'' 電子情報通信学会誌, Vol. 99, No. 10, pp. 986-991 (2016-10).

2015年度

学術論文誌

  1. Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Keisuke Nakano and Yasunori Ishihara, "Context-Preserving XQuery Fusion," Mathematical Structures in Computer Science, Vol.25, No.4, pp.916-941 (2015-05).
  2. Yasunori Ishihara, Yasuhiro Ushirozako, Kengo Mori and Jun Furukawa, "A Secrecy Criterion for Outsourcing Encrypted Databases Based on Inference Analysis," IEICE Transactions on Information and Systems, Vol.E98-D, No.6, pp.1161-1165 (2015-06).
  3. Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, "The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs," World Wide Web Journal, Vol.18, Issue 5, pp.1443-1461 (2015-09).
  4. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara, "Determinacy and Subsumption of Single-valued Bottom-up Tree Transducers," IEICE Transactions on Information and Systems, Vol.E99-D, No.3, pp.575-587 (2016-03).
  5. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eji Okamoto, "Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions," Journal of Information Processing, Vol.24, No.2 (accepted) (2016-4).

国際会議(査読あり)

  1. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto, "Constructions of Fail-Stop Signatures for Multi-Signer Setting", Proc. of the 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), pp.112-123 (2015-5).
  2. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto, "Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack", Proc. of the 12th International Conference on Security and Cryptography (SECRYPT 2015), pp.39-52 (2015-7).
  3. Kenta Muranaka, Naoto Yanai, Shingo Okamura and Toru Fujiwara, "Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers", Proc. of The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015), pp.1329--1336 (2015-8).
  4. Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara, "Toward Secure Routing Protocols for Sensor Networks," The 10th International Workshop on Security (IWSEC2015), poster (2015-8).
  5. Hikaru Kishimoto, Shingo Okamura, Naoto Yanai, "Secure Payment Protocol for Charging Information over SmartGrid," The 10th International Workshop on Security (IWSEC2015), poster (2015-8).
  6. Yuma Higashiyama, Naoto Yanai, Shingo Okamura and Toru Fujiwara, "Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones," The Third International Symposium on Computing and Networking (CANDAR 2015), pp.89-95 (2015-12)
  7. Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto, "Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs," Proc. of The Seventh International Conference on Trusted Systems (INTRUST 2015), LNCS 9565, pp.30-46 (2016-03).
  8. Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura, "Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the computational Diffie-Hellman Assumption," Proc. of The 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), pp.669-676 (2016-03).

研究会発表

  1. 田中 和磨, 矢内 直人, 岡田 雅之, 金山 直樹, 西出 隆志, 岡本 栄司, "BGPSECにおけるアグリゲート署名の導入," コンピュータセキュリティシンポジウム2015 (CSS2015), pp.815-822 (2015-12).
  2. 村中 謙太、矢内 直人、岡村 真吾、藤原 融, "多人数署名を用いたSecure-DSRの提案", 2016年暗号と情報セキュリティシンポジウム, 2E2-1 (2016-01).
  3. 高橋 賢人, 石原 靖哲, "暗号化データベースにおいて暗号文が露出したときの 現実的な攻撃者に対する秘匿性維持の定式化と判定法," 2016年暗号と情報セキュリティシンポジウム, 2B4-1 (2016-01).
  4. 矢内 直人, "経路制御の定式化に向けて:DSR の構成", 2016年暗号と情報セキュリティシンポジウム2016, 3F1-2 (2016-01).
  5. 古田 侑士, 矢内 直人, 唐崎 正史, 江口 勝彦, 石原 靖哲, 藤原 融, "決定性暗号を用いた秘匿ログ分析技術," 電子情報通信学会技術研究報告, ICSS2015-54, Vol. 115, No. 488, pp. 41-46 (2016-03).
  6. 杉村 憲司, 石原 靖哲, 加藤 弘之, 藤原 融, "制限されたDTDクラスのもとでのXQuery式の型推論," 電子情報通信学会技術研究報告, SS2015-82, Vol. 115, No. 508, pp. 37-42 (2016-03).
  7. Yasunori Ishihara, Hiroyuki Kato and Torsten Grust, "XQuery Optimization by Avoiding Node Sorting and Duplicate Elimination," IEICE Technical Report, SS2015-83, Vol. 115, No. 508, pp. 43-48 (2016-03).

招待講演

  1. 石原 靖哲, "クラウド時代のデータ秘匿性について," 電子情報通信学会情報ネットワーク研究会, IN2015-56, pp.19-24 (2015-10).

2014年度

学術論文誌

  1. Maki Yoshida, Kazuya Ohkita and Toru Fujiwara, "Individual Restoration of Tampered Pixels for Statistical Fragile Watermarking," IEICE Transactions on Information and Systems, Vol.E98-D, No.1, pp.58-64 (2015-01).
  2. Maki Yoshida and Toru Fujiwara, "On the Impossibility of d-Multiplicative Non-perfect Secret Sharing," IEICE Transactions on Fundamentals, Vol.E98-A, No.2, pp.767-770 (2015-02).

国際会議(査読あり)

  1. Hironobu Tozuka, Maki Yoshida, Toru Fujiwara, "Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria," Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation (IWIHC 2014), pp.31-36 (2014-06).
  2. Yasunori Ishihara, Hayato Kuwada and Toru Fujiwara, "The Absolute Consistency Problem of XML Schema Mappings with Data Values between Restricted DTDs," Proceedings of the 25th International Conference on Database and Expert Systems Applications, Lecture Notes in Computer Science 8644, pp. 317-327 (2014-09).
  3. Naoto YANAI, Masahiro MAMBO, and Eiji OKAMOTO, “A CDH-Ordered Multisignature Scheme in the Standard Model with Better Efficiency,” Proc. of International Symposium on Information Theory and its Application (ISITA) 2014, pp.236-240 (2014-10).

研究会発表

  1. 戸塚 拓伸, 吉田 真紀, 藤原 融, "IHC電子透かしコンテストの高画質カテゴリにおける加法電子透かし法の性能評価," 電子情報通信学会技術研究報告, EMM2014-53, Vol.114, No.222, pp.53-58 (2014-09).
  2. 杉村 憲司, 石原 靖哲, 藤原 融, "XPath充足可能性を判定する多項式時間アルゴリズムの実装と評価," 情報処理学会関西支部支部大会講演論文集, pp.1-8 (2014-9).
  3. 二神 司, 石原 靖哲, 藤原 融, "XMLスキーマのもとでのXPath問い合わせの型振る舞い等価性を 判定する多項式時間アルゴリズム," 電子情報通信学会技術研究報告, SS2014-29, Vol.114, No.271, pp.23-28 (2014-10).
  4. 東山 侑真, 岡村 慎吾, 矢内 直人, 藤原 融, “タッチパネル端末の特性を利用 した覗き見攻撃耐性をもつ個人認証手法”, 2014年コンピュータセキュリティシ ンポジウム (CSS 2014), Vol. 2014, No.2, pp.1023-1028, (2014-10).
  5. Naoto YANAI, Masahiro MAMNO, and Eiji OKAMOTO, “Ordered Multisignatures Made Shorter”, 第37回情報理論とその応用シンポジウム (SITA 2014), pp.72-77, (2014-12).
  6. 村中 謙太, 矢内 直人, 岡村 真吾, 藤原 融, “多人数署名の実装と評価”, 電子情報通信学会技術研究報告, ICSS2014-78, Vol.114, No.489, pp.91-96 (2015-03).
  7. 東山 侑真, 岡村 真吾, 矢内 直人, 藤原 融, “覗き見攻撃耐性をもつチャレン ジ&レスポンス認証方式”, 2015年電子情報通信学会総合大会, A-7-10, (2015-03).
  8. 戸塚 拓伸, 吉田 真紀, 藤原 融, "IHC評価基準における圧縮率と 加法電子透かし法の最適なパラメータとの関係," 電子情報通信学会技術研究報告, EMM2014-91, Vol.114, No.511, pp.85-90 (2015-03).

2013年度

国際会議(査読あり)

  1. Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara, Hiroyuki Seki and Toru Fujiwara, "Determinacy and Subsumption for Single-valued Bottom-up Tree Transducers," Proceedings of the 7th International Conference on Language and Automata Theory and Applications, Lecture Notes in Computer Science 7810, pp.335-346 (2013-04).
  2. Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, "The Consistency and Absolute Consistency Problems of XML Schema Mappings between Restricted DTDs," Proceedings of the 15th International Asia-Pacific Web Conference, Lecture Notes in Computer Science 7808, pp.228-239 (2013-04).
  3. Nobuaki Yamazoe, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, "Decidability of k-secrecy against Inference Attacks Using Functional Dependencies on XML Databases," Proceedings of the 2013 International Conference on Parallel and Distributed Processing Techniques and Applications, pp.182-188 (2013-07).
  4. Yasunori Ishihara, Nobutaka Suzuki, Kenji Hashimoto, Shogo Shimizu and Toru Fujiwara, "XPath Satisfiability with Parent Axes or Qualifiers Is Tractable under Many of Real-World DTDs," Proceedings of the 14th International Symposium on Database Programming Languages, http://arxiv.org/abs/1308.0769 (2013-08).
  5. Ryo Iwase, Yasunori Ishihara and Toru Fujiwara, "Toward Security Verification against Inference Attacks on Data Trees," 2nd International Workshop on Trends in Tree Automata and Tree Transducers, pp.49-59, http://dx.doi.org/10.4204/EPTCS.134.6 (2013-10).

研究会発表

  1. Takuya Kusaka, Tetsushi Masuno and Toru Fujiwara, "Method to Reduce the Rate of Decoding Errors for Digital Watermarking Using an Error Correcting Code," IEICE Technical Report, IT2013-17, Vol.113, No.153, pp.33-38 (2013-07).
  2. Takuya Kusaka, Toru Fujiwara and Ryuhei Yokoyama, "A Soft Decision Sphere Decoding Based on a Recursive Vector Generator Using Euclidian Distance," IEICE Technical Report, IT2013-33, Vol.113, No.228, pp.7-11 (2013-09).
  3. 丸石 知史, 藤原 融, "適応的に量子雑音制御が可能な[(pq)^2, (2+p(q-1)) (pq-1)]符号の構成法," 電子情報通信学会技術研究報告, IT2013-47, Vol.113, No.411, pp.11-16 (2014-01).
  4. 戸塚 拓伸, 吉田 真紀, 藤原 融, "加法電子透かし法のIHC評価基準による性能評価," 電子情報通信学会技術研究報告, EMM2013-113, Vol.113, No.480, pp.81-86 (2014-03).
  5. 東山 侑真, 岡村 真吾, 藤原 融, "覗き見攻撃耐性をもつ認証手法の圧力センサによる改善," 電子情報通信学会2014年総合大会, (2014-03).

2012年度

学術論文誌

  1. Takuya Kusaka, Ryuhei Yokoyama and Toru Fujiwara, "A Recursive Method on Vector Generation in non-Increasing Order of its Likelihood for all Binary Vectors and its Application for Linear Block Code," IEICE Transactions on Fundamentals, Vol.E95-A, No.4, pp.801-810 (2012-04).
  2. Kenji Hashimoto, Hiroto Kawai, Yasunori Ishihara and Toru Fujiwara, "Decidability of the Security against Inference Attacks using a Functional Dependency on XML Databases," IEICE Transactions on Information and Systems, Vol.E95-D, No.5, pp.1365-1374 (2012-05).

国際会議(査読あり)

  1. Maki Yoshida, Toru Fujiwara, and Marc P.C. Fossorier, "Optimum General Threshold Secret Sharing," the 6th International Conference on Information Theoretic Security (ICITS2012), LNCS 7412, pp.187--204 (2012-08).
  2. Takuya Kusaka, Ryuhei Yokoyama, and Toru Fujiwara, "Soft-Decision Sphere Decoding based on the Recursive Vector Generator," 2012 International Symposium on Information Theory and its Applications (ISITA2012), pp.111-115 (2012-10).
  3. Seigo Ikeda, Maki Yoshida, and Toru Fujiwara, "New Hybrid Additive-Multiplicative Watermarking with Better Tradeoff between Image Quality and Detection Accuracy," 2012 International Symposium on Information Theory and its Applications (ISITA2012), pp.797-801 (2012-10).
  4. Yasunori Ishihara, Kenji Hashimoto, Shogo Shimizu and Toru Fujiwara, "XPath Satisfiability with Downward and Sibling Axes Is Tractable under Most of Real-world DTDs," Proceedings of the 12th International Workshop on Web Information and Data Management, pp.11-18 (2012-11).
  5. Itsuki Suzuki, Maki Yoshida, and Toru Fujiwara, "Generic Construction of GUC Secure Commitment in the KRK Model," the 7th International Workshop on Security (IWSEC2012), accepted (2012-11).
  6. Yasunori Ishihara, Kenji Hashimoto, Atsushi Ohno, Takuji Morimoto and Toru Fujiwara, "Typing XPath Subexpressions With Respect to an XML Schema," Proceedings of the 5th International Conference on Advances in Databases, Knowledge, and Data Applications, pp.128-133 (2013-01).

国際会議(査読なし)

  1. Naoyoshi Okamae, Toru Fujiwara, and Yuichi Kaji, "A Floating Code with Coset Coding," Workshop on Applied Mathematics and Related Topics (2012-10).

研究会発表

  1. 桑田 逸人, 橋本 健二, 石原 靖哲, 藤原 融, "制限されたDTDにおけるXMLスキーママッピングの整合性および絶対整合性判定問題," 2012年夏のLAシンポジウム, S2 (2012-07).
  2. 岩瀬 遼, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへのデータ値比較を含む問合せを考慮した推論攻撃に対する安全性検証法," 2012年夏のLAシンポジウム, S9 (2012-07).
  3. Seigo Ikeda, Maki Yoshida, and Toru Fujiwara, "Hybrid Additive-Multiplicative Watermarking for General Embedding Domains," IEICE Technical Report, EMM2012-2, Vol.112, No.129, pp.9-16 (2012-07).
  4. 岡前 直由, 藤原 融, 楫 勇一, "ハミング符号を用いたコセット符号化によるフローティング符号の構成," 第 35 回情報理論とその応用シンポジウム, pp.123-128, (2012-12).
  5. 楠 洋平, 橋本 健二, 石原 靖哲, 藤原 融, "DTD存在下における兄弟軸を含むPositive XPathクエリの恒真性判定問題," 電子情報通信学会技術研究報告, SS2012-46, Vol.112, No.373, pp.1-6 (2013-01).
  6. 山添 伸晃, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへの関数従属性を用いた推論攻撃に対するk-安全性の決定可能性," 2013年暗号と情報セキュリティシンポジウム予稿集, 1C2-1 (2013-01).
  7. 池田 成吾, 吉田 真紀, 藤原 融, "ハイブリッド電子透かしの組合せに関する検討." The 30th Symposium on Cryptography and Information Security (SCIS2013), 3F1-4 (2013-01).
  8. 池田 成吾, 吉田 真紀, 藤原 融, "加法と乗法のハイブリッド電子透かしの性能に対する理論的評価," 電子情報通信学会技術研究報告, EMM2012-104, Vol.112, No.420, pp.77-82 (2013-01).
  9. 岡前 直由, 藤原 融, 楫 勇一, "ハミング符号を用いたフローティング符号の性能に関する予想の検証," 電子情報通信学会技術研究報告, IT2012-80, Vol.112, No.460, pp.119-124, (2013-03).

2011年度

国際会議(査読あり)

  1. Kenji Hashimoto, Yohei Kusunoki, Yasunori Ishihara and Toru Fujiwara, "Validity of Positive XPath Queries with Wildcard in the Presence of DTDs," The 13th International Symposium on Database Programming Languages, http://www.cs.cornell.edu/conferences/dbpl2011/papers/dbpl11-hashimoto.pdf (2011-08).

研究会発表

  1. Maki Yoshida, Toru Fujiwara, "On the Impossibility of $d$-Multiplicative Non-perfect Secret Sharing," IEICE Tech. Rep., Vol.111, No.34, ISEC2011-5, pp.31-36, May 2011 (2011-05).
  2. Maki Yoshida, Kazuya Ohkita, Toru Fujiwara, "Recovery of Tampered Pixels for Statistical Fragile Watermarking," IEICE Tech. Rep., vol.111, no.126, EMM2011-9, pp.7-12, June 2011 (2011-07).
  3. 澤田 龍太, 橋本 健二, 石原 靖哲, 藤原 融, "正規木文法間の埋め込み可能性問題の決定可能性について," 2011年夏のLAシンポジウム, 19 (2011-07).
  4. 鈴木 斎輝, 吉田 真紀, 藤原 融, "EUC 安全なメッセージ認証のためのmulti-message プロトコルに対する記号的基準," 電子情報通信学会技術研究報告, vol.111, no.285, ISEC2011-57, pp.155-162 (2011-11).
  5. 貴戸 祥郎, 藤原 融, "ネットワーク符号化における線形ブロック符号の復号誤り確率の評価のための結合重み分布に対するマックウィリアムズの等式," 第34回情報理論とその応用シンポジウム, 3.4.1 (CD-ROM) (2011-11).
  6. Itsuki Suzuki, Maki Yoshida, Toru Fujiwara, "Generic Construction of GUC Secure Commitment Protocol in the PKI Model," Proceedings of the 2012 Symposium on Cryptography and Information Security, 1D2-5E (2012-01).
  7. 池田 成吾, 吉田 真紀, 藤原 融, "画質劣化を抑えた加法と乗法のハイブリッド電子透かし," 2012年暗号と情報セキュリティシンポジウム予稿集, 3E2-3 (2012-02).
  8. 澤田 龍太, 橋本 健二, 石原 靖哲, 藤原 融, "決定性線形トップダウン木変換器における問合せ保存の決定可能性," 電子情報通信学会技術研究報告, SS2011-75, Vol.111, No.481, pp.109-114 (2012-03).
  9. Yasunori Ishihara, Shogo Shimizu, Kenji Hashimoto and Toru Fujiwara, "Combining the Tractability of Duplicate-Free DTDs and Disjunction-Capsuled DTDs for XPath Satisfiability with Sibling Axes," IEICE Technical Report, SS2011-76, Vol.111, No.481, pp.115-120 (2012-03).

2010年度

学術論文誌

  1. Kenji Yasunaga and Toru Fujiwara, "On Correctable Errors of Binary Linear Codes," IEEE Trans. on Information Theory, Vol.56, No.6, pp.2537-2548 (2010-06).
  2. 山中 広明, 岡村 真吾, 藤原 融, 吉田 真紀, 石原 靖哲, 秋山 豊和, 加藤 精一, 下條 真司, "評価者間類似度計算の改善による汚染コンテンツダウンロード抑制効果向上," 情報処理学会論文誌, Vol.51, No.8, pp.1428-1442 (2010-08).
  3. Maki Yoshida and Toru Fujiwara, "Toward Digital Watermarking for Cryptographic Data," IEICE Transactions on Fundamentals, Vol.E94-A, No.1, pp.270-272 (2011-01).

国際会議(査読あり)

  1. Maki Yoshida and Toru Fujiwara, "All-or-nothing Property for Efficient Symbolic Analysis," Computational and Symbolic Proofs of Security (2010-04).
  2. Hiroaki Yamanaka, Shingo Okamura, and Toru Fujiwara, "A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay," 2010 the 10th Annual International Symposium on Applications and the Internet (SAINT 2010), Student Session, pp.181-184 (2010-07).
  3. Yasunori Ishihara, Shogo Shimizu and Toru Fujiwara, "Extending the Tractability Results on XPath Satisfiability with Sibling Axes," Proceedings of the 7th International XML Database Symposium, Lecture Notes in Computer Science 6309, pp.33-47 (2010-09).
  4. Tetsushi Masuno, Takuya Kusaka, Toru Fujiwara, "A New Method to Reduce the Probability of Detection Errors for a Digital Watermark Using Complementary Decoding Algorithms and Minimum Weight Codewords of Linear Code," 2010 International Symposium on Information Theory and Its Applications (2010-10).
  5. Ryuhei Yokoyama, Takuya Kusaka, Toru Fujiwara, "Adaptive Recursive MLD Using Ordered Statistics for Low Rate Codes," 2010 International Symposium on Information Theory and Its Applications (2010-10).
  6. Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Keisuke Nakano and Yasunori Ishihara, "Context-Preserving XQuery Fusion," Proceedings of the 8th Asian Symposium on Programming Languages and Systems, Lecture Notes in Computer Science 6461, pp.255-270 (2010-11).

研究会発表

  1. Itsuki Suzuki, Maki Yoshida, Toru Fujiwara, "Computationally Sound Symbolic Analysis for EUC Security of Key Exchange," 日本応用数理学会 2010年度年会, pp.63-64, 2010. (2010-09).
  2. 雲嶋 健太, 吉田 真紀, 阿部 正幸, 大久保 美也子, 藤原 融, "Generic Model における困難性仮定への攻撃の数式処理を用いた導出," 電子情報通信学会技術研究報告(ISEC2010-58), Vol.110, No.281, pp.57-64 (2010-11).
  3. Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara, "The Validity Problem of Positive XPath Queries in the Presence of DTDs," IEICE Technical Report(SS2010-47), Vol.110, No.336, pp.49-54 (2010-12).
  4. 太田 和伸, 藤原 融, "ネットワーク符号化における2元線形符号の最尤復号とその性能評価," 第33回情報理論とその応用シンポジウム, 41.2 (2010-12).
  5. 岡前 直由, 吉田 真紀, 雲嶋 健太, 阿部 正幸, 大久保 美也子, 藤原 融, "Bilinear Group に関する困難性仮定への攻撃導出 - Cryptology ePrint Archive 上の仮定に攻撃は存在するか? -," 2011年暗号と情報セキュリティシンポジウム予稿集, 4F1-1(2011-01).
  6. 大野 敦司, 橋本 健二, 石原 靖哲, 藤原 融, "XMLスキーマで定義された型とXPath式との対応の解析およびその複雑度," 第3回データ工学と情報マネジメントに関するフォーラム, E1-3 (2011-02).
  7. 松村 卓朗, 橋本 健二, 石原 靖哲, 藤原 融, "連言問合せ間の解像度高低関係成立のための必要十分条件に関する考察," 第3回データ工学と情報マネジメントに関するフォーラム, C5-2 (2011-02).
  8. 川居 裕人, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへの関数従属性を用いた推論攻撃に対する 無限安全性検証法の提案," 第3回データ工学と情報マネジメントに関するフォーラム, C5-5 (2011-02).
  9. 鈴木 斎輝, 吉田 真紀, 藤原 融, "Static Adversaryに対してEUC安全な認証の記号的基準について," 電子情報通信学会技術研究報告, Vol.110, No.443, ISEC2010-133, pp.403-410 (2011-3).

2009年度

学術論文誌

  1. Kenji Hashimoto, Kimihide Sakano, Fumikazu Takasuka, Yasunori Ishihara and Toru Fujiwara, "Verification of the Security against Inference Attacks on XML Databases," IEICE Transactions on Information and Systems, Vol.E92-D, No.5, pp.1022-1032 (2009-05).
  2. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, "The Vector Decomposition Problem," IEICE Transactions on Fundamentals, Vol.E93-A, No.1, pp.188-193 (2010-01).
  3. Maki Yoshida and Toru Fujiwara, "Expiration Dated Fingerprinting," International Journal of Innovative Computing, Information and Control (IJICIC), Vol.6, No.3, pp.1271-1278 (2010-03).
  4. 鈴木 斎輝, 吉田 真紀, 藤原 融, "公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性," 日本応用数理学会論文誌, 第20巻, 第1号, pp.11-32 (2010-03).

国際会議(査読あり)

  1. Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, and Toru Fujiwara, "Development of a Verification Tool for Composable Security," Computational and Symbolic Proofs of Security, 2009.
  2. Maki Yoshida and Toru Fujiwara, "Watermarking Cryptographic Data," the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), A02-02, 2009.
  3. Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, and Toru Fujiwara, "Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking," the 8th International Workshop on Digital Watermarking (IWDW 2009), LNCS Vol.5703, pp.279-293, 2009.
  4. Yasunori Ishihara, Takuji Morimoto, Shougo Shimizu, Kenji Hashimoto and Toru Fujiwara, "A Tractable Subclass of DTDs for XPath Satisfiability with Sibling Axes," Proceedings of the 12th International Symposium on Database Programming Languages, Lecture Notes in Computer Science 5708, pp.68-83 (2009-08).

国内会議(査読あり)

  1. 加藤 弘之, 日高 宗一郎, 胡 振江, 中野 圭介, 石原 靖哲, "順序を考慮にいれたXQueryの融合変換," Webとデータベースに関するフォーラム(WebDB Forum 2009) (2009-11).

研究会発表

  1. 小倉 達也, 石原 靖哲, 藤原 融, "正規木言語の極大共通構造を表すXPath式の導出," 2009年夏のLAシンポジウム, S11 (2009-07).
  2. 升野哲志 (岡山大学), 日下卓也 (岡山大学), 藤原 融, "静止画の輝度値または周波数領域へ透かし情報を埋め込む形式の電子透かしに対するJPEG圧縮攻撃に関する性能評価と考察," 電子情報通信学会技術研究報告(IT2009-14), Vol.109, No.143 pp.49-54 (2009-07).
  3. 大野 敦司, 石原 靖哲, 藤原 融, "XMLスキーマで定義された型とXPath式との対応の解析手法," 情報処理学会研究報告, 2009-MPS-75(20) (2009-09).
  4. 鈴木 斎輝, 吉田 真紀, 藤原 融, "汎用的結合可能な安全性の形式的検証のためのpattern拡張に関する一考察," 日本応用数理学会 2009年度年会, pp.49-50 (2009-09).
  5. 升野哲志 (岡山大学), 日下卓也 (岡山大学), 藤原 融, "軟判定復号法を用いる電子透かしでの軟値受信情報の構成法に関する研究," 第32回情報理論とその応用シンポジウム, T11-1, pp.346-350 (2009-12).
  6. 鈴木 斎輝, 吉田 真紀, 藤原 融, "汎用的結合可能な相互認証に対する記号的識別不可能性を用いた記号的基準," 2010年暗号と情報セキュリティシンポジウム予稿集, 2C4-1 (2010-01).
  7. 大野 遼平, 岡村 真吾, 藤原 融, "Shibboleth IdPにおけるユーザ主導の属性解放ポリシ管理手法," 2010年暗号と情報セキュリティシンポジウム予稿集, 3E1-4 (2010-01).
  8. Kazuya Ohkita, Maki Yoshida, Toru Fujiwara, "Recovery of Tampered Pixels for Statistical Fragile Watermarking," Proceedings of the 2010 Symposium on Cryptography and Information Security, 3F4-3 (2010-01).
  9. 山中 広明, 岡村 真吾, 藤原 融, "検索効率と汚染コンテンツ抑制の非構造化オーバレイに対する評価指標の検討," 情報処理学会研究報告, Vol.2010-DPS-142/2010-CSEC-48, No.12, pp.1-7 (2010-02).
  10. 小倉 達也, 橋本 健二, 石原 靖哲, 藤原 融, "XML文書集合の極大共通構造を表すXPath式の導出法及びその計算量," 第2回データ工学と情報マネジメントに関するフォーラム, C8-1 (2010-03).
  11. 山田 大, 橋本 健二, 石原 靖哲, 藤原 融, "XMLスキーマに対する等価変換操作群の提案とその評価," 第2回データ工学と情報マネジメントに関するフォーラム, C8-4 (2010-03).

2008年度

学術論文誌

  1. Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara and Toru Fujiwara, "Bag-based Data Models for Incomplete Information and Their Closure Properties," Journal of Intelligent Information Systems, Vol.30, No.2, pp.115-135 (2008-04).
  2. 北村 至, 吉田 真紀, 藤原 融, "画素空間へのパッチワーク法と相関型電子透かし法の検出誤り確率の比較," 電子情報通信学会論文誌(D), Vol.J91-D, No.11, pp.2605-2615 (2008-11).
  3. Maki Yoshida and Toru Fujiwara, "Flexible Timed-release Encryption," IEICE Transactions on Fundamentals, Vol.E92-A, No.1, pp.222-225 (2009-01).

国際会議(査読あり)

  1. Kenji Hashimoto, Fumikazu Takasuka, Kimihide Sakano, Yasunori Ishihara and Toru Fujiwara, "Verification of the Security against Inference Attacks on XML Databases," Proceedings of the 10th Asia Pacific Web Conference, Lecture Notes in Computer Science, Springer-Verlag, Vol.4976, pp.359-370 (2008-04).
  2. Kenji Yasunaga and Toru Fujiwara, "Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Block Codes," Proceedings of the 2008 IEEE International Symposium on Information Theory (ISIT2007), Toronto, Canada, CD-ROM (2008-07).
  3. Maki Yoshida and Toru Fujiwara, "Expiration-dated Fingerprinting," Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), pp.147-150 (2008-08).
  4. Mohamed Layouni, Maki Yoshida, and Shingo Okamura, "Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval," Proceedings of the 10th International Conference on Information and Communications Security (ICICS2008), LNCS 5308, pp.387-402 (2008-10).
  5. Kazuhiro Haramura, Maki Yoshida, and Toru Fujiwara, "Anonymous Fingerprinting for Predelivery of Contents," Proceedings of the 11th International Conference on Information Security and Cryptography (ICISC2008), LNCS, to appear (2008-10).
  6. Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu, Yasunori Ishihara, and Keisuke Nakano, "Rewriting XQuery to Avoid Redundant Expressions based on Static Emulation of XML Store," Programming Language Techniques for XML, An ACM SIGPLAN Workshop co-located with POPL 2009, http://db.ucsd.edu/planx2009/camera-ready/unpaginated/16.pdf (2009-01).

研究会発表

  1. 富永 昌文, 安永 憲司, 藤原 融, "ネットワーク符号化におけるリード・ソロモン型符号の距離分布について," 電子情報通信学会技術研究報告(IT2008-9), Vol.108, No.158 pp.7-10 (2008-07).
  2. 山田 大, 吉田 昌起, 橋本 健二, 石原 靖哲, 藤原 融, "正規木文法に対する等価変換操作群の提案とその完全性についての考察," 2008年 夏のLAシンポジウム, pp.8-1 - 8-8 (2008-07).
  3. 山中 広明, 岡村 真吾, 藤原 融, "評価者間類似度を用いた不正評価排除によるレピュテーションシステムの性能向上," 情報処理学会研究報告 2008-DPS-136 (11), Vol.2008, No.91, pp.59-64 (2008-09).
  4. Maki Yoshida, Toru Fujiwara, and Marc Fossorier, "Optimum General Threshold Secret Sharing," Proceedings of the 31th Symposium on Information Theory and Its Applications (SITA2008), CD-ROM (6 pages) (2008-10).
  5. 阪野 公秀,橋本 健二,石原 靖哲,藤原 融, "XMLデータベースへの関数従属性を用いた推論攻撃に対する安全性の定式化とある条件下での安全性検証法の提案," コンピュータセキュリティシンポジウム 2008, Vol.2008, No.8, pp.461-466 (2008-10).
  6. 廣田 祐一,橋本 健二,石原 靖哲,藤原 融, "データベースへの推論攻撃に対する問合せ解像度に基づいた安全性定義の提案," コンピュータセキュリティシンポジウム 2008, Vol.2008, No.8, pp.467-472 (2008-10).
  7. 北村 至, 大北 和也, 吉田 真紀, 藤原 融, "画素空間への加法電子透かしに対する最適な抽出法の再設計とパッチワーク法との性能比較," 電子情報通信学会マルチメディア情報ハイディング研究会第5回研究会資料, pp.59-64 (2008-11).
  8. Kenji Hashimoto, Yasunori Ishihara, Toru Fujiwara, "XML schema evolution preserving information based on user-specified relationship," IPSJ SIG Technical Report, 2008-MPS-72 (10), pp.37-40 (2008-12).
  9. 大北 和也,北村 至,吉田 真紀,藤原 融, "統計的フラジャイル電子透かし法に関する改ざん位置特定性能の改善," 2009年暗号と情報セキュリティシンポジウム予稿集, 1D1-4, CD-ROM (概要集 p.19) (2009-01).
  10. 北村 至, 吉田 真紀, 藤原 融, "DWT係数に対する加法電子透かし法とパッチワーク法の性能比較," 2009年暗号と情報セキュリティシンポジウム予稿集, 1D1-5, CD-ROM (概要集 p.20) (2009-01)
  11. 原村 和裕, 吉田 真紀, 藤原 融, "コンテンツ事前配信における不正配布抑止力の強い匿名フィンガープリンティング," 2009年暗号と情報セキュリティシンポジウム予稿集, 1B2-3, CD-ROM (概要集 p.39) (2009-01).
  12. 鈴木 斎輝,吉田 真紀,藤原 融, "相互認証の汎用的結合可能な安全性の解析のための形式的手法," 2009年暗号と情報セキュリティシンポジウム予稿集, 4C2-4, CD-ROM (概要集 p.345) (2009-01).
  13. 鈴木 斎輝,吉田 真紀,藤原 融, "汎用的結合可能な鍵交換の安全性検証法," 日本応用数理学会2009年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS), (2009-03).
  14. 鎌野 善樹, 鈴木 斎輝,吉田 真紀,藤原 融, "暗号プロトコルに対する公理的安全性検証法の主要処理の改良と実装," 日本応用数理学会2009年春の研究部会連合発表会, 数理的技法による情報セキュリティ(FAIS), (2009-03).
  15. 阪野 公秀,橋本 健二,石原 靖哲,藤原 融, "XMLデータベースへの関数従属性を用いた推論攻撃に対する安全性の定式化と その検証法の提案," データ工学と情報マネジメントに関するフォーラム, D4-2 (2009-03).
  16. 廣田 祐一,橋本 健二,石原 靖哲,藤原 融, "データベースへの推論攻撃に対する 問合せ解像度の高低関係を用いたインスタンス独立の安全性定義の提案," データ工学と情報マネジメントに関するフォーラム, D4-3 (2009-03).

2007年度

学術論文誌

  1. 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースにおけるスキーマ進化のための更新操作群と それらのスキーマ表現能力保存に関する性質," 電子情報通信学会論文誌(D), Vol.J90-D, No.4, pp.990-1004 (2007-04).
  2. Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki and Minoru Ito, "An Equational Logic Based Approach to the Security Problem against Inference Attacks on Object-Oriented Databases," Journal of Computer and System Sciences, Vol.73, No.5, pp.788-817 (2007-08).

国際会議(査読あり)

  1. Maki Yoshida and Toru Fujiwara, "Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing," Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT2007), Nice, France, CD-ROM (2007-07).
  2. Maki Yoshida, Itaru Kitamura, and Toru Fujiwara, "A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain," Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), to appear (2007-11).
  3. Kenji Yasunaga and Toru Fujiwara, "Correctable errors of weight half the minimum distance plus one for the first-order Reed-Muller codes," Proceedings of The 17th Symposium on Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17), Lecture Notes in Computer Science, Springer-Verlag, Vol.4581, pp.110-119 (2007-12).
  4. Maki Yoshida and Toru Fujiwara, "Global Timed-release Encryption," Proceedings of the 26th IEEE International Conference on Consumer Electronics (ICCE 2008), CD-ROM (2008-01).

国内会議(査読あり)

  1. 吉田 昌起, 橋本 健二, 石原 靖哲, 藤原 融, "XMLスキーマ更新操作に応じたXSLT文書変換プログラムの自動生成法," 第10回プログラミングおよびプログラミング言語ワークショップ pp.168-182 (2008-03).

研究会発表

  1. Maki Yoshida and Toru Fujiwara, "Efficiency Analysis of the Nonlinear Function Ramp Secret Sharing Schemes," Proceedings of the 2007 Hawaii and SITA Joint Conference on Information Theory (HISC'07), Honolulu, Hawaii, CD-ROM (2007-05).
  2. Kenji Yasunaga and Toru Fujiwara, "On trial set and uncorrectable errors for the first-order Reed-Muller codes," Proceedings of 2007 Hawaii and SITA Joint Conference on Information Theory, pp.67-72 (2007-05).
  3. 吉田 昌起, 橋本 健二, 石原 靖哲, 藤原 融, "木の埋め込み関係に基づくXMLスキーマ進化に応じた文書変換器の生成法," 情報処理学会研究報告 2007-DBS-143(18), Vol.2007, No.65, pp.103-108. 電子情報通信学会技術研究報告(DE2007-39), Vol.107, No.131 pp.103-108 (2007-07).
  4. 森本 卓爾, 橋本 健二, 石原 靖哲, 藤原 融, "木埋め込み関係に基づくXMLスキーマ進化に応じたXPath問合せ変換," 情報処理学会研究報告 2007-DBS-143(19), Vol.2007, No.65, pp.109-114. 電子情報通信学会技術研究報告(DE2007-40), Vol.107, No.131 pp.109-114 (2007-07).
  5. 阪野 公秀, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへの推論攻撃に対する安全性検証システム," 情報通信システムセキュリティ研究会予稿集, pp.21-26 (2007-09).
  6. Kenji Yasunaga and Toru Fujiwara, "Minimum weight codewords in trial sets," Proceedings of the 30th Symposium on Information Theory and Its Applications (SITA2007), pp.562-564 (2007-12).
  7. 原村 和裕, 吉田 真紀, 藤原 融, "コンテンツ事前配信のための匿名フィンガープリンティング," 電子情報通信学会技術研究報告(ISEC2007-92), Vol.107, No.345, pp.23-30 (2007-11).
  8. 原村 和裕, 吉田 真紀, 藤原 融, "利便性の高いコンテンツ事前配信のための匿名フィンガープリンティング," 2008年暗号と情報セキュリティシンポジウム予稿集, 1D1-4, CD-ROM (概要集 p.18) (2008-01).
  9. 北村 至, 吉田 真紀, 藤原 融, "画素空間への加法電子透かしに対する最適検出の再考," 2008年暗号と情報セキュリティシンポジウム予稿集, 2F3-4, CD-ROM (概要集 p.149) (2008-01).
  10. Kenji Yasunaga and Toru Fujiwara, "A lower bound on the number of uncorrectable errors of weight half the minimum distance," IEICE Technical Report, IT2007-56, Vol.107, No.499, pp.51-56 (2008-02).
  11. 森本 卓爾, 橋本 健二, 石原 靖哲, 藤原 融, "スキーマ進化に応じたXPath問合せ変換手法における 入力問合せクラスの拡張と問合せ簡単化処理の改良," 電子情報通信学会第19回データ工学ワークショップ, C4-5 (2008-03).

2006年度

学術論文誌

  1. 高須賀 史和, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへの推論攻撃による機密情報特定可能性の形式化と ある前提条件のもとでの特定可能性検証法の提案," 日本データベース学会Letters, Vol.5, No.2, pp.21-24 (2006-09).
  2. Kenji Yasunaga and Toru Fujiwara, "Determination of the Local Weight Distribution of Binary Linear Block Codes," IEEE Trans. on Information Theory, Vol.52, No.10, pp.4444-4454 (2006-10).
  3. Takaaki Fujita, Maki Yoshida, and Toru Fujiwara, "A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain," IEICE Transactions on Fundamentals, Vol.E90-A, No.1, pp.216-225 (2007-01).
  4. Satoshi Nakayama, Maki Yoshida, Shingo Okamura, and Toru Fujiwara, "A Private and Consistent Data Retrieval Scheme with Log-Squared Communication," IEICE Transactions on Fundamentals, Vol.E90-A, No.1, pp.204-215 (2007-01).
  5. Kenji Yasunaga, Toru Fujiwara, and Tadao Kasami, "Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.3, pp.698-701 (2007-03).

国際会議(査読あり)

  1. Maki Yoshida and Toru Fujiwara, "On the Security of Tag-KEM for Signcryption," 2nd Workshop on Cryptography for Ad hoc Networks (WCAN'06), Electronic Notes in Theoretical Computer Science (2006-07).
  2. Junya Asano, Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "Towards Secure C2C Contents Distribution Services," The 1st Joint Workshop on Information Security (JWIS 2006) (2006-09).
  3. Hitoshi Tokushige, Marc Fossorier, Toru Fujiwara, and Tadao Kasami, "An Improvement to an Iterative Bounded-distance and Encoding-based Decoding Algorithm for Binary Linear Block Codes," 2006 International Symposium on Information Theory and Its Applications, pp.254-259 (2006-10).
  4. Jun Asatani, Takuya Koumoto, Toru Fujiwara, and Tadao Kasami, "Method for Generating a Competing Codeword Using a Chain of Minimum Distance Searches," 2006 International Symposium on Information Theory and Its Applications, pp.260-264 (2006-10).
  5. Maki Yoshida, Takaaki Fujita, and Toru Fujiwara, "A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain," IEEE 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2006), pp.101-104 (2006-12).

国際会議(査読なし)

  1. Kenji Yasunaga, Toru Fujiwara, Tadao Kasami, "Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code," Proceedings of the 2006 Hawaii, IEICE and SITA Joint Conference on Information Theory, Nara; also included in IEICE Technical Report, IT2006-6, Vol.106, No.58, pp.31-36 (2006-05).
  2. Maki Yoshida and Toru Fujiwara, "Authenticated Key Encapsulation Using Signatures," Proceedings of the 2006 Hawaii, IEICE and SITA Joint Conference on Information Theory, Nara; also included in IEICE Technical Report, IT2006-11, Vol.106, No.59,pp.23-28 (2006-05).
  3. Ting-ting Liu, Hitoshi Tokushige and Toru Fujiwara, "Performance Analysis of Ordered Statistics Decoding for Error Correction in Digital Watermarking," Proceedings of the 2006 Hawaii, IEICE and SITA Joint Conference on Information Theory, Nara; also included in IEICE Technical Report, IT2006-12, Vol.106, No.59,pp.29-34 (2006-05).

研究会発表

  1. 高須賀 史和, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへの型推論を用いた攻撃に対する安全性検証," 電子情報通信学会技術研究報告(DE2006-47), Vol.106, No.148, pp.151-156 (2006-7). 情報処理学会研究報告 2006-DBS-140-26, Vol.2006, No.77 pp.187-192.
  2. Kenji Yasunaga and Toru Fujiwara, "Correctable Errors of Weight Half the Minimum Distance for the First-Order Reed-Muller Codes," Proceedings of the 29th Symposium on Information Theory and Its Applications, pp.5-8 (2006-11)
  3. Tingting Liu, 安永憲司, 藤原融, "2重符号化を用いた電子透かし抽出誤り訂正・検出法," 第29回情報理論とその応用シンポジウム, pp.565-568 (2006-11)
  4. 中西 通雄, 藤原 融, 武内 良典, 秋吉 政徳, 橋本 昌宜, 岸野 文郎, 清川 清, 原 隆浩, 中前 幸治, 菊野亨, 寺西 裕一, "大学院情報系学生に対する技術者倫理教育," 電子情報通信学会技術研究報告(SITE2006-49), Vol.106, No.401, pp.41-47 (2006-12).
  5. 高須賀 史和, 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースへの推論攻撃に対する安全性のいくつかの定式化とある前提条件下での安全性検証法の提案," 2007年暗号と情報セキュリティシンポジウム予稿集, 4E2-1, CD-ROM (概要集 p.351) (2007-01).
  6. 北村 至, 吉田 真紀, 藤原 融, "画素空間への加法電子透かしにおける秘密鍵の利用法による検出誤り確率への影響," 2007年暗号と情報セキュリティシンポジウム予稿集, 3B1-5, CD-ROM (概要集 p.189) (2007-01).
  7. 浅野 順也, 岡村 真吾, 吉田 真紀, 藤原 融, "C2Cコンテンツ配信仲介サービスのための協調型非対称フィンガープリンティング," 2007年暗号と情報セキュリティシンポジウム予稿集, 1B2-3, CD-ROM (概要集 p.37) (2007-01).

2005年度

学術論文誌

  1. Yasunori Ishihara, Shuichiro Ako and Toru Fujiwara, "Security against Inference Attacks on Negative Information in Object-Oriented Databases," IEICE Transactions on Information and Systems, Vol.E88-D, No.12, pp.2767-2776 (2005-12).

国際会議(査読あり)

  1. Kenji Hashimoto, Yasunori Ishihara, and Toru Fujiwara, "Schema Update Operations Preserving the Expressive Power in XML Databases," Proceedings of the International Special Workshop on Databases For Next Generation Researchers In Memoriam Prof. Yahiko Kambayashi (SWOD2005), pp.38-41 (2005-4).
  2. Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors," Peer-reviewed Proceedings of the ISSA 2005 New Knowledge Today Conference, CD-ROM (2005-06).
  3. Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, and Toru Fujiwara, "An Efficient Private and Consistent Data Retrieval Protocol," Conference Records of Western European Workshop on Research in Cryptology (WEWoRC2005), pp.83-84 (2005-7).
  4. Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, and Toru Fujiwara, "A Watermark Detection Scheme Ensuring the False Positive Error Probability," Conference Records of Western European Workshop on Research in Cryptology (WEWoRC2005), pp.18-19 (2005-7).
  5. Kenji Yasunaga and Toru Fujiwara, "Relations between the Local Weight Distributions of a Linear Block Code, Its Extended Code, and Its Even Weight Subcode", in Proc. 2005 IEEE Int. Symp. on Information Theory (ISIT2005), Adelaide, Australia, CD-ROM (2005-09).
  6. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, "A Timed-Release Key Management Scheme for Backward Recovery," Proceedings of the 8th Annual International Conference on Information Security and Cryptology (ICISC2005), Lecture Notes in Computer Science 3935, pp.1-15 (2005-12).

国際会議(査読なし)

  1. Kenji Yasunaga and Toru Fujiwara, "The Local Weight Distributions of Transitive Invariant Codes and Their Punctured Codes," Proceedings of the 2005 Hawaii, IEICE and SITA Joint Conference on Information Theory, Honolulu, Hawaii, pp.79-84, May 2005; also included in IEICE Technical Report, IT2005-14 (2005-05).
  2. Maki Yoshida, Yuichi Kaji, and Toru Fujiwara, "A Time-Limited Key Management Scheme Based on a One-Way Permutation Tree," Proceedings of the 2005 Hawaii, IEICE and SITA Joint Conference on Information Theory, Honolulu, Hawaii, pp.165-170, May 2005; also included in IEICE Technical Report, IT2005-29 (2005-05).

国内会議(査読あり)

  1. 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースにおけるデータベースにおけるスキーマ更新操作の能力とスキーマ表現能力保存に関する完全性との関係," 第8回プログラミングおよびプログラミング言語ワークショップ論文集, pp.19-33 (2006-03).

研究会発表

  1. 中山 敏, 吉田 真紀, 岡村 真吾, 藤原 晶, 藤原 融, "検索語の秘匿と検索結果の一貫性検証を可能とするデータ検索プロトコルにおける通信量の削減," 電子情報通信学会技術研究報告(ISEC2005-61), Vol.105, No.194, pp.129-136 (2005年7月).
  2. 藤田 高彬, 岡本 邦宏, 吉田 真紀, 藤原 融, "相関型電子透かしの誤検出確率保証法における見逃し確率の改善," 電子情報通信学会技術研究報告(ISEC2005-65), Vol.105, No.194, pp.155-160 (2005年7月).
  3. 吉田 真紀, 藤原 融, "先着限定販売のための売り切れ証明プロトコル," コンピュータセキュリティシンポジウム2005 予稿集, pp.523-528 (2005-10).
  4. 安田 隆広, 安永 憲司, 藤原 融, "Seguin下界の局所重み分布を用いた改善," 第28回情報理論とその応用シンポジウム予稿集, pp.435-438 (2005-11).
  5. Jun Asatani, Takuya Koumoto, Toru Fujiwara, and Tadao Kasami, "The sructure of the set of minimum weight codewords of the extended (32,21,6) and (64,45,8) BCH codes", Proceedings of the 28th Symposium on Information Theory and Its Applications, pp.439-442 (2005-11)
  6. 浅野 順也, 岡村 真吾, 吉田 真紀, 藤原 融, "プライバシを保護したC2Cディジタルコンテンツ売買方式," 2006年暗号と情報セキュリティシンポジウム予稿集, 3F2-1, CD-ROM (概要集 p.214) (2006-01).
  7. Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "An Unlinkable Interactive Drama Delivery System Allowing Rechoice of a Scene," Proceedings of the 2006 Symposium on Cryptography and Information Security, 2F3-3, CD-ROM (Abstracts p.127) (2006-01).
  8. 中山 敏, 吉田 真紀, 岡村 真吾, 藤原 融, "検索語の秘匿と検索結果の一貫性検証を可能とする通信効率の良いデータ検索プロトコル," 2006年暗号と情報セキュリティシンポジウム予稿集, 3F1-2, CD-ROM (概要集 p.182) (2006-01).
  9. 藤田 高彬, 吉田 真紀, 藤原 融, "パッチワーク法に対する最適な透かし検出," 2006年暗号と情報セキュリティシンポジウム予稿集, 3F3-3, CD-ROM (概要集 p.242) (2006-01).

解説等

  1. 藤原 融 "情報セキュリティ ---暗号基盤技術の安全性---(特集 安全に暮らしたい 4-2," 電子情報通信学会誌, Vol.88, No.5, pp.355-361 (2005-05).
  2. 藤原 融 "図書紹介: 電子情報通信レクチャーシリーズC-1 情報・符号・暗号の理論(今井秀樹著)," 電子情報通信学会誌, Vol.88, No.6, p.480 (2005-06).
  3. 吉田 真紀 "大切な情報をどうやって守りますか?," 日本化学会情報化学部会誌, Vol.23, No.3, pp.79-82 (2005-09).

2004年度

著書

  1. 藤原 融 "暗号プロトコル検証," 情報セキュリティハンドブック (電子情報通信学会編), オーム社, pp.201-210 (2004-11).

学術論文誌

  1. Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida and Toru Fujiwara, "Unlinkable Delivery System for Interactive Dramas," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E88-A, No.1, pp.262-269 (2005-01).
  2. Yasunori Ishihara, Shin Ishii, Hiroyuki Seki and Minoru Ito, "Temporal Reasoning about Two Concurrent Sequences of Events," SIAM Journal on Computing, Vol.34, No.2, pp.498-513 (2005-02).

国際会議(査読あり)

  1. Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida and Toru Fujiwara, "An Interactive Drama Delivery System Suitable for Mobile Phone (Preliminary Version)," Proceedings of the 5th International workshop on Information Security Applications (WISA2004), pp.391-398 (2004-8).
  2. Kunihiro Okamoto, Takayuki Ueno, Maki Yoshida, and Toru Fujiwara, "A Method to Ensure Reliability of a Detection Result for Correlation Based Watermarking Detection Schemes," 2004 International Symposium on Information Theory and Its Applications, pp.299-304 (2004-10).
  3. Akira Fujiwara, Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "A Digital Contents Consignment System Protecting Marketing Information," 2004 International Symposium on Information Theory and Its Applications, pp.468-473 (2004-10).
  4. Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "Unlinkable Delivery System for Interactive Dramas Including Conditional Choices," 2004 International Symposium on Information Theory and Its Applications, pp.474-479 (2004-10).
  5. Kenji Yasunaga and Toru Fujiwara, "An Algorithm for Computing the Local Weight Distribution of Binary Linear Codes Closed under a Group of Permutations," 2004 International Symposium on Information Theory and Its Applications, pp.846-851 (2004-10).
  6. Jun Asatani, Hitoshi Tokushige, Kenichi Tomita, Toru Fujiwara and Tadao Kasami, "Iterative Decoding of Product Codes Using Minimum Distance Search Based Soft-Input Soft-Output Decoding Algorithm,," 2004 International Symposium on Information Theory and Its Applications, pp.980-985 (2004-10).
  7. Yuta Yoneda, Hitoshi Tokushige, Toru Fujiwara, and Tadao Kasami, "Good Binary Image Search for Linear Block Codes over an Extended Field of GF(2), " 2004 International Symposium on Information Theory and Its Applications, pp.1309-1314 (2004-10).
  8. Yasunori Ishihara, Yumi Shimakawa, and Toru Fujiwara, "Type Inferability and Decidability of the Security Problem against Inference Attacks on Object-Oriented Databases," Proceedings of the 6th International Conference on Information and Communications Security, Lecture Notes in Computer Science 3269, pp.145-157 (2004-10).

国内会議(査読あり)

  1. Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara and Toru Fujiwara, "A Bag-based Data Model with Global Conditions for Incomplete Information," Proceedings of the 16th Data Engineering Workshop, 1A-o5 (2005-02).
  2. 阿部 将佳, 原 忠司, 石原 靖哲, 織田 美樹男, "高速処理のためのXPath問い合わせ変換手法," 電子情報通信学会第16回データ工学ワークショップ,6B-o2 (2005-03).
  3. 橋本 健二, 石原 靖哲, 藤原 融, "XMLデータベースにおけるスキーマ更新操作とスキーマの表現能力保存について," 第7回プログラミングおよびプログラミング言語ワークショップ論文集, pp.219-230 (2005-03).

研究会発表

  1. 藤原 晶, 岡村 真吾, 吉田 真紀, 藤原 融, "マーケティング情報が保護された委託配信システムにおける通信頻度の削減," 電子情報通信学会技術研究報告, ISEC2004-34 (2004-07).
  2. Kenji Yasunaga, Toru Fujiwara, "The local weight distributions of the (128, 50) extended binary primitive BCH code and the (128, 64) Reed-Muller code," IEICE Technical Report, IT2004-19 (2004-07).
  3. 藤原 晶, 岡村 真吾, 吉田 真紀, 藤原 融, "マーケティング情報が保護されたオフライン委託配信システム," コンピュータセキュリティシンポジウム2004論文集, Volume II, pp.469-474 (2004-10).
  4. Kunihiro Okamoto, Takaaki Fujita, Maki Yoshida, and Toru Fujiwara, "Correlation Based Watermark Detection Ensuring Given False Positive Error Probability for Video Using Inter-Frame Similarity," Computer Security Symposium 2004, Volume I, pp.163-168 (2004-10).
  5. Kenji Hashimoto, Yasunori Ishihara, and Toru Fujiwara, "Schema update operations preserving the expressive power in XML databases," IEICE Technical Report, DE2004-118, DC2004-33 (2004-10).
  6. 馬山 貴峰, 吉田 真紀, 藤原 融, "暗号を用いたプロトコルに対するコスト最小攻撃の形式的導出法," 電子情報通信学会技術研究報告, ISEC2004-87 (2004-11).
  7. Toru Fujiwara and Kenji Yasunaga, "Some results on the local weight distribution of binary linear codes," Algebraic Aspects of Coding Theoory and Cryptography, (2004-11), Proceedings: published as Kokyuroku, Vol.1420, pp.150-162, Research Institute for Mathematical Sciences, Kyoto University, 2005-04.
  8. Kenji Yasunaga and Toru Fujiwara, "Relations among the Local Weight Distributions of a Linear Block Code, Its Extended Code and Its Even Weight Subcode," Proceedings of the 27th Symposium on Information Theory and Its Applications, pp.559-562 (2004-12)
  9. Yuta Yoneda, Hitoshi Tokushige, Toru Fujiwara, and Tadao Kasami, "Performance Analysis for Binary Image of Linear Block Codes over an Extended Field of GF(2), " Proceedings of the 27th Symposium on Information Theory and Its Applications, pp.563-566 (2004-12)
  10. 永野 秀尚, 柏野 邦夫, 藤原 融, "2値多重音響特徴ベクトルを用いた類似音楽探索法の頑健性評価," 情報処理学会研究報告, 2004-MUS-58, pp.39-44 (2004-12).
  11. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, "Time-Capsule Encryption," IEICE Technical Report, ISEC2004-98, pp.1-5 (2004-12).
  12. 中山 敏, 藤原 晶, 吉田 真紀, 藤原 融, "検索結果の秘匿と一貫性検証を可能とするデータ検索プロトコルの提案," 2005年暗号と情報セキュリティシンポジウム予稿集, Vol.III, pp.1489-1494 (2005-01).
  13. 藤田 高彬, 岡本 邦宏, 吉田 真紀, 藤原 融, "動画像用相関型電子透かしの誤検出確率を保証可能とするフレーム間類似度の評価," 2005年暗号と情報セキュリティシンポジウム予稿集, Volume III, pp.1033-1038 (2005-01).

2003年度

学術論文誌

  1. Yasunori Ishihara, Kengo Mori and Toru Fujiwara, "Sufficient Conditions for Update Operations on Object-Oriented Databases to Preserve the Security against Inference Attacks," IEICE Transactions on Information and Systems, Vol.E86-D, No.10, pp.2187-2197 (2003-10).

国内会議(査読あり)

  1. Akinari Yamaguchi, Yasunori Ishihara and Toru Fujiwara, "Closure Properties of a Bag-based Data Model for Incomplete Information," Proceedings of the 15th Data Engineering Workshop (2004-03).

研究会発表

  1. Kenji Yasunaga and Toru Fujiwara, "An Algorithm for Computing the Local Distance Profile of Binary Linear Codes Closed under a Group of Permutations," IEICE Technical Report, IT2003-47, pp.37-41 (2003-09).
  2. 大村 浩正, 吉田 真紀, 藤原 融, "プログラムの情報フロー解析における暗号技術に基づく関数への対処法," コンピュータセキュリティシンポジウム2003論文集, pp.277-282 (2003-10).
  3. 小西 祥之, 吉田 真紀, 藤原 融, "分岐構造をもつコンテンツに対する分岐選択履歴を配信者から秘匿可能な配信システム," コンピュータセキュリティシンポジウム2003論文集, pp.367-372 (2003-10).
  4. Jun Asatani, Takuya Koumoto, Toru Fujiwara and Tadao Kasami, "Soft-Input Soft-Output Decoding Algorithm Based on Iterative Minimum Distance Search for Reed-Muller Codes," Proceedings of the 26th Symposium on Information Theory and Its Applications, pp.1-4 (2003-12).
  5. Shingo OKAMURA, Yoshiyuki KONISHI, Maki YOSHIDA and Toru FUJIWARA, "Graph-Structured Contents Delivering Systems with Charging through Intermediary," Proceedings of the 2004 Symposium on Cryptography and Information Security, pp.53-58 (2004-01).
  6. 佐井 祐介, 石原 靖哲, 阿部 将佳, 藤原 融, "XML文書におけるアクセス制御ポリシーに従ったビュー定義の生成," 2004年暗号と情報セキュリティシンポジウム予稿集, Vol.I, pp.299-304 (2004-01).
  7. 藤原 晶, 岡村 真吾, 吉田 真紀, 藤原 融, "コンテンツ配信サービス提供者だけが視聴動向を把握できる委託配信システム," 2004年暗号と情報セキュリティシンポジウム予稿集, Vol.I, pp.487-492 (2004-01).
  8. 岡本 邦宏, 上野 貴之, 吉田 真紀, 藤原 融, "統計量利用型電子透かしに対する検出結果の信頼性保証," 2004年暗号と情報セキュリティシンポジウム予稿集, Vol.I, pp.879-884 (2004-01).
  9. 馬山 貴峰, 吉田 真紀, 藤原 融, "暗号を用いたプロトコルの形式的記述に基づく攻撃導出法," 電子情報通信学会技術研究報告, IT2003-111 (2004-03).
  10. Jun Asatani, Takuya Koumoto, Toru Fujiwara and Tadao Kasami, "Soft-Input Soft-Output Decoding Algorithm Using a Structure of the Set of Minimum Weight Codewords of Reed-Muller Codes With Simulation Results," IEICE Technical Report, IT2003-93 (2004-03).

2002年度

学術論文誌

  1. Yoshihiro Murata, Yasunori Ishihara and Minoru Ito, "An Approximation Algorithm for the Task-Coalition Assignment Problem," IEICE Transactions on Information and Systems, Vol.E85-D, No.4, pp.685-693 (2002-04).
  2. Yuansheng Tang, Toru Fujiwara and Tadao Kasami, "Asymptotic Optimality of the GMD and Chase Decoding Algorithms," IEEE Transactions on Information Theory, Vol.48, No.8, pp.2401-2405 (2002-08).

国際会議(査読あり)

  1. Shingo Okamura, Maki Yoshida and Toru Fujiwara, "A Validatable Revocation Scheme with Black-Box Traitor Tracing," 2002 International Symposium on Information Theory and Its Applications, pp.355-358 (2002-10).
  2. Takayuki Ueno, Maki Yoshida and Toru Fujiwara, "A Method of Estimating the Detection Error Rate in a Certain Digital Watermarking for Audio Signals," 2002 International Symposium on Information Theory and Its Applications, pp.359-362 (2002-10).
  3. Yasunori Ishihara, Shuichiro Ako and Toru Fujiwara, "Security against Inference Attacks on Negative Information in Object-Oriented Databases," Proceedings of the Fourth International Conference on Information and Communications Security, Lecture Notes in Computer Science 2513, pp.49-60 (2002-12).

研究会発表

  1. 石元 豪, 石原 靖哲, 藤原 融, "XMLデータのスキーマ統合のための枠組の提案," 情報処理学会研究報告, 2002-DBS-129-15, pp.105-112 (2003-01).
  2. 楊井裕之, 吉田 真紀, 藤原 融, “プライバシー保護を考慮した属性認証プロトコル," 2003年暗号と情報セキュリティシンポジウム予稿集, pp.333--338 (2003-01).
  3. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, “Vector Decomposition Problem and the Trapdoor Inseparable Multiplex Transmission Scheme Based the Problem," Proceedings of the 2003 Symposium on Cryptography and Information Security, pp.491--496 (2003-01).
  4. 酒井雅浩, 吉田 真紀, 藤原 融, “配信数を限定したコンテンツの先着優先配信サービス,” 2003年暗号と情報セキュリティシンポジウム予稿集, pp.587--592 (2003-01).
  5. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, “Inseparable Multiplex Transmission Scheme Using the Pairing on Elliptic Curves," IEICE Technical Report, vol.102, no.323, ISEC2002-65, pp.61-68 (2002-09).

2001年度

学術論文誌

  1. Shougo Shimizu, Yasunori Ishihara, Junji Yokouchi and Minoru Ito, "Complexity of the Type-Consistency Problem for Acyclic Object-Oriented Database Schemas," IEICE Transactions on Information and Systems, Vol.E84-D, No.5, pp.623-634 (2001-05).
  2. Yasunori Ishihara, Shougo Shimizu, Hiroyuki Seki and Minoru Ito, "Refinements of Complexity Results on Type Consistency for Object-Oriented Databases," Journal of Computer and System Sciences, Vol.62, No.4, pp.537-564 (2001-06).
  3. Maki Yoshida and Toru Fujiwara, "Analysis and Optimization of Coding Constructions for Blacklisting Problem," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E84-A, No.9, pp2338-2345 (2001-09).
  4. Hitoshi Tokushige, Kentaro Nakamaye, Takuya Koumoto, Yuansheng Tang and Tadao Kasami, "Selection of Search Centers in Iterative Soft-decision Decoding Algorithms," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E84-A, No.10, pp.2397-2403 (2001-10).

国際会議(査読あり)

  1. Yuansheng Tang, Tadao Kasami and Toru Fujiwara, "On the Evaluation of the Testing Conditions of the h-Chase Decoding," Proceedings of the 2000 IEEE International Symposium on Information Theory, p.259 (2001-06).
  2. Yuansheng Tang, Tadao Kasami and Toru Fujiwara, "On the Asymptotic Error Performance of Symmetrical Decodings for Binary Block Codes over AWGN Channel," The First International Workshop on Sequence Design and Applications for CDMA Systems (IWSDA'2001), Chengdu, China, (2001-09).
  3. Maki Yoshida and Toru Fujiwara, "Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem," Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS2260, pp.27-37 (2001-12).

研究会発表

  1. Yuansheng Tang, Toru Fujiwara and Tadao Kasami, "Asymptotic Error Performance of GMD and Chase Decoding Algorithms," IEICE Technical Report, IT2001-10 (2001-05).
  2. Yuansheng Tang and Toru Fujiwara, "Computation of Nearest Boundary Points for Symmetrical Decodings of Binary Linear Block Codes," Workshop on Designs, Codes, Graphs and their Links II, Kyoto, (2001-07).
  3. 岡村 真吾, 吉田 真紀, 藤原 融, "不正者追跡機能および不正者限定排除機能をもつ放送型コンテンツ配信システム," コンピュータセキュリティシンポジウム2001, pp.13-18 (2001-10).
  4. Yasunori Ishihara and Toru Fujiwara, "A Formulation of the Security against Inference Attacks on Relational Databases," Computer Security Symposium 2001, pp.25-30 (2001-10).
  5. Maki Yoshida and Toru Fujiwara, "On the Average Transmission Overhead for an Improved Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem," IEICE Technical Report, IT2001-45 (2001-11).
  6. 上野 貴之, 吉田 真紀, 藤原 融, "オーディオ信号への電子透かしにおける検出誤り確率推定について," 第24回情報理論とその応用シンポジウム予稿集, Volume I of II, pp.227-230 (2001-12).
  7. 中川 剛, 石原 靖哲, 藤原 融, "異なる構造をもつXMLデータを統合するための構造間の関係について," 情報処理学会研究報告, 2002-DBS-126-20, pp.145-152 (2002-01).
  8. 土田 順, 石原 靖哲, 藤原 融, "関係データベースへの推論攻撃に対する安全性の定式化の拡張について," 2002年暗号と情報セキュリティシンポジウム予稿集, Vol.I, pp.567-572 (2002-01).
  9. 岡村 真吾, 吉田 真紀, 藤原 融, "限定排除機能およびブラックボックス型不正者追跡機能をもつ放送型コンテンツ配信法," 2002年暗号と情報セキュリティシンポジウム予稿集, Vol.II, pp.733-738 (2002-01).
  10. 上野 貴之, 吉田 真紀, 藤原 融, "オーディオ信号用のある電子透かしに対する検出誤り確率推定法における精度向上に関する考察," 電子情報通信学会技術研究報告, ISEC2001-134 (2002-03).
  11. Dungjade Shiowattana, Toru Fujiwara, "Performance Analysis of a Two-step Decoding Method based on Majority Logic Decoding and Ordered Statistic Decoding," Technical Report of IEICE., IT2001-78 (2002-03).

2000年度

学術論文誌

  1. Yasunori Ishihara, Kiichiro Ninomiya, Hiroyuki Seki, Daisuke Takahara, Yutaka Yamada and Shigesada Omoto, "Verification of a Microcomputer Program Specification Embedded in a Reactive System," IEICE Transactions on Information and Systems, Vol.E83-D, No.5, pp.1082-1091 (2000-05).
  2. Toru Nakanishi, Hajime Watanabe and Toru Fujiwara, "An Anonymous Bidding Protocol without Any Reliable Center," Transactions of Information Processing Society of Japan, Vol.41, No.8, pp.2161-2169 (2000-08).
  3. Yuansheng Tang, Toru Fujiwara and Tadao Kasami, "The Optimal Sectionalized Trellises for the Generalized Version of Viterbi Algorithm of Linear Block Codes and Its Application to Reed-Muller Codes," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E83-A, No.11, pp.2329-2340 (2000-11).
  4. Yeon-Dae Kwon, Yasunori Ishihara, Shougo Shimizu and Minoru Ito, "Computational Complexity of Finding Highly Co-occurrent Itemsets in Market Basket Databases," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E83-A, No.12, pp.2723-2735 (2000-12).
  5. Maki Yoshida and Toru Fujiwara, "A Subscriber-Excluding and Traitor-Tracing Broadcast Distribution System," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E84-A, No.1, pp.247-255 (2001-01).
  6. Masaya Maeda and Toru Fujiwara, "Weight Distributions of the Coset Leaders of Some Reed-Muller Codes and BCH Codes" IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E84-A, No.3, pp.851-859 (2001-03).

国際会議(査読あり)

  1. Maki Yoshida and Toru Fujiwara, "An Efficient Traitor Tracing Scheme for Broadcast Encryption," Proceedings of the 2000 IEEE International Symposium on Information Theory, p.463 (2000-06).
  2. Shougo Shimizu, Yasunori Ishihara, Tomotaka Takarabe and Minoru Ito, "A Probabilistic Database Model with Representability of Dependency among Tuples," Proceedings of the 4th World Multiconference on Systemics, Cybernetics and Informatics, Volume VIII, pp.221-225 (2000-07).
  3. Hitoshi Tokushige, Yuansheng Tang, Takuya Koumoto and Tadao Kasami, "An Improvement to Chase-like Decoding Algorithm," Proceedings of the 2000 International Symposium on Information Theory and Its Applications, pp.331-334 (2000-11).
  4. Maki Yoshida, Takahiro Horikawa and Toru Fujiwara, "An Improvement of Coding Constructions for Blacklisting Problems," Proceedings of the 2000 International Symposium on Information Theory and Its Applications, pp.493-496 (2000-11).
  5. Kaname Tomiyasu, Masaya Maeda, Hiroshi Yamamoto, Takashi Kodama and Toru Fujiwara, "On Single IC Chip Implementation of a Recursive Maximum Likelihood Decoding Algorithm for a (64,40) Reed-Muller Subcode," 2000 International Symposium on Information Theory and Its Applications, pp.794-797 (2000-11).

研究会発表

  1. 藤原 融, "誤り訂正符号の性能評価," 電子情報通信学会技術研究報告, IT2000-25 (招待講演) (2000-07).
  2. Yuansheng Tang, Tadao Kasami and Toru Fujiwara, "On the Computation of the Search Centers and the Evaluation of the Testing Conditions for the h-th Chase Decoding," Proceedings of the 23rd Symposium on Information Theory and Its Applications, pp.77-80 (2000-10).
  3. Hitoshi Tokushige, Kentaro Nakamaye, Takuya Koumoto, Yuansheng Tang and Tadao Kasami, "Selection of Search Centers in Iterative Soft-decision Decoding Algorithms," Proceedings of the 23rd Symposium on Information Theory and Its Applications, pp.73-76 (2000-10).
  4. 赤穂 州一郎, 石原 靖哲, 藤原 融, "オブジェクト指向データベースに対する非等価性を考慮した 推論攻撃の可能性検証法," 2001年暗号と情報セキュリティシンポジウム予稿集, Vol.II, pp.693-698 (2001-01).

1999年度

学術論文誌

  1. Toru Nakanishi, Toru Fujiwara and Hajime Watanabe, "A Linkable Group Signature Scheme and Its Application to a Secret Voting," Transactions of Information Processing Society of Japan, Vol.40, No.7, pp.3085-3096 (1999-07).
  2. Yasuhiro Matsumoto and Toru Fujiwara, "A Method for Obtaining the Optimum Sectionalization of the RMLD Algorithm for Non-Linear Rectangular Codes," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82-A, No.10, pp.2052-2060 (1999-10).
  3. Tadao Kasami, Yuansheng Tang, Takuya Koumoto and Toru Fujiwara, "Sufficient Conditions for Ruling-Out Useless Iterative Steps in a Class of Iterative Decoding Algorithms," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E82-A, No.10, pp.2061-2072 (1999-10).

国際会議(査読あり)

  1. M.H. Miki, Daisuke Taki, Gen Fujita, Takao Onoye, Isao Shirakawa, Toru Fujiwara, and Tadao Kasami, "Recursive Maximum Likelihood Decoder for High-Speed Satellite Communication," IEEE International Symposium on Circuits and Systems (1999).
  2. Toru Fujiwara, Masaya Maeda, Tadao Kasami and Hitoshi Tokushige, "On Implementations of Add-Compare-Select Procedure in a Recursive Maximum Likelihood Decoding," 5th International Symposium on DSP for Communication Systems, pp.10-15 (1999-01)
  3. Yuansheng Tang, Tadao Kasami and Toru Fujiwara, An Optimality Testing Algorithm for a Decoded Codeword of Binary Block Codes and its Computational Complexity," 13th International Symposium, Applieed Algebra, Algebraic Algorithms and Error-Correcting Codes, Lecture Notes in Computer Science, Vol.1719, pp.201-210 (1999-11).

研究会発表

  1. Masaya Maeda and Toru Fujiwara, "A Divide-and-Conquer Algorithm for Computing Weight Distribution of Coset Leaders for Linear Block Codes with Relatively Small Memory," IEICE Technical Report, IT99-11 (1999-05).
  2. Maki Yoshida and Toru Fujiwara, "Tracing and Masking Traitors," IEICE Technical Report, ISEC99-28 (1999-07).
  3. 児玉 崇, 前田 昌也, 藤原 融, "線形ブロック符号のトレリスセクションにおけるACS手続きの時分割回 路による実現について," 第22回情報理論とその応用シンポジウム予稿集, No.I of II, pp.315-318 (1999-11).
  4. 村田 佳洋, 石原 靖哲, 伊藤 実, "仕事に対するエージェント集合割り当て問題の近似アルゴリズム," 電子情報通信学会技術研究報告, COMP99-59 (1999-12).
  5. 財部 倫孝, 清水 將吾, 石原 靖哲, 伊藤 実, "タプル間の依存関係を表現できる確率的データベースモデルの提案," 情報処理学会研究報告, DBS-120-9 (2000-01).
  6. Maki Yoshida and Toru Fujiwara, "A Subscriber Unauthorizable and Traitor Traceable Broadcast Distribution System," Proceedings of the 2000 Symposium on Cryptography and Information Security, C10 (2000-01).
  7. 村上 結美, 吉田 真紀, 藤原 融, "デジタルコンテンツ流通におけるマジックインク署名を利用した著作権 保護システム," 電子情報通信学会技術研究報告, ISEC99-122 (2000-03).
  8. 森 健吾, 石原 靖哲, 藤原 融, "オブジェクト指向データベースにおける推論攻撃不可能性の逐次的検査法," 電子情報通信学会技術研究報告, ISEC99-123 (2000-03).
  9. Shougo Shimizu, Junji Yokouchi, Yasunori Ishihara and Minoru Ito, "Complexity of the Type-Consistency Problem for Retrieval and Recursion-Free Acyclic Schemas," IEICE Technical Report, COMP99-88 (2000-03).
  10. Yeon-Dae Kwon, Shougo Shimizu, Yasunori Ishihara and Minoru Ito, "Computational Complexity of Finding Correlated Itemsets," IEICE Technical Report, COMP99-89 (2000-03).

1998年度

著書

  1. Shu Lin, Tadao Kasami, Toru Fujiwara, and Marc Fossorier, Trellises and Trellis-based Decoding algorithm for Linear Block Codes, Kluwer Academic Publishers (1998).

学術論文誌

  1. Tadao Kasami, Hitoshi Tokushige, Toru Fujiwara, Hiroshi Yamamoto and Shu Lin, "A Recursive Maximum Likelihood Decoding Algorithm for Some Transitive Invariant Binary Block Codes," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E81-A, No.9, pp.1916-1924 (1998-09).
  2. Robert Morelos-Zaragoza, Toru Fujiwara, Tadao Kasami and Shu Lin, "Construction of Generalized Concatenated Codes and Their Trellis-Based Decoding Complexity," IEEE Transactions on Information Theory, Vol.45, No.2, pp.725-731 (1999-03).

国際会議(査読あり)

  1. Yoshiyuki Kanamaru, Hiroshi Yamamoto and Toru Fujiwara, "On the Decoding Error Probability and the Accuracy of the Metric Computation for Recursive Maximum Likelihood Decoders of a (64,35) Reed-Muller Subcode," Proceedings of 1998 International Symposium on Information Theory and its Applications, Volume I, pp.94-97 (1998-10).
  2. Ryujiro Shibuya, Yuichi Kaji, Toru Fujiwara, Tadao Kasami and Shu Lin, "Recursive Algorithm for Efficient Map Decoding of Binary Linear Block Codes," Proceedings of 1998 International Symposium on Information Theory and its Applications, Volume II, pp.639-642 (1998-10).
  3. Maki Yoshida and Toru Fujiwara, "Distributed Generation of RSA-Key for Three or More Parties," Proceedings of the 1998 First Japan-Singapore Joint Workshop on Information Security, pp.117-122 (1998-12).
  4. Daisuke Taki, Gen Fujita, Takao Onoye, Isao Shirakawa, Toru Fujiwara, and Tadao Kasami, "VLSI implementation of a recursive maximum likelihood decoder for high-speed satellite communication," International Technical Conference on Circuits/Systems, Computers and Communications, 1383-1386 (1998).

研究会発表

  1. Maki Yoshida and Toru Fujiwara, "Unforgeability Problem for a Class of Protocols Using Signatures," IEICE Technical Report, ISEC98-15 (1998-07).
  2. Maki Yoshida and Toru Fujiwara, "A Metering Scheme for the Number of Accesses," Proceedings of the Computer Security Symposium '98, pp.297-302 (1998-10).
  3. Masaya Maeda, Toru Fujiwara, Tadao Kasami and Hitoshi Tokushige, "On Hardware Implementation of Add-Compare-Select Procedure of a Trellis Section," Proceedings of the 21st Symposium on Information Theory and Its Applications, pp.193-196 (1998-12).
  4. Yuansheng Tang, Tadao Kasami and Toru Fujiwara, "An Optimality Testing Algorithm for a Decoded of Binary Block Codes and Its Computational Complexity," Proceedings of the 21st Symposium on Information Theory and Its Applications, pp.499-502 (1998-12).
  5. Eiji Kasai, Yuichi Kaji, Toru Fujiwara and Tadao Kasami, "A Suboptimum Decoding Algorithm Based on RMLD," Proceedings of the 21st Symposium on Information Theory and Its Applications, pp.539-542 (1998-12).
  6. 山本 宙, 藤原 融, "再帰的最尤復号法における畳込み符号の逐次的なセクション分割について," 第21回情報理論とその応用シンポジウム, Volume II, pp.543-546 (1998-12).
  7. Maki Yoshida and Toru Fujiwara, "A Metering Scheme for the Number of Accesses with Enhanced Anonymity of Users," IEICE Technical Report, ISEC98-83 (1999-03).

1997年度

学術論文誌

  1. Tadao Kasami, Toyoo Takata, Koichi Yamashita, Toru Fujiwara and Shu Lin, "On Bit Error Probability of a Concatenated Coding Scheme," IEEE Transactions on Communications, Vol.45, No.5, pp.536-543 (1997-05).
  2. Yoshihisa Desaki, Toru Fujiwara and Tadao Kasami, "The Weight Distribution of Extended Binary Primitive BCH Codes of Length 128," IEEE Transactions on Information Theory, Vol.43, No.4, pp.1364-1371 (1997-07).
  3. Tadao Kasami, Takuya Koumoto, Toru Fujiwara, Hiroshi Yamamoto, Yoshihisa Desaki and Shu Lin, "Low Weight Subtrellises for Binary Linear Block Codes and Their Applications," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E80-A, No.11, pp.2095-2103 (1997-11).
  4. Toru Fujiwara, Hiroshi Yamamoto, Tadao Kasami and Shu Lin, "A Trellis-Based Recursive Maximum Likelihood Decoding Algorithm for Linear Block Codes," IEEE Transactions on Information Theory, Vol.44, No.2, pp.714-729 (1998-03).

国際会議(査読あり)

  1. Tadao Kasami, Tsukasa Sugita and Toru Fujiwara, "The Split Weight (wL,wR) Enumeration of Reed-Muller Codes for wL+wR < 2dmin," 12th International Symposium, Applieed Algebra, Algebraic Algorithms and Error-Correcting Codes, Lecture Notes in Computer Science 1255, pp.197-211 (1997-06).
  2. Toru Fujiwara, Yoshihisa Desaki, Tsukasa Sugita and Tadao Kasami, "The Weight Distributions of Several Extended Binary Primitive BCH Codes of Length 256," 1997 IEEE International Symposium on Information Theory, p.363 (1997-06)
  3. Tadao Kasami, Takuya Koumoto, Toru Fujiwara, Hiroshi Yamamoto and Shu Lin, "The Structure and Complexity of Subtrellis Diagrams for Low Weight Codewords of Binary Linear Block Codes," 1997 IEEE International Symposium on Information Theory, p.364 (1997-06).
  4. Yuich Kaji, Toru Fujiwara, Tadao Kasami and Shu Lin, "A Recursive Log-MAP Algorithm for Binary Linear Block Codes," IEEE Information Theory Workshop, pp.75-76 (1997-07).
  5. Toru Fujiwara, Takashi Komura, Takao Onoye, Yuichi Kaji, Tadao Kasami and Shu Lin, IC Implementation of a Recursive Maximum Likelihood Decoding Algorithm for Reed-Muller and Related Codes," 4th International Symposium on Communication Theory and Applications, pp.2-7 (1997-07).
  6. Toru Nakanishi, Hajime Watanabe and Toru Fujiwara "A Linkable Group Signature and Its Application to a Fair Secret Voting," 4th International Symposium on Communication Theory and Applications, pp.159-164 (1997-07).
  7. Hiroshi Yamamoto, Toru Fujiwara and Takayuki Uchida, "Recursive Maximum Likelihood Decoding Algorithm for Convolutional Codes and Its Complexity Thirty-Fifth Annual Allerton Conference on Communication, Control, and Computing (1997).

研究会発表

  1. Toru Fujiwara and Tadao Kasami, "The Weight Distribution of (256,k) Extended Binary Primitive BCH Codes with k <= 63 and k >= 207," IEICE Technical Report, IT97-46 (1997-09).
  2. 松本 康宏, 藤原 融, "線形符号の重み一定部分符号に対する再帰的最尤復号における最適セクション 分割," 電子情報通信学会技術研究報告, IT97-49 (1997-09).
  3. 山本 宙, 内田 貴之, 藤原 融, "畳込み符号の再帰的最ゆう復号法における逐次的セクション分割とその最適性," 第20回情報理論とその応用シンポジウム予稿集, pp.309-312 (1997-12).
  4. 松本 康宏, 藤原 融, "線形符号の重み一定部分符号に対する再帰的最尤復号における最適セクション 分割の計算法," 第20回情報理論とその応用シンポジウム予稿集, pp.313-316 (1997-12).
  5. Hitoshi Tokushige, Toyoo Takata, Tadao Kasami and Toru Fujiwara, "On Subcodes of Reed-Muller Codes," Proceedings of the 20th Symposium on Information Theory and Its Applications, pp.317-320 (1997-12).
  6. Maki Yoshida and Toru Fujiwara, "A Sufficient Condition for Unforgeability Problem for the Receipt of any Message to be Decidable," IEICE Technical Report, ISEC97-57 (1997-12).
  7. Maki Yoshida and Toru Fujiwara, "A Sufficient Condition for Reply Unforgeability Problem to be Decidable," Proc.1998 Symposium on Cryptography and Information Security, 8.3.A (1998-01).