Information Security Engineering Laboratory,
Department of Multimedia Engineering,
Graduate School of Information Science and Technology,
Osaka University
Mine Arai, Koki Tejima, Yuya Yamada, Takayuki Miura, Kyosuke Yamashita, Chihiro Kado, Rei Shimizu, Masataka Tatsumi, Naoto Yanai, Goichiro Hanaoka, "REN-AI: A Video Game for AI Security Education Leveraging Episodic Memory", IEEE Access, vol. 12, pp. 47359-47372, 2024.
2023/04-
Journals
Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi and Jason Paul Cruz, "A Study on Quantized Parameters for Protection of Model and Its Inference Input," Journal of Information Processing, (2023-06). (To appear.)
Kazuhiko Minematsu, Junji Shikata, Yohei Watanabe, and Naoto Yanai, "Anonymous Broadcast Authentication with One-to-Many Transmission to Control IoT Devices," IEEE Access, Vol.11, pp. 62955--62969, IEEE (2023-06).
Koji NAKAO, Katsunari YOSHIOKA, Takayuki SASAKI, Rui TANABE, Xuping HUANG, Takeshi TAKAHASHI, Akira FUJITA, Jun'ichi TAKEUCHI, Noboru MURATA, Junji SHIKATA, Kazuki IWAMOTO, Kazuki TAKADA, Yuki ISHIDA, Masaru TAKEUCHI, Naoto YANAI, "Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware," IEICE Transactions on Information and Systems, Vol. E106.D, No. 9, pp. 1302-1315, IEICE (2023-09).
Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata, “Designated Verifier Signature with Claimability,” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (to appear)
Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura and Tsutomu Matsumoto “Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality” IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (to appear).
Kyosuke Yamashita, Keisuke Hara, “On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes,” Journal of Mathematical Cryptology (to appear)
Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura, “JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection,” Journal of Information Processing (to appear)
International Conferences
Janaka Senanayake, Sampath Rajapaksha, Naoto Yanai, Chika Komiya, and Harsha Kumara Kalutarage, "MADONNA: Browser-Based MAlicious Domain Detection through Optimized Neural Network with Feature Analysis," the 38th International Conference on ICT Systems Security and Privacy Protection (IFIP SEC 2023), Springer (2023-06). (To appear.)
Chika Komiya, Naoto Yanai, Kyosuke Yamashita and Shingo Okamura, "JABBERWOCK: A Tool for Generation of WebAssembly Dataset," DSN Workshop on Data-Centric Dependability and Security (DCDS) 2023 (2023-06). (To appear.)
Tomoya Matsumoto, Takayuki Miura, and Naoto Yanai, "Membership Inference Attacks against Diffusion Models," The 6th Deep Learning Security and Privacy Workshop (DLSP 2023), IEEE (2023-05).
Yumeki Goto, Tomoya Matsumoto, Hamada Rizk, Naoto Yanai, Hirozumi Yamaguchi, "Privacy-Preserving Taxi-Demand Prediction Using Federated Learning," Proc. of 9th IEEE International Workshop on Sensors and Smart Cities (SSC 2023), IEEE (2023-06).
Yohei Watanabe, Naoto Yanai, Junji Shikata, "IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures,"
The 18th International Conference on Information Security Practice and Experience (ISPEC 2023), Springer (2023-08). (To appear.)
Kyosuke Yamashita, Keisuke Hara, “On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes,” Collectio Ciphrarum - Proceedings of cryptographic conferences and workshops (CIFRIS2023) (to appear)
Yumeki Goto, Nami Ashizawa, Toshiki Shibara, Naoto Yanai, "Do Backdoors Assist Membership Inference Attacks?," Proc. of 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2023) (2023-10). (To appear.)
Kazuki Iwahana, Naoto Yanai, Toru Fujiwara, "Backdoor Attacks Leveraging Latent Representation in Competitive Learning," Proc. of the 1st Workshop on Security and Artificial Intelligence (SECAI 2023) (2023-09). (To appear.)
Mine Arai, Naoto Yanai and Goichiro Hanaoka, "KOTO Crypto: Educational cryptography with the Koto," The 18th International Workshop on Security (IWSEC 2023), Poster (2023-08). IWSEC2023 Best Poster Award.
Thomas Espitau,Thi Thu Quyen Nguyen,Chao Sun,Mehdi Tibouchi,Alexandre Wallet, “ANTRAG: Annular NTRU Trapdoor Generation Making Mitaka As Secure As Falcon,” ASIACRYPT 2023 (2023-12). (To appear.)
Masahiro Kamimura, Kyosuke Yamashita, Naoto Yanai, "Generic Construction of Key-Aggregate Searchable Encryption," GeoPrivacy 2023, ACM (2023-10). (To appear.)
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Singo Okamura, "Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts," Blockchain: Research and Applications, Elsevier (2022-07). (To appear.)
Ryu ISHII, Kyosuke YAMASHITA, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO, “Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures”, IEICE TRANSACTIONS on Information and Systems, Vol.E105-D, No.11, pp.1845-1856. (2022-11).
Ouyang Junjie, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Shingo Okamura, Jason Paul Cruz, "APVAS: Reducing the Memory Requirement of AS_PATH Validation by Introducing Aggregate Signatures into BGPsec," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (2022-11).
Naoki Umeda, Naoto Yanai, Taiji Kimura, "The Juice is Worth the Squeeze: Analysis of Autonomous System Provider Authorization in Partial Deployment," IEEE Open Journal of the Communications Society (2022-12).
Naoki Umeda, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Jason Paul Cruz, Shingo Okamura, SQUAB: A Virtualized Infrastructure for BGP-related Experiments and Its Applications to Evaluation on BGPsec, Journal of Information Processing, 2022, Volume 30, pp.829-840 (2022-12).
Kyosuke YAMASHITA, Ryu ISHII, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA and Tsutomu MATSUMOTO, “Fault-Tolerant Aggregate Signature Schemes Against Bandwidth Consumption Attack”, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences (to appear).
International Conferences
Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto, “Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality”, Computer Security. ESORICS 2022 International Workshops: CyberICPS, SECPRE, ADIoT, SPOSE, CPS4CIP, and CDT&SECOMANE (2022) (2022-08).
Hiromasa Kitai, Naoto Yanai, Kazuki Iwahana, Masataka Tatsumi and Jason Paul Cruz, "MOTUS: How Quantized Parameters Improve Protection of Models and Their Inference Inputs," The 15th International Conference on Security for Information Technology and Communications (SECITC 2022) (2022-12). (to appear.)
Chihiro Kado, Naoto Yanai, Jason Paul Cruz, Shingo Okamura, "An Empirical Study of Impact of Solidity Compiler Updates on Vulnerabilities," 4th Workshop on Blockchain theoRy and ApplicatIoNs (BRAIN 2023), pp. 92--97, IEEE (2023-03).
Kyosuke YAMASHITA, Keisuke HARA, Yohei WATANABE, Naoto YANAI, and Junji SHIKATA, “Designated Verifier Signature with Claimability”, APKC@AsiaCCS 2023 (to appear).
Invited talks
Naoto Yanai, "Security Research on Blockchain," 3rd Joint ERCIM-JST Workshop (2022) (2022-10).
Toru Fujiwara, Takuaya Kusaka,“The Weight Distributions of the (256, k) Extended Binary Primitive BCH Codes with k ≦ 71 and k ≧ 187,”IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E104-A, No.9, (2021-09 to appear).
Kazuki Iwahana, Tatsuya Takemura, Ju Chien Cheng, Nami Ashizawa, Naoki Umeda, Kodai Sato, Ryota Kawakami, Rei Shimizu, Yuichiro Chinen, Naoto Yanai, "MADMAX: Browser-Based Malicious Domain Detection through Extreme Learning Machine," IEEE Access, Vol.9, pp. 78293-78314, IEEE (2021-05).
Yang Chen, Nami Ashizawa, Chai Kiat Yeo, Naoto Yanai, Seanglidet Yean, "Multi-scale Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for unsupervised intruction detection," Knowledge-Based Systems, Volume 224, Article No. 107086, pp. 1-11, Elsevier (2021-07).
Naoto Yanai, Kazuki Iwahana, Tatsuya Takemura, Toshiki Shikata, and Hiromasa Kitai, "Studies on Model Protection for Machine Learning and Its Research Trends," IEICE Transactions on Communications, Vol. J104-B, No.10, pp.742-760 (2021-10).
Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura, "RA: A Static Analysis Tool for Analyzing Re-Entrancy Attacks in Ethereum Smart Contracts," Journal of Information Processing, Vol. 29, p.537-547 (2021-10).
Kazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara, "SPGC: Integration of Secure Multiparty Computation and Differential Privacy for Gradient Computation on Collaborative Learning," Journal of Information Processing, Vol. 30, Pages 209-225 (2022-03).
International Conferences
Naoki Umeda, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Jason Paul Cruz and Shingo Okamura, "SQUAB: A Virtualized Infrastructure for Experiments on BGP and Its Extensions", The 35th International Conference on Advanced Information Networking and Applications (AINA 2021), Lecture Notes in Networks and Systems (LNNS), volume225, pp.600-613, Springer (2021-06).
Yohei Watanabe, Naoto Yanai and Junji Shikata, "Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices", The 35th International Conference on Advanced Information Networking and Applications (AINA 2021), Lecture Notes in Networks and Systems(LNNS), volume225, pp.679-690, Springer (2021-06).
Tatsuya Takemura, , Naoto Yanai, Naoki Umeda, Masayuki Okada, Shingo Okamura, Jason Paul Cruz, "APVAS+: A Practical Extension of BGPsec with Low Memory Requirement", Proc. of 2021 IEEE International Conference on Communications (ICC 2021), pp. 1-7, IEEE (2021-06).
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Singo Okamura, "Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts", Proc. of The Third ACM International Symposium on Blockchain and Secure Critical Infrastructure (BSCI 2021), pp. 47–59, ACM (2021-06), Best Paper Award.
Kenji Yasunaga, "Replacing Probability Distributions in Security Games via Hellinger Distance," Proc. of the 2nd Conference on Information-Theoretic Cryptography (ITC 2021), No.17, pp.17:1-17:5 (2021-07).
Naoki Furuya,Norihisa Komoda, and Toru Fujiwara,
"Improvement of Area Priority Setting of Sequential Processing Storage Location Recommendation Technology Considering Stock Storage Period."
Internatinal Conference on Production Research (2021-07).
Kazuki Iwahana, Naoto Yanai, Jason Paul Cruz, Toru Fujiwara, "SPGC: An Integrated Framework of Secure Computation and Differential Privacy for Collaborative Learning", Proc. of the 16th DPM International Workshop on Data Privacy Management (DPM 2021), LNCS 13140, pp.89-105, Springer (2021-10).
Takumi Okano, Hideharu Kojima, Naoto Yanai and Tatsuhiro Tsuchiya, "Implementing Access Control in Chaincodes on Hyperledger Fabric with Attribute-Based Encryption", Proc. of the Third Workshop on Blockchain-based Architectures (BlockArch 2022) (2022-03).
Misc
Masataka Tasumi, Kazuki Iwahana, Naoto Yanai, Katsunari Shishido, Toshiya Shimizu, Yuji Higuchi, Ikuya Morikawa, Jun Yajima, "First to Possess His Statistics: Data-Free Model Extraction Attack on Tabular Data," (2021-09). arXiv. (https://arxiv.org/abs/2109.14857)
Yasunori Ishihara, Takashi Hayata, Toru Fujiwara "The Absolute Consistency Problem for Relational Schema Mappings with Functional Dependencies," IEICE Transactions on Information and Systems, Vol.E103-D, No.11, pp.2278-2288 (2020-11).
Tatsuya Takemura, Naoto Yanai, Toru Fujiwara "Model Extraction Attacks against Recurrent Neural Networks", Journal of Information Processing, Vol.28, No.12 (2020-12). pp.1010-1024(2020-12)
Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Jason Paul Cruz, Naoto Yanai, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka, “Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E103-A, No.12, pp.1367-1380 (2020-12).
Tomohiro Hayashi and Kenji Yasunaga, "On the list decodability of insertions and deletions," IEEE Transactions on Information Theory, Vol.66, No.9, pp.5335-5343 (2020-09).
Kenji Yasunaga, "Practical Card-Based Protocol for Three-Input Majority," IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E103-A, No.11, pp.1296–1298 (2020-11).
International Conferences
Hideharu Kojima, Naoto Yanai, “A Model Checking Method for Secure Routing Protocols by SPIN with State Space Reduction”, Proc. of 2020 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), pp. 627-635, IEEE (2020-05).
Kodai Sato, Kenji Yasunaga and Toru Fujiwara, "A Construction of Robustly Reusable Fuzzy Extractors over Blockchains", Proc. of The 30th International Symposium on Information Theory and Its Applications (ISITA 2020), IEEE (2020-10).
Yuichiro Chinen, Naoto Yanai, Jason Paul Cruz, Shingo Okamura, "RA: Hunting for Re-Entrancy Attacks in Ethereum Smart Contracts via Static Analysis", Proc. of the 3rd IEEE International Conference on Blockchain (Blockcha2020), pp. 327-336, IEEE (2020-11).
Hideki Okita, Hayato Hoshihara, Norihisa Komoda, Toru Fujiwara,"Dynamically Prioritized Virtual-Network Monitoring according to Lifecycle of Virtual Machines in Large Scale Data Center,"Proceedings of 19th International Conference on WWW/Internet, pp.123-131 (2020-11), Best Paper Award.
Yang Chen, Nami Ashizawa, Seanglidet Yean, Chai Kiat Yeo, Naoto Yanai, "Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection", Proc. of IEEE Consumer Communications and Networking Conference (CCNC) 2021, IEEE (2021-01). (To appear.)
Misc
Ouyang Junjie, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Shingo Okamura, Jason Paul Cruz, "APVAS: Reducing Memory Size of AS_PATH Validation by Using Aggregate Signatures" (2020-08). arXiv. (https://arxiv.org/abs/2008.13346)
Yang Chen, Nami Ashizawa, Seanglidet Yean, Chai Kiat Yeo, Naoto Yanai, "Self-Organizing Map assisted Deep Autoencoding Gaussian Mixture Model for Intrusion Detection" (2020-8). arXiv. (https://arxiv.org/abs/2008.12686)
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, Shingo Okamura, “Eth2Vec: Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts”, (2021-01). arXiv. (https://arxiv.org/abs/2101.02377)
Hideharu Kojima, Naoto Yanai, Jason Paul Cruz, “ISDSR+: Improving the Security and Availability of Secure Routing Protocol”, IEEE Access, Vol.7, pp.74849-74868 (2019-06).
平島 陽子, 薦田 憲久, 藤原 融,“統合モビリティサービスの実現に向けたスキーママッチング手法の提案,”電気学会論文誌C,Vol. 139, No. 6, pp. 686-691(2019-06),【翻訳版:Yoko Hirashima, Norihisa Komoda, Toru Fujiwara;"A schema matching approach for integrated mobility service,"Electronics and Communications in Japan, Vol.102, Issue 9, pp.12-18 (2019.9) 】.
Shimamoto Hayato, Naoto Yanai, Shingo Okamura, Jason Paul Cruz, Shouei Ou, Takao Okubo, “Towards Further Formal Foundation of Web Security: Expression of Temporal Logic in Alloy and Its Application to A Security Model with Cache”, IEEE Access, Vol.7, pp.74941-74960 (2019-06).
Masahiro Kamimura, Naoto Yanai, Shingo Okamura, Jason Paul Cruz, “Key-Aggregate Searchable Encryption, Revisited: Formal Foundations for Cloud Applications,and Their Implementation”, IEEE Access, Vol. 8, pp.24153-24169 (2020-01).
International Conferences
Shinnosuke Shimizu, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tuchiya,"Implementation and Evaluation of ISDSR in Emulation Environments",Proc. of the IEEE Wireless Communications and Networking Conference(WCNC) 2019,IEEE (2019-04)
Takayuki Fujiwara, Shintaro Tsuchiya, Norihisa Komoda, and Toru Fujiwara, “A Fitness Bike Maintenance System with Three-Dimensional Computer Graphics”, 12th International Conference ICT, Society, and Human Beings 2019 (2019-07).
Hideharu Kojima, Naoto Yanai, "A Chain Code Mechanism with Data Encryption on Hyperledger Fabric", The 24th European Symposium on Research in Computer Security (ESORICS 2019), Poster (2019-09).
Yoshiki Yumbe, Norihisa Komoda, and Toru Fujiwara, “Workforce scheduling system to manage static optimization and dynamic re-optimization for field service”, IEEE International Conference on Systems, Man, and Cybernetics, pp.3122-3127, (2019-10).
Kenji Yasunaga and Takeshi Koshiba, "Perfectly secure message transmission against independent rational adversaries,"In Proceedings of the 10th Conference on Decision and Game Theory for Security (GameSec 2019), LNCS 11836, pp.563–582, (2019-10).
Hideharu Kojima, Naoto Yanai, “A State Space Suppression Method for Formal Verification of Secure Routing Protocols with SPIN”, the 30th International Symposium on Software Reliability Engineering (ISSRE 2019), IEEE, Fast Abstract (2019-10).
Hideharu Kojima, Naoto Yanai, “A State Space Reduction Method for Model Checking of Wireless Multi-hop Network Routing Protocols Focusing on Topologies”, The Seventh International Symposium on Computing and Networking workshop (CANDAR 2019), IEEE (2019-11).
Mio Saiki, Hideharu Kojima, Naoto Yanai, Tatsuhiro Tsuchiya, "A Chaincode with Attribute-Based Encryption for Protecting Data in Ledgers", The Network and Distributed System Security Symposium (NDSS) 2020, poster (2020-02).
Ryota Kawakami, Atsuo Inomata, Naoto Yanai, Toru Fujiwara, "Wireless Access Point Spoofing by Unmanned Aerial Vehicles (UAVs)", The Network and Distributed System Security Symposium (NDSS) 2020, poster (2020-02).
Yoshiyuki Kido, Nelson Pinto Tou, Naoto Yanai, Shinji Shimojo, “sD&D: Design and Implementation of Cybersecurity Educational Game with Highly Extensible Functionality”, The 2020 Future of Information and Communications Conference (FICC2020), AISC 1129, pages 857-873 (2020-03).
Naoto Yanai, "Meeting Tight Security for Multisignatures in the Plain Public Key Model", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E101-A,No.9, pp.1484-1493(2018-09)
Seunghoan Song, Toru Fujiwara, “Sphere Packing Bound and Gilbert-Varshamov Bound for b-Symbol Read Channels”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E101-A, No.11, pp.1915-1924 (2018-11).
Maki Yoshida, Toru Fujiwara, “Optimal Uniform Secret Sharing”, IEEE Transactions on Information Theory, Vol.65, No.1, pp.436-443 (2019-01).
International Conferences
Naoto Yanai, Jason Paul Cruz, "On Security of Anonymous Invitation-Based System" . Proc. of the 13th DPM International Workshop on Data Privacy Management (DPM 2018), LNCS 11025, pp.415-421 (2018-09).
Maiki Fujita, Kenji Yasunaga, and Takeshi Koshiba, "Perfectly secure message transmission against rational timid adversaries,"Proceedings of the 9th Conference on Decision and Game Theory for Security (GameSec 2018), LNCS, 11199, pp.127-144, (2018-10).
Eriko Ando, Takashi Kawauchi, Norihisa Komoda, Toru Fujiwara,“Security Risk Assesssment Supporting System in Connected Car Systems”, Proceedings of the 15th International Conference on Applied Computing, pp.389-394 (2018-11).
Takahiro Higuchi,Naoto Yanai,Kensuke Ueda,Yasunori Ishihara,Toru Fujiwara, "A Privacy Risk Arising from Communication with TV: Consideration from Attribute Inference for Users", The Network and Distributed System Security Symposium (NDSS) 2019, poster (2019-02)
Jason Paul Cruz, Yuichi Kaji, Naoto Yanai, “RBAC-SC: Role-based Access Control using Smart Contract”, IEEE Access, Vol.6, pp.12240-12251(2018-03).
International Conferences
Takashi Hayata, Yasunori Ishihara, and Toru Fujiwara,
“The Absolute Consistency Problem of Graph
Schema Mappings with Uniqueness Constraints,”
Proceedings of the 9th International Conference on
Advances in Databases,
Knowledge, and Data
Applications, pp. 103-110
(2017-05).
Naoto Yanai, “Tightly Secure Identity-Based Multisignatures,” 2017 IEEE International Conference on Consumer Electronics – Taiwan (ICCE-TW 2017), pp.253-254, IEEE (2017-06).
Hiroyuki Kato, Yasunori Ishihara and Torsten Grust,
“DDO-Free XQuery,”
Proceedings of the 16th International Symposium on Database
Programming Languages
(2017-09)
(accepted).
Yuuji Furuta, Naoto Yanai, Masashi Karasaki, Katsuhiko Eguchi, Yasunori Ishihara, Toru Fujiwara, “Towards Efficient and Secure Encrypted Databases: Extending Message-Locked Encryption in Three-Party Model,” Proc. of the 12th International Workshop on Data Privacy Management (DPM 2017), co-located in ESORICS 2017, LNCS 10436, pp.55-69, Springer (2017-09).
Hideharu Kojima, Naoto Yanai, “Performance Evaluation for The Signature Algorithm of ISDSR on Raspberry Pi”, Proc. of 10th International Workshop on Autonomous Self-Organizing Networks (ASON 2017), co-located in The Fifth International Symposium on Computing and Networking (CANDAR 2017), IEEE (2017-11) (accepted).
Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, “Identity-Based Key-Insulated Aggregate Signatures, Revisited”, Proc. of The 13th International Conference on Information Security and Cryptology (Inscrypt 2017), LNCS 10726, pp.141-156, Springer (2017-11).
Maki Yoshida and Toru Fujiwara,
“Efficient Usage of Cover Free Families in Broadcast Encryption,”
IEICE Transactions on Fundamentals, Vol.E99-A, No.6, pp.1216-1221 (2016-06).
Hikaru Kishimoto, Naoto Yanai, Shingo Okamura, “SPaCIS: Secure Payment Protocol for Charging Information over Smart Grid”, Journal of Information Processing, Vol.25, No.1, pp12-21 (2017-01).
Kazuma Tanaka, Naoto Yanai, Masayuki Okada, Takashi Nishide, Eiji Okamoto, "APAT: An Application of Aggregate Signatures to BGPSEC," The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016), Fast Abstract (2016-06).
Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara, "ISDSR : Secure DSR with ID-based Sequential Aggregate Signature," Proc. of the 13th International Joint Conference on e-business and Telecommunications (ICETE 2016), Vol. 4, SECRYPT, pp. 376-387 (2016-07).
Yudai Nagamine, Naoto Yanai, Shingo Okamura, Toru Fujiwara, "Malware for Protocol Misidentification," The 11th International Workshop on Security (IWSEC2016), poster (2016-09).
Kento Takahashi and Yasunori Ishihara, "Formalizations of secrecy of encrypted databases against realistic attackers," Proc. of International Symposium on Information Theory and its Application (ISITA) (2016-11).
Hayato Shimamoto, Naoto Yanai, Shingo Okamura, Toru Fujiwara, “Web Security Model with Cache,” Proc. of International Symposium on Information Theory and its Application (ISITA) (2016-11).
Ryo Fukuyama, Naoto Yanai, Shingo Okamura, Toru Fujiwara, “Towards a Formal Foundation of Protection against Data-Oriented Attacks,” Proc. of International Symposium on Information Theory and its Application (ISITA) (2016-11).
Naoto Yanai, "Towards Provable Security of Dynamic Source Routing Protocol and Its Applications," Proc. of ER 2016 Workshops, AHA, MoBiD, MORE-BI, MReBA, QMMQ, SCME, and WM2SP, LNCS 9975, pp.231-239 (2016-11).
Naoto Yanai, “On the Tightness of Deterministic Identity-Based Signatures”, Proc. of The Fourth International Symposium on Computing and Networking (CANDAR 2016), pp.168-173 (2016-11).
Hikaru Kishimoto, Naoto Yanai, Shingo Okamura, “An Anonymous Authentication Protocol for Smart Grid,” Proc. of the 31st International Conference on Advanced Information Networking and Applications Workshops (WAINA 2017), pp.62-67, IEEE (2017-03).
Yasunori Ishihara, Yasuhiro Ushirozako, Kengo Mori and Jun Furukawa,
"A Secrecy Criterion for Outsourcing Encrypted Databases
Based on Inference Analysis,"
IEICE Transactions on Information and Systems,
Vol.E98-D, No.6, pp.1161-1165 (2015-06).
Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara,
"The Consistency and Absolute Consistency Problems of
XML Schema Mappings between Restricted DTDs,"
World Wide Web Journal,
Vol.18, Issue 5, pp.1443-1461 (2015-09).
Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eji Okamoto, "Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions," Journal of Information Processing, Vol.24, No.2, pp. 275-291 (2016-02).
Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara,
Hiroyuki Seki and Toru Fujiwara,
"Determinacy and Subsumption of Single-valued Bottom-up
Tree Transducers,"
IEICE Transactions on Information and Systems,
Vol.E99-D, No.3, pp.575-587 (2016-03).
International Conferences
Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka and Eiji Okamoto, "Constructions of Fail-Stop Signatures for Multi-Signer Setting", Proc. of the 10th Asia Joint Conference on Information Security (AsiaJCIS 2015), pp.112-123 (2015-5).
Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto, "Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack", Proc. of the 12th International Conference on Security and Cryptography (SECRYPT 2015), pp.39-52 (2015-7).
Kenta Muranaka, Naoto Yanai, Shingo Okamura and Toru Fujiwara, "Secure Routing Protocols for Sensor Networks: Construction with Signature Schemes for Multiple Signers", Proc. of The 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015), pp.1329--1336 (2015-8).
Kenta Muranaka, Naoto Yanai, Shingo Okamura, Toru Fujiwara, "Toward Secure Routing Protocols for Sensor Networks," The 10th International Workshop on Security (IWSEC2015), poster (2015-8).
Hikaru Kishimoto, Shingo Okamura, Naoto Yanai, "Secure Payment Protocol for Charging Information over SmartGrid," The 10th International Workshop on Security (IWSEC2015), poster (2015-8).
Yuma Higashiyama, Naoto Yanai, Shingo Okamura and Toru Fujiwara, "Revisiting Authentication with Shoulder-Surfing Resistance for Smartphones," The Third International Symposium on Computing and Networking (CANDAR 2015), pp.89-95 (2015-12)
Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto, "Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs," Proc. of The Seventh International Conference on Trusted Systems (INTRUST 2015), LNCS 9565, pp.30-46 (2016-03).
Tomoya Iwasaki, Naoto Yanai, Masaki Inamura, Keiichi Iwamura, "Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the computational Diffie-Hellman Assumption," Proc. of The 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), pp.669-676 (2016-03).
Maki Yoshida, Kazuya Ohkita and Toru Fujiwara,
"Individual Restoration of Tampered Pixels for Statistical Fragile
Watermarking," IEICE Transactions on Information and Systems,
Vol.E98-D, No.1, pp.58-64 (2015-01).
Maki Yoshida and Toru Fujiwara,
"On the Impossibility of d-Multiplicative Non-perfect Secret Sharing,"
IEICE Transactions on Fundamentals, Vol.E98-A, No.2, pp.767-770 (2015-02).
International Conferences
Hironobu Tozuka, Maki Yoshida, Toru Fujiwara,
"Salt-and-Pepper Image Watermarking System for IHC Evaluation Criteria,"
Proceedings of the 1st international workshop on Information hiding and its criteria for evaluation (IWIHC 2014),
pp.31-36
(2014-06).
Yasunori Ishihara, Hayato Kuwada and Toru Fujiwara,
"The Absolute Consistency Problem of XML Schema Mappings
with Data Values between Restricted DTDs,"
Proceedings of the 25th International Conference on
Database and Expert Systems Applications,
Lecture Notes in Computer Science 8644, pp. 317-327 (2014-09).
Naoto YANAI, Masahiro MAMBO, and Eiji OKAMOTO, “A CDH-Ordered
Multisignature Scheme in the Standard Model with Better Efficiency,”
Proc. of International Symposium on Information Theory and its
Application (ISITA) 2014, pp.236-240 (2014-10).
Kenji Hashimoto, Ryuta Sawada, Yasunori Ishihara,
Hiroyuki Seki and Toru Fujiwara,
"Determinacy and Subsumption for Single-valued Bottom-up
Tree Transducers,"
Proceedings of the 7th International Conference on
Language and Automata Theory and Applications,
Lecture Notes in Computer Science 7810,
pp.335-346
(2013-04).
Hayato Kuwada, Kenji Hashimoto, Yasunori Ishihara and Toru Fujiwara,
"The Consistency and Absolute Consistency Problems of
XML Schema Mappings between Restricted DTDs,"
Proceedings of the 15th International Asia-Pacific Web Conference,
Lecture Notes in Computer Science 7808,
pp.228-239
(2013-04).
Nobuaki Yamazoe, Kenji Hashimoto, Yasunori Ishihara and
Toru Fujiwara,
"Decidability of k-secrecy against Inference Attacks
Using Functional Dependencies on XML Databases,"
Proceedings of the 2013 International Conference on
Parallel and Distributed Processing Techniques and Applications,
pp.182-188
(2013-07).
Yasunori Ishihara, Nobutaka Suzuki,
Kenji Hashimoto, Shogo Shimizu and Toru Fujiwara,
"XPath Satisfiability with Parent Axes or
Qualifiers Is Tractable under Many of Real-World DTDs,"
Proceedings of the 14th International Symposium on Database
Programming Languages,
http://arxiv.org/abs/1308.0769
(2013-08).
Ryo Iwase, Yasunori Ishihara and Toru Fujiwara,
"Toward Security Verification against Inference Attacks on Data Trees,"
2nd International Workshop on
Trends in Tree Automata and Tree Transducers,
pp.49-59,
http://dx.doi.org/10.4204/EPTCS.134.6
(2013-10).
Takuya Kusaka, Ryuhei Yokoyama and Toru Fujiwara,
"A Recursive Method on Vector Generation in
non-Increasing Order of its Likelihood for all Binary
Vectors and its Application for Linear Block Code,"
IEICE Transactions on Fundamentals, Vol.E95-A, No.4, pp.801-810 (2012-04).
Kenji Hashimoto, Hiroto Kawai,
Yasunori Ishihara and Toru Fujiwara,
"Decidability of the Security against Inference Attacks using a
Functional Dependency on XML Databases,"
IEICE Transactions on Information and Systems,
Vol.E95-D, No.5, pp.1365-1374
(2012-05).
International Conferences
Maki Yoshida, Toru Fujiwara, and Marc P.C. Fossorier, "Optimum General Threshold Secret Sharing," the 6th International Conference on Information Theoretic Security (ICITS2012), LNCS 7412, pp.187--204 (2012-08).
Takuya Kusaka, Ryuhei Yokoyama, and Toru Fujiwara,
"Soft-Decision Sphere Decoding based on the Recursive Vector Generator," 2012 International Symposium on Information Theory and its Applications (ISITA2012), pp.111-115 (2012-10).
Seigo Ikeda, Maki Yoshida, and Toru Fujiwara, "New Hybrid Additive-Multiplicative Watermarking with Better Tradeoff between Image Quality and Detection Accuracy," 2012 International Symposium on Information Theory and its Applications (ISITA2012), pp.797-801 (2012-10).
Yasunori Ishihara, Kenji Hashimoto, Shogo Shimizu and Toru Fujiwara,
"XPath Satisfiability with Downward and Sibling Axes
Is Tractable under Most of Real-world DTDs,"
Proceedings of the 12th International Workshop on
Web Information and Data Management,
pp.11-18
(2012-11).
Itsuki Suzuki, Maki Yoshida, and Toru Fujiwara, "Generic Construction of GUC Secure Commitment in the KRK Model," the 7th International Workshop on Security (IWSEC2012), accepted (2012-11).
Yasunori Ishihara, Kenji Hashimoto, Atsushi Ohno,
Takuji Morimoto and Toru Fujiwara,
"Typing XPath Subexpressions With Respect to an XML Schema,"
Proceedings of the 5th International Conference on Advances in
Databases, Knowledge, and Data Applications,
pp.128-133
(2013-01).
Kenji Hashimoto, Yohei Kusunoki, Yasunori Ishihara and Toru Fujiwara,
"Validity of Positive XPath Queries with Wildcard
in the Presence of DTDs,"
The 13th International Symposium on Database Programming Languages,
http://www.cs.cornell.edu/conferences/dbpl2011/papers/dbpl11-hashimoto.pdf
(2011-08).
Kenji Yasunaga and Toru Fujiwara,
"On Correctable Errors of Binary Linear Codes,"
IEEE Transactions on Information Theory, Vol.56, No.6, pp.2537-2548 (2010-06).
Maki Yoshida and Toru Fujiwara, "Toward Digital Watermarking for Cryptographic Data," IEICE Transactions on Fundamentals, Vol.E94-A, No.1, pp.270-272 (2011-01).
International Conferences
Maki Yoshida and Toru Fujiwara, "All-or-nothing Property for Efficient Symbolic Analysis," Computational and Symbolic Proofs of Security (2010-04).
Hiroaki Yamanaka, Shingo Okamura, and Toru Fujiwara,
"A Metric of Search Efficiency and Preventability of Polluted Contents for Unstructured Overlay,"
2010 the 10th Annual International Symposium on Applications and the Internet (SAINT 2010), Student Session,
pp.181-184 (2010-07).
Yasunori Ishihara, Shogo Shimizu and Toru Fujiwara,
"Extending the Tractability Results on
XPath Satisfiability with Sibling Axes,"
Proceedings of the 7th International XML Database Symposium,
Lecture Notes in Computer Science 6309,
pp.33-47 (2010-09).
Tetsushi Masuno, Takuya Kusaka, Toru Fujiwara,
"A New Method to Reduce the Probability of Detection Errors for a Digital Watermark Using Complementary Decoding Algorithms and Minimum Weight Codewords of Linear Code,"
2010 International Symposium on
Information Theory and Its Applications (2010-10).
Ryuhei Yokoyama, Takuya Kusaka, Toru Fujiwara,
"Adaptive Recursive MLD Using Ordered Statistics for Low Rate Codes,"
2010 International Symposium on
Information Theory and Its Applications (2010-10).
Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu,
Keisuke Nakano and Yasunori Ishihara,
"Context-Preserving XQuery Fusion,"
Proceedings of the 8th Asian Symposium on Programming Languages and
Systems,
Lecture Notes in Computer Science 6461,
pp.255-270
(2010-11).
Kenji Hashimoto, Kimihide Sakano,
Fumikazu Takasuka, Yasunori Ishihara and Toru Fujiwara,
"Verification of the Security against Inference Attacks
on XML Databases,"
IEICE Transactions on Information and Systems,
Vol.E92-D, No.5, pp.1022-1032 (2009-05).
Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, "The Vector Decomposition Problem," IEICE Transactions on Fundamentals, Vol.E93-A, No.1, pp.188-193 (2010-01), 電子情報通信学会第67回論文賞 (2011-05).
Maki Yoshida and Toru Fujiwara, "Expiration Dated Fingerprinting," International Journal of Innovative Computing, Information and Control (IJICIC), Vol.6, No.3, pp.1271-1278 (2010-03).
Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, and Toru Fujiwara, "Development of a Verification Tool for Composable Security," Computational and Symbolic Proofs of Security, 2009.
Maki Yoshida and Toru Fujiwara, "Watermarking Cryptographic Data," the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), A02-02, 2009.
Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, and Toru Fujiwara,
"Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking,"
the 8th International Workshop on Digital Watermarking (IWDW 2009), LNCS Vol.5703, pp.279-293, 2009.
Yasunori Ishihara, Takuji Morimoto, Shougo Shimizu,
Kenji Hashimoto and Toru Fujiwara,
"A Tractable Subclass of DTDs for XPath Satisfiability
with Sibling Axes,"
Proceedings of the 12th International Symposium on Database
Programming Languages,
Lecture Notes in Computer Science 5708,
pp.68-83 (2009-08).
Akinari Yamaguchi, Shougo Shimizu, Yasunori Ishihara and Toru Fujiwara,
"Bag-based Data Models for Incomplete Information and
Their Closure Properties,"
Journal of Intelligent Information Systems,
Vol.30, No.2, pp.115-135 (2008-04).
Maki Yoshida and Toru Fujiwara,
"Flexible Timed-release Encryption,"
IEICE Transactions on Fundamentals,
Vol.E92-A, No.1, pp.222-225 (2009-01).
International Conferences
Kenji Hashimoto, Fumikazu Takasuka,
Kimihide Sakano, Yasunori Ishihara and Toru Fujiwara,
"Verification of the Security against Inference Attacks
on XML Databases,"
Proceedings of the 10th Asia Pacific Web Conference,
Lecture Notes in Computer Science, Springer-Verlag, Vol.4976, pp.359-370 (2008-04).
Kenji Yasunaga and Toru Fujiwara,
"Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Block Codes,"
Proceedings of the 2008 IEEE International Symposium on Information Theory (ISIT2007),
Toronto, Canada, CD-ROM (2008-07).
Maki Yoshida and Toru Fujiwara, "Expiration-dated Fingerprinting," Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), pp.147-150 (2008-08).
Mohamed Layouni, Maki Yoshida, and Shingo Okamura,
"Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval,"
Proceedings of the 10th International Conference on Information and Communications Security (ICICS2008), LNCS 5308, pp.387-402 (2008-10).
Kazuhiro Haramura, Maki Yoshida, and Toru Fujiwara,
"Anonymous Fingerprinting for Predelivery of Contents,"
Proceedings of the 11th International Conference on Information Security and Cryptography (ICISC2008), LNCS, to appear (2008-10).
Hiroyuki Kato, Soichiro Hidaka, Zhenjiang Hu,
Yasunori Ishihara, and Keisuke Nakano,
"Rewriting XQuery to Avoid Redundant Expressions
based on Static Emulation of XML Store,"
Programming Language Techniques for XML,
An ACM SIGPLAN Workshop co-located with POPL 2009,
http://db.ucsd.edu/planx2009/camera-ready/unpaginated/16.pdf
(2009-01).
Yasunori Ishihara, Toshiyuki Morita, Hiroyuki Seki and Minoru Ito,
"An Equational Logic Based Approach to the Security Problem against
Inference Attacks on Object-Oriented Databases,"
Journal of Computer and System Sciences,
Vol.73, No.5, pp.788-817 (2007-08).
International Conferences
Maki Yoshida and Toru Fujiwara,
"Secure Construction for Nonlinear Function Threshold Ramp Secret Sharing,"
Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT2007),
Nice, France, CD-ROM (2007-07).
Maki Yoshida, Itaru Kitamura, and Toru Fujiwara,
"A New Scheme for Optimum Decoding of Additive Watermarks Embedded in Spatial Domain,"
Proceedings of the Third International Conference on Intelligent Information Hiding
and Multimedia Signal Processing (IIH-MSP 2007), to appear (2007-11).
Kenji Yasunaga and Toru Fujiwara,
"Correctable errors of weight half the minimum distance plus one for the first-order Reed-Muller codes,"
Proceedings of The 17th Symposium on Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-17),
Lecture Notes in Computer Science, Springer-Verlag, Vol.4581, pp.110-119 (2007-12).
Maki Yoshida and Toru Fujiwara,
"Global Timed-release Encryption,"
Proceedings of the 26th IEEE International Conference on Consumer Electronics (ICCE 2008), CD-ROM (2008-01).
Kenji Yasunaga and Toru Fujiwara,
"Determination of the Local Weight Distribution of Binary Linear Block Codes,"
IEEE Transactions on Information Theory, Vol.52, No.10, pp.4444-4454 (2006-10).
Takaaki Fujita, Maki Yoshida, and Toru Fujiwara,
"A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain,"
IEICE Transactions on Fundamentals,
Vol.E90-A, No.1, pp.216-225 (2007-01).
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, and Toru Fujiwara,
"A Private and Consistent Data Retrieval Scheme with Log-Squared Communication,"
IEICE Transactions on Fundamentals,
Vol.E90-A, No.1, pp.204-215 (2007-01).
Kenji Yasunaga, Toru Fujiwara, and Tadao Kasami,
"Local Weight Distribution of the (256, 93) Third-Order Binary Reed-Muller Code,"
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.3, pp.698-701 (2007-03).
International Conferences
Maki Yoshida and Toru Fujiwara,
"On the Security of Tag-KEM for Signcryption,"
2nd Workshop on Cryptography for Ad hoc Networks (WCAN'06), Electronic Notes in Theoretical Computer Science (2006-07).
Junya Asano, Shingo Okamura, Maki Yoshida, and Toru Fujiwara,
"Towards Secure C2C Contents Distribution Services,"
The 1st Joint Workshop on Information Security (JWIS 2006) (2006-09).
Hitoshi Tokushige, Marc Fossorier, Toru Fujiwara, and Tadao Kasami,
"An Improvement to an Iterative Bounded-distance and Encoding-based Decoding Algorithm for Binary Linear Block Codes,"
2006 International Symposium on
Information Theory and Its Applications, pp.254-259 (2006-10).
Jun Asatani, Takuya Koumoto, Toru Fujiwara, and Tadao Kasami,
"Method for Generating a Competing Codeword Using a Chain of Minimum Distance Searches,"
2006 International Symposium on
Information Theory and Its Applications, pp.260-264 (2006-10).
Maki Yoshida, Takaaki Fujita, and Toru Fujiwara,
"A New Optimum Detection Scheme for Additive Watermarks Embedded in Spatial Domain,"
IEEE 2006 International Conference on Intelligent Information Hiding
and Multimedia Signal Processing
(IIH-MSP 2006), pp.101-104 (2006-12).
Yasunori Ishihara, Shuichiro Ako and Toru Fujiwara,
"Security against Inference Attacks on
Negative Information in Object-Oriented Databases,"
IEICE Transactions on Information and Systems,
Vol.E88-D, No.12, pp.2767-2776 (2005-12).
International Conferences
Kenji Hashimoto, Yasunori Ishihara, and Toru Fujiwara, "Schema Update
Operations Preserving the Expressive Power in XML Databases,"
Proceedings of the International Special Workshop on Databases For Next
Generation Researchers In Memoriam Prof. Yahiko Kambayashi (SWOD2005),
pp.38-41 (2005-4).
Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "Coin-based
Anonymous Fingerprinting Scheme with Automatic Identification of
Redistributors," Peer-reviewed Proceedings of the ISSA 2005 New
Knowledge Today Conference, CD-ROM (2005-06).
Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, and Toru Fujiwara,
"An Efficient Private and Consistent Data Retrieval Protocol,"
Conference Records of Western European Workshop on Research in Cryptology (WEWoRC2005), pp.83-84 (2005-7).
Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, and Toru Fujiwara,
"A Watermark Detection Scheme Ensuring the False Positive Error Probability,"
Conference Records of Western European Workshop on Research in Cryptology (WEWoRC2005), pp.18-19 (2005-7).
Kenji Yasunaga and Toru Fujiwara,
"Relations between the Local Weight Distributions of a Linear Block
Code, Its Extended Code, and Its Even Weight Subcode",
in Proc. 2005 IEEE Int. Symp. on Information Theory (ISIT2005),
Adelaide, Australia, CD-ROM (2005-09).
Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara,
"A Timed-Release Key Management Scheme for Backward Recovery,"
Proceedings of the 8th Annual International Conference on Information Security and Cryptology (ICISC2005), Lecture Notes in Computer Science 3935, pp.1-15 (2005-12).
Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida and Toru Fujiwara,
"Unlinkable Delivery System for Interactive Dramas," IEICE
Transactions on Fundamentals of Electronics, Communications and
Computer Sciences, Vol.E88-A, No.1, pp.262-269 (2005-01).
Yasunori Ishihara, Shin Ishii, Hiroyuki Seki and Minoru Ito, "Temporal
Reasoning about Two Concurrent Sequences of Events," SIAM Journal on
Computing, Vol.34, No.2, pp.498-513 (2005-02).
International Conferences
Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida and Toru Fujiwara, "An
Interactive Drama Delivery System Suitable for Mobile Phone
(Preliminary Version)," Proceedings of the 5th International workshop
on Information Security Applications (WISA2004), pp.391-398 (2004-8).
Kunihiro Okamoto, Takayuki Ueno, Maki Yoshida, and Toru Fujiwara, "A
Method to Ensure Reliability of a Detection Result for Correlation
Based Watermarking Detection Schemes," 2004 International Symposium on
Information Theory and Its Applications, pp.299-304 (2004-10).
Akira Fujiwara, Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "A
Digital Contents Consignment System Protecting Marketing Information,"
2004 International Symposium on Information Theory and Its
Applications, pp.468-473 (2004-10).
Shingo Okamura, Maki Yoshida, and Toru Fujiwara, "Unlinkable Delivery
System for Interactive Dramas Including Conditional Choices," 2004
International Symposium on Information Theory and Its Applications,
pp.474-479 (2004-10).
Kenji Yasunaga and Toru Fujiwara, "An Algorithm for Computing the
Local Weight Distribution of Binary Linear Codes Closed under a Group
of Permutations," 2004 International Symposium on Information Theory
and Its Applications, pp.846-851 (2004-10).
Jun Asatani, Hitoshi Tokushige, Kenichi Tomita, Toru Fujiwara and Tadao
Kasami, "Iterative Decoding of Product Codes Using Minimum Distance
Search Based Soft-Input Soft-Output Decoding Algorithm,," 2004
International Symposium on Information Theory and Its Applications,
pp.980-985 (2004-10).
Yuta Yoneda, Hitoshi Tokushige, Toru Fujiwara, and Tadao Kasami, "Good
Binary Image Search for Linear Block Codes over an Extended Field of
GF(2), " 2004 International Symposium on Information Theory and Its
Applications, pp.1309-1314 (2004-10).
Yasunori Ishihara, Yumi Shimakawa, and Toru Fujiwara, "Type
Inferability and Decidability of the Security Problem against Inference
Attacks on Object-Oriented Databases," Proceedings of the 6th
International Conference on Information and Communications Security,
Lecture Notes in Computer Science 3269, pp.145-157 (2004-10).
Yasunori Ishihara, Kengo Mori and Toru Fujiwara, "Sufficient
Conditions for Update Operations on Object-Oriented Databases to
Preserve the Security against Inference Attacks," IEICE Transactions
on Information and Systems, Vol.E86-D, No.10, pp.2187-2197 (2003-10).
Yoshihiro Murata, Yasunori Ishihara and Minoru Ito, "An Approximation
Algorithm for the Task-Coalition Assignment Problem," IEICE
Transactions on Information and Systems, Vol.E85-D, No.4, pp.685-693
(2002-04).
Yuansheng Tang, Toru Fujiwara and Tadao Kasami, "Asymptotic Optimality
of the GMD and Chase Decoding Algorithms," IEEE Transactions on
Information Theory, Vol.48, No.8, pp.2401-2405 (2002-08).
International Conferences
Shingo Okamura, Maki Yoshida and Toru Fujiwara, "A Validatable
Revocation Scheme with Black-Box Traitor Tracing," 2002 International
Symposium on Information Theory and Its Applications, pp.355-358
(2002-10).
Takayuki Ueno, Maki Yoshida and Toru Fujiwara, "A Method of Estimating
the Detection Error Rate in a Certain Digital Watermarking for Audio
Signals," 2002 International Symposium on Information Theory and Its
Applications, pp.359-362 (2002-10).
Yasunori Ishihara, Shuichiro Ako and Toru Fujiwara, "Security against
Inference Attacks on Negative Information in Object-Oriented
Databases," Proceedings of the Fourth International Conference on
Information and Communications Security, Lecture Notes in Computer
Science 2513, pp.49-60 (2002-12).
Shougo Shimizu, Yasunori Ishihara, Junji Yokouchi and Minoru Ito,
"Complexity of the Type-Consistency Problem for Acyclic
Object-Oriented Database Schemas," IEICE Transactions on Information
and Systems, Vol.E84-D, No.5, pp.623-634 (2001-05).
Yasunori Ishihara, Shougo Shimizu, Hiroyuki Seki and Minoru Ito,
"Refinements of Complexity Results on Type Consistency for
Object-Oriented Databases," Journal of Computer and System Sciences,
Vol.62, No.4, pp.537-564 (2001-06).
Maki Yoshida and Toru Fujiwara, "Analysis and Optimization of Coding
Constructions for Blacklisting Problem," IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
Vol.E84-A, No.9, pp2338-2345 (2001-09).
Hitoshi Tokushige, Kentaro Nakamaye, Takuya Koumoto, Yuansheng Tang and
Tadao Kasami, "Selection of Search Centers in Iterative Soft-decision
Decoding Algorithms," IEICE Transactions on Fundamentals of
Electronics, Communications and Computer Sciences, Vol.E84-A, No.10,
pp.2397-2403 (2001-10).
International Conferences
Yuansheng Tang, Tadao Kasami and Toru Fujiwara, "On the Evaluation of
the Testing Conditions of the h-Chase Decoding," Proceedings of the
2000 IEEE International Symposium on Information Theory, p.259
(2001-06).
Yuansheng Tang, Tadao Kasami and Toru Fujiwara, "On the Asymptotic
Error Performance of Symmetrical Decodings for Binary Block Codes over
AWGN Channel," The First International Workshop on Sequence Design and
Applications for CDMA Systems (IWSDA'2001), Chengdu, China, (2001-09).
Maki Yoshida and Toru Fujiwara, "Further Improvement of
Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting
Problem," Proceedings of the 8th IMA International Conference on
Cryptography and Coding, LNCS2260, pp.27-37 (2001-12).
Yasunori Ishihara, Kiichiro Ninomiya, Hiroyuki Seki, Daisuke Takahara,
Yutaka Yamada and Shigesada Omoto, "Verification of a Microcomputer
Program Specification Embedded in a Reactive System," IEICE
Transactions on Information and Systems, Vol.E83-D, No.5, pp.1082-1091
(2000-05).
Toru Nakanishi, Hajime Watanabe and Toru Fujiwara, "An Anonymous
Bidding Protocol without Any Reliable Center," Transactions of
Information Processing Society of Japan, Vol.41, No.8, pp.2161-2169
(2000-08).
Yuansheng Tang, Toru Fujiwara and Tadao Kasami, "The Optimal
Sectionalized Trellises for the Generalized Version of Viterbi
Algorithm of Linear Block Codes and Its Application to Reed-Muller
Codes," IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, Vol.E83-A, No.11, pp.2329-2340
(2000-11).
Yeon-Dae Kwon, Yasunori Ishihara, Shougo Shimizu and Minoru Ito,
"Computational Complexity of Finding Highly Co-occurrent Itemsets in
Market Basket Databases," IEICE Transactions on Fundamentals of
Electronics, Communications and Computer Sciences, Vol.E83-A, No.12,
pp.2723-2735 (2000-12).
Maki Yoshida and Toru Fujiwara, "A Subscriber-Excluding and
Traitor-Tracing Broadcast Distribution System," IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
Vol.E84-A, No.1, pp.247-255 (2001-01).
Masaya Maeda and Toru Fujiwara, "Weight Distributions of the Coset
Leaders of Some Reed-Muller Codes and BCH Codes" IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
Vol.E84-A, No.3, pp.851-859 (2001-03).
International Conferences
Maki Yoshida and Toru Fujiwara, "An Efficient Traitor Tracing Scheme
for Broadcast Encryption," Proceedings of the 2000 IEEE International
Symposium on Information Theory, p.463 (2000-06).
Shougo Shimizu, Yasunori Ishihara, Tomotaka Takarabe and Minoru Ito,
"A Probabilistic Database Model with Representability of Dependency
among Tuples," Proceedings of the 4th World Multiconference on
Systemics, Cybernetics and Informatics, Volume VIII, pp.221-225
(2000-07).
Hitoshi Tokushige, Yuansheng Tang, Takuya Koumoto and Tadao Kasami,
"An Improvement to Chase-like Decoding Algorithm," Proceedings of the
2000 International Symposium on Information Theory and Its
Applications, pp.331-334 (2000-11).
Maki Yoshida, Takahiro Horikawa and Toru Fujiwara, "An Improvement of
Coding Constructions for Blacklisting Problems," Proceedings of the
2000 International Symposium on Information Theory and Its
Applications, pp.493-496 (2000-11).
Kaname Tomiyasu, Masaya Maeda, Hiroshi Yamamoto, Takashi Kodama and
Toru Fujiwara, "On Single IC Chip Implementation of a Recursive
Maximum Likelihood Decoding Algorithm for a (64,40) Reed-Muller
Subcode," 2000 International Symposium on Information Theory and Its
Applications, pp.794-797 (2000-11).
Toru Nakanishi, Toru Fujiwara and Hajime Watanabe, "A Linkable Group
Signature Scheme and Its Application to a Secret Voting," Transactions
of Information Processing Society of Japan, Vol.40, No.7, pp.3085-3096
(1999-07).
Yasuhiro Matsumoto and Toru Fujiwara, "A Method for Obtaining the
Optimum Sectionalization of the RMLD Algorithm for Non-Linear
Rectangular Codes," IEICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, Vol.E82-A, No.10, pp.2052-2060
(1999-10).
Tadao Kasami, Yuansheng Tang, Takuya Koumoto and Toru Fujiwara,
"Sufficient Conditions for Ruling-Out Useless Iterative Steps in a
Class of Iterative Decoding Algorithms," IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
Vol.E82-A, No.10, pp.2061-2072 (1999-10).
International Conferences
M.H. Miki, Daisuke Taki, Gen Fujita, Takao Onoye, Isao Shirakawa, Toru
Fujiwara, and Tadao Kasami, "Recursive Maximum Likelihood Decoder for
High-Speed Satellite Communication," IEEE International Symposium on
Circuits and Systems (1999).
Toru Fujiwara, Masaya Maeda, Tadao Kasami and Hitoshi Tokushige, "On
Implementations of Add-Compare-Select Procedure in a Recursive Maximum
Likelihood Decoding," 5th International Symposium on DSP for
Communication Systems, pp.10-15 (1999-01)
Yuansheng Tang, Tadao Kasami and Toru Fujiwara, An Optimality Testing
Algorithm for a Decoded Codeword of Binary Block Codes and its
Computational Complexity," 13th International Symposium, Applieed
Algebra, Algebraic Algorithms and Error-Correcting Codes, Lecture Notes
in Computer Science, Vol.1719, pp.201-210 (1999-11).
Shu Lin, Tadao Kasami, Toru Fujiwara, and Marc Fossorier, Trellises and
Trellis-based Decoding algorithm for Linear Block Codes, Kluwer
Academic Publishers (1998).
Journals
Tadao Kasami, Hitoshi Tokushige, Toru Fujiwara, Hiroshi Yamamoto and
Shu Lin, "A Recursive Maximum Likelihood Decoding Algorithm for Some
Transitive Invariant Binary Block Codes," IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
Vol.E81-A, No.9, pp.1916-1924 (1998-09).
Robert Morelos-Zaragoza, Toru Fujiwara, Tadao Kasami and Shu Lin,
"Construction of Generalized Concatenated Codes and Their
Trellis-Based Decoding Complexity," IEEE Transactions on Information
Theory, Vol.45, No.2, pp.725-731 (1999-03).
International Conferences
Yoshiyuki Kanamaru, Hiroshi Yamamoto and Toru Fujiwara, "On the
Decoding Error Probability and the Accuracy of the Metric Computation
for Recursive Maximum Likelihood Decoders of a (64,35) Reed-Muller
Subcode," Proceedings of 1998 International Symposium on Information
Theory and its Applications, Volume I, pp.94-97 (1998-10).
Ryujiro Shibuya, Yuichi Kaji, Toru Fujiwara, Tadao Kasami and Shu Lin,
"Recursive Algorithm for Efficient Map Decoding of Binary Linear Block
Codes," Proceedings of 1998 International Symposium on Information
Theory and its Applications, Volume II, pp.639-642 (1998-10).
Maki Yoshida and Toru Fujiwara, "Distributed Generation of RSA-Key for
Three or More Parties," Proceedings of the 1998 First Japan-Singapore
Joint Workshop on Information Security, pp.117-122 (1998-12).
Daisuke Taki, Gen Fujita, Takao Onoye, Isao Shirakawa, Toru Fujiwara,
and Tadao Kasami, "VLSI implementation of a recursive maximum
likelihood decoder for high-speed satellite communication,"
International Technical Conference on Circuits/Systems, Computers and
Communications, 1383-1386 (1998).
Tadao Kasami, Toyoo Takata, Koichi Yamashita, Toru Fujiwara and Shu
Lin, "On Bit Error Probability of a Concatenated Coding Scheme," IEEE
Transactions on Communications, Vol.45, No.5, pp.536-543 (1997-05).
Yoshihisa Desaki, Toru Fujiwara and Tadao Kasami, "The Weight
Distribution of Extended Binary Primitive BCH Codes of Length 128,"
IEEE Transactions on Information Theory, Vol.43, No.4, pp.1364-1371
(1997-07).
Tadao Kasami, Takuya Koumoto, Toru Fujiwara, Hiroshi Yamamoto,
Yoshihisa Desaki and Shu Lin, "Low Weight Subtrellises for Binary
Linear Block Codes and Their Applications," IEICE Transactions on
Fundamentals of Electronics, Communications and Computer Sciences,
Vol.E80-A, No.11, pp.2095-2103 (1997-11).
Toru Fujiwara, Hiroshi Yamamoto, Tadao Kasami and Shu Lin, "A
Trellis-Based Recursive Maximum Likelihood Decoding Algorithm for
Linear Block Codes," IEEE Transactions on Information Theory, Vol.44,
No.2, pp.714-729 (1998-03).
International Conferences
Tadao Kasami, Tsukasa Sugita and Toru Fujiwara, "The Split Weight
(wL,wR) Enumeration of Reed-Muller Codes for wL+wR < 2dmin," 12th
International Symposium, Applieed Algebra, Algebraic Algorithms and
Error-Correcting Codes, Lecture Notes in Computer Science 1255,
pp.197-211 (1997-06).
Toru Fujiwara, Yoshihisa Desaki, Tsukasa Sugita and Tadao Kasami, "The
Weight Distributions of Several Extended Binary Primitive BCH Codes of
Length 256," 1997 IEEE International Symposium on Information Theory,
p.363 (1997-06)
Tadao Kasami, Takuya Koumoto, Toru Fujiwara, Hiroshi Yamamoto and Shu
Lin, "The Structure and Complexity of Subtrellis Diagrams for Low
Weight Codewords of Binary Linear Block Codes," 1997 IEEE
International Symposium on Information Theory, p.364 (1997-06).
Yuich Kaji, Toru Fujiwara, Tadao Kasami and Shu Lin, "A Recursive
Log-MAP Algorithm for Binary Linear Block Codes," IEEE Information
Theory Workshop, pp.75-76 (1997-07).
Toru Fujiwara, Takashi Komura, Takao Onoye, Yuichi Kaji, Tadao Kasami
and Shu Lin, IC Implementation of a Recursive Maximum Likelihood
Decoding Algorithm for Reed-Muller and Related Codes," 4th
International Symposium on Communication Theory and Applications,
pp.2-7 (1997-07).
Toru Nakanishi, Hajime Watanabe and Toru Fujiwara "A Linkable Group
Signature and Its Application to a Fair Secret Voting," 4th
International Symposium on Communication Theory and Applications,
pp.159-164 (1997-07).
Hiroshi Yamamoto, Toru Fujiwara and Takayuki Uchida, "Recursive
Maximum Likelihood Decoding Algorithm for Convolutional Codes and Its
Complexity Thirty-Fifth Annual Allerton Conference on Communication,
Control, and Computing (1997).