Publication List (Selected)
(Update: November 1, 2006)
Japanese version is here.
- Nuttapong Attrapadung, Hideki Imai: ``Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure'', IEICE Transaction on Fundamentalof Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol.E90-A, No.1, pp.187-203, Jan. 2007.
- Marc P.C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura: ``An Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication'', Proceeding of 7th International Conference on Cryptology in India: Indocrypt'06 , Kalkata, India , Dec. 2006.
- Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: ``Efficient Identity-Based Encryption with Tight Security Reduction'', Lecture Notes in Computer Science (The 5th International Conference on Cryptology and Network Security: CANS 2006) , vol. 4301 , pp. 19-36 , Suzhou, Jiangsu, China , Dec. 2006.
- Nuttapong Attrapadung, Jun Furukawa, Hideki Imai: ``Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys'', Lecture Notes in Computer Science (ASIACRYPT 2006) , vol. 4284 , pp. 161-177 , Shanghai, China , Dec. 2006.
- Thi Lan Anh PHAN, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Nuttapong Attrapadung, Jun Furukawa, Kanta Matsuura, Hideki Imai: ``Searchable Public-Key Broadcast Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: ``Asymmetric RFID System Secure against Active Attack'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
- Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: ``Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
- Yang Cui, Kazukuni Kobara, Hideki Imai: ``Efficient Multiple Encryption from OW-PCA Primitives'', Proceeding of International Symposium on Information Theory and its Applications: ISITA2006 , Seoul, Korea , Oct. 2006.
- Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption'', International Conference on Cryptology in Vietnam 2006:VietCrypt 2006 , Hanoi, Vietnam , Sep. 2006.
- Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai: ``Relations among Notions of Security for Identity Based Encryption Schemes'', IPSJ Journal , vol. 47 , no. 8 , pp. 2417-2429 , Aug. 2006.
- Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa: ``Tag-KEM from Set Partial Domain One-Way Permutations'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 360-370 , Melbourne, Australia , Jul. 2006.
- Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 348-359 , Melbourne, Australia , Jul. 2006.
- Wei Liu, Hideyuki Tanaka, Kanta Matsuura: ``An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan'', Workshop on the Economics of Information Security 2006:WEIS2006 , University of Cambridge, Cambridge, UK , Jun. 2006.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Silent Cascade: Enhancing Location Privacy without Communication QoS Degradation'', Lecture Notes in Computer Science (Security in Pervasive Computing: Third International Conference: SPC 2006) , vol. 3934 , pp. 165-180 , York, UK , Apr. 2006.
- Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: ``Relations Among Notions of Security for Identity Based Encryption Schemes'', Lecture Notes in Computer Science (Jose R. Correa, Alejandro Hevia, Marcos Kiwi (editors)) (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium) , vol. 3887 , pp. 130-141 , Valdivia, Chile , Mar. 2006.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Applying Fujisaki-Okamoto to Identity-Based Encryption'', Lecture Notes in Computer Science (Marc Fossorier, Hideki Imai, Shu Lin, and Alain Poli (editors)) (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16) , vol. 3857 , pp. 183-192 , Las Vegas, NV, USA , Feb. 2006.
- Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura: ``Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation'', Lecture Notes in Computer Science (Dengguo Feng, Dongdai Lin, Moti Yung (editors))(Information Security and Cryptology: First SKLOIS Conference: CISC 2005) , vol. 3822 , pp. 395-406 , Beijing, China , Dec. 2005.
- Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Towards Security Enhancement with Efficient Reduction for Identity Based Encryption'', Proceedings of the 28th Symposium on Information Theory and Its Applications: SITA2005 , vol. I , pp. 163-166 , Okinawa , Nov. 2005.
- Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki: ``CARAVAN: Providing Location Privacy for VANET'', Embedded Security in Cars 2005: ESCAR 2005 , Cologne, Germany , Nov. 2005.
- Atsuhiro Yamagishi, Kanta Matsuura, Hideki Imai: ``Cryptographic Module Validation Program in Japan'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. II , pp. 485-489 , St. John's, Canada , Sep. 2005.
- Kanta Matsuura: ``University-Industry Collaboration in the Information Security Field: An International Comparison'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. I , pp. 95-98 , St. John's, Canada , Sep. 2005.
- Kanta Matsuura: ``Activity of Imai and Matsuura Laboratories, and Inter-Sector Collaboration There'', University of Tokyo/Royal Holloway Information Security Workshop , Jul. 2005.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Protecting Location Privacy for Wireless Network'', ARO workshop on Localization in Wireless Sensor Networks , Seattle, USA , Jun. 2005.
- Hideyuki Tanaka, Kanta Matsuura: ``Vulnerability and Effects of Information Security Investment: A Firm Level Empirical Analysis of Japan'', International Forum of Financial Information Systems and Cybersecurity: A Public Policy Perspective , College Park, MD , May. 2005.
- Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki: ``Towards Modeling Wireless Location Privacy'', Lecture Notes in Computer Science (Workshop on Privacy Enhancing Technologies) , Dubrovnik, Croatia , May. 2005.
- Kanta Matsuura: ``Cross-Sector Collaboration in Japanese Information-Security Industry, and the Shock of Personal Information Protection Laws'', Proceedings of the 11th International Conference on Industrial Engineering and Engineering Management , pp. 1178-1181 , Northeastern University, Shenyang, China , Apr. 2005.
- Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki: ``Enhancing Wireless Location Privacy Using Silent Periods'', Proceedings of IEEE Wireless Communications and Networking Conference 2005 , vol. 2 , pp. 1187-1192 , New Orleans , Mar. 2005.
- Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo: ``Vulnerability and Information Security Investment: An Empirical Analysis of E-Local Government in Japan'', The Journal of Accounting and Public Policy , vol. 24 , no. Issue. 1 , pp. 37-59 , Jan. 2005.
- Kanta Matsuura: ``Research Direction for Information Security in Academia'', German-Japanese Information Security Workshop --- Progress in Information Security in Japan and Germany , Ministry of Economy, Trade and Industry (METI), Tokyo, Japan , Oct. 2004.
- Hsing-Hua Huang, Kanta Matsuura: ``Real-Time Video Security for Financial Transactions'', The 2004 Workshop on Information Security Research Supported by MEXT Grant-in-Aid Scientific Research on Priority Area Informatics , Fukuoka, Japan , Oct. 2004.
- Hideyuki Tanaka, Kanta Matsuura: ``An Incentive Mechanism of Information Security Investment: An Empirical Study of e-Local Government in Japan'', The 2004 Workshop on Information Security Research Supported by MEXT Grant-in-Aid Scientific Research on Priority Area Informatics , Fukuoka, Japan , Oct. 2004.
- Kanta Matsuura, Ken Ebato: ``University-Industry Collaboration Networks in the Information Security Field in Japan: Problems and a Particular Success'', Proceedings of the 2004 IEEE International Engineering Management Conference: IEMC-2004 , vol. 2 , pp. 839-844 , Singapore , Oct. 2004.
- Kanta Matsuura, Hideki Imai: ``Inspection Mechanism For Server-and-Client Protocols With Private-Key Cipher'', The ETHICOMP Journal , vol. 1 , no. 3 , Aug. 2004.
- Jose Luis Lacson, Kanta Matsuura: ``The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas'', Lecture Notes in Computer Science , vol. 3183 , pp. 547-548 , Aug. 2004.
- Kanta Matsuura, Jose Luis Lacson, Terdoro Locsin, Jr.: ``Public Acceptance Issues Surrounding the Implementation of New Election Technology for the Philippines'', Twenty-sixth International Congress of Administrative Sciences , Seoul , Jul. 2004.
- Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo: ``Vulnerability and Information Security Investment: An Empirical Analysis of E-Local Government of Japan'', The Forum on Financial Systems and Cybersecurity: A Public Policy Perspective , College Park, MD , May. 2004.
- Kanta Matsuura: ``Robustness of Entrusted Data-Analysis in E-Science Research Collaboration'', Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE04 , pp. 373-378 , Mar. 2004.
- Tsutomu Morigaki, Kanta Matsuura, Osamu Sudo: ``An Analysis of Detailed Electronic Time-Stamping Using Digital TV'', Proceedings of the 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE04 , pp. 277-284 , Mar. 2004.
- Ken Ebato, Kenneth Pechter, Kanta Matsuura: ``University-Industry Research Collaboration in the Information Security Field in Japan'', Proceedings of the 2003 IEEE International Engineering Management Conference: IEMC-2003 , Albany, New York , Nov. 2003.
- Kanta Matsuura: ``Digital Security Tokens and Their Derivatives'', Netnomics , vol. 5 , no. 2 , pp. 161-179 , Nov. 2003.
- K. Matsuura: ``Information Security and Economics in Computer Networks: An Interdisciplinary Survey and a Proposal of Integrated Optimization of Investment'', The 9th International Conference of Computing in Economics and Finance (CEF 2003), Seattle, July 2003. (PDF file)
- M. Ando, K. Matsuura, M. Kudo, and A. Baba: ``An Architecture of a Secure Database for Networked Collaborative Activities'', Proc. of 5th International Conference on Enterprise Information Systems (ICEIS 2003), ICEIS Press, Vol.I, pp.3-10, Angers, France, April 2003. (PDF file)
- R. Zhang, M. Kudo, K. Matsuura and H. Imai: ``A Model for Signature Revocation'', Proc. of 2002 International Symposium on Information Theory and Its Applications (ISITA 2002), pp.455-458, Xi'an, PRC, Oct. 2002. (PDF file)
- K. Matsuura. ``Virtual Private Laboratories: Concept and Two Building Blocks'', Proceedings of the 2002 IEEE International Engineering Management Conference (IEMC 2002), vol.II, pp.876-881, August 2002. (PDF file)
- K. Matsuura. ``Digital Security Tokens in Network Commerce: Modeling and Derivative Application'', 8th International Conference of the Society for Computational Economics --- Computing in Economics and Finance (CEF 2002), Aix-en-Provence, France, June 2002. (PDF file)
- K. Matsuura and H. Imai. ``Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal'', Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002), Volume 2, ICEIS Press, pp.962-967, April, 2002. (PDF file)
- R. Zhang, M. Kudoh, K. Matsuura and H. Imai. ``Instance Revocation of Digital Signature and Its Applications'', Proc. of the 2002 Symposium on Cryptography and Information Security (SCIS2002), Vol.II, pp.1143-1148, Jan. 2002. (PDF file)
- K. Matsuura. ``A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce''. Proc. of Third International Conference on Information and Communications Security (ICICS'01), Lecture Notes in Computer Science 2229, Springer-Verlag, pp. 90-94, Nov. 2001. (PDF file)
- K. Matsuura. ``Effects of Data Hiding on Remote Data Analysis''. IPSJ Journal, Vol.42, No.10, pp.2526-2532, Oct. 2001.
- K. Matsuura. ``Echo Back in Implementation of Passphrase Authentication''. Proc. of the 2001 International Workshop on Cryptology and Network Security, pp.238-245, September 2001. (PDF file)
- K. Matsuura. ``Security Token and Its Derivative in Discrete-Time Models''. Proc. of 5th World Multiconference on Systemics, Cybernetics and Informatics, Orlando, FL, July 2001. (PDF file)
- K. Matsuura. ``Digital Security Tokens and Their Derivatives''. 7th International Conference of the Society for Computational Economics (SCE'01), New Haven, CT. June 2001.
- S. Hirose and K. Matsuura. ``Key Agreement Protocols Resistant to a Denial-of-Service Attack''. IEICE Transactions on Information and Systems, Vol.E84-D, No.4, pp.477-484, April 2001.
- K. Matsuura. ``Security Tokens and Their Derivatives''. Technical Reports 29, Centre for Communications Systems Research, University of Cambridge, Feb. 2001. (PDF file)
- K. Matsuura and H. Imai. ``Modified Aggressive Modes of Internet Key Exchange Resistant against Denial-of-Service Attacks''. IEICE Transactions on Information and Systems, Vol.E83-D, No.5, pp.972-979, May 2000.
- K. Matsuura and H. Imai. ``Generation, Verification, and Renewal of Digital Time-Stamps''. Imai Laboratory Research Monograph Series, No.2000-1, pp.44-53, March 2000.
- K. Matsuura and H. Imai. ``Modification of Internet Key Exchange Resistant against Denial-of-Service''. Pre-Proc. of Internet Workshop 2000 (IWS2000), pp.167-174, Feb. 2000. (gzipped PS file)
- K. Matsuura. ``Evaluation of DoS Resistance in Relation to Performance Dynamics''. The 2000 Symposium on Cryptography and Information Security (SCIS2000), Okinawa, Japan. Jan. 2000. (gzipped PS file)
- S. Hirose and K. Matsuura. ``Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack''. In V. Varadharajan and Y. Mu (eds.), Lecture Notes in Computer Science 1726, Springer-Verlag, Berlin, pp.169-182, November 1999.
- K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Cientifica, Vol.2, No.11, pp.15-19, 1999. (gzipped PS file)
- K. Matsuura. ``Effects of Data Hiding on Remote Data Analysis''. Proceedings of Computer Security Symposium'99 (CSS'99), pp.81-86, Oct. 1999. (gzipped PS file)
- K. Matsuura and H. Imai. ``Toward Research-Promotion Infrastructure for Multi-Modal Imaging''. In T. Yoshimoto et. al. (eds.) Recent Advances in Biomagnetism, pp.911-914, Tohoku University Press, Sendai, 1999. (gzipped PS file)
- K. Matsuura and H. Imai. ``Activity Report of IIS E-Commerce and Digital-Cash Committee''. The 5th International Conference on Ethical Issues of Information Technology, Rome, Oct. 1999.
- K. Matsuura and H. Imai. ``Resolution of ISAKMP/Oakley Key-Agreement Protocol Resistant against Denial-of-Service Attack''. Proc. of Internet Workshop'99 (IWS'99), IEEE Press, pp.17-24, 1999. (gzipped PS file)
- K. Matsuura. ``Protection of Three-Pass Key-Agreement Protocols against a Denial-of-Service Attack''. Bell Labs Crypto/Security Seminar, NJ, March 1999.
- S. Hirose and K. Matsuura. ``Enhancing the resistance of a secure key agreement protocol to a denial-of-service attack''. Proc. of the 1999 Symposium on Cryptography and Information Security (SCIS'99), Vol. II, pp. 899-904, Jan. 1999.
- K. Matsuura and H. Imai. ``Protection of Authenticated Key-Agreement Protocol against a Denial-of-Service Attack''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 466-470, Oct. 1998. (gzipped PS file)
- G. Hanaoka, T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``On Advanced KPS: An Optimized KPS against Collusion Attacks''. Proceedings of 1998 International Symposium on Information Theory and Its Applications (ISITA'98), pp. 247-250, Oct. 1998.
- K. Matsuura and H. Imai. ``Toward Research-Promotion Infrastructure for Multi-Modal Imaging''. 11th International Conference on Biomagnetism (BIOMAG98), Sendai, Aug. 1998.
- K. Matsuura, Y. Zheng, and H. Imai. ``Compact and Flexible Resolution of CBT Multicast Key-Distribution''. Proc. of Worldwide Computing and Its Applications '98 (WWCA'98), Lecture Notes in Computer Science 1368, Springer-Verlag, pp. 190-205, Mar. 1998. (gzipped PS file)
- K. Matsuura and H. Imai. ``Inspection Mechanism for Server-and-Client Protocols with Private-Key Cipher''. The 4th International Conference on Ethical Issues of Information Technology, Rotterdam, Mar. 1998. (PDF file)
- K. Matsuura, Y. Zheng, and H. Imai. ``Compact, Secure, and Unforgeable Key Agreement on Internet''. Rump Session of International Conference on Information and Communications Security '97, Beijing, Nov. 1997.
- T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``A Proposal for Authenticated Key Recovery System''. Proceedings of JW-ISC'97 (1997 Korea-Japan Joint Workshop on Information Security and Cryptology), Seoul, pp. 189-196, Oct. 1997.
- K. Matsuura and Y. Okabe. ``A Robust Reconstruction of Sparse Biomagnetic Sources''. IEEE Trans. Biomed. Eng., Vol. 44, No. 8, pp. 720-726, 1997.
- K. Matsuura, N. Shimizu, and Y. Okabe. ``Reconstruction of Sparse Dipole Source by a Modified SMN Method''. In: I. Hashimoto, Y. C. Okada, and S. Ogawa, editors, Visualization of Information Processing in the Human Brain: Recent Advances in MEG and Functional MRI (EEG Suppl. 47), pp. 421-429. Elsevier, Amsterdam, 1996.
- K. Matsuura and Y. Okabe. ``L_p-Normalized Minimum-L1-Norm Solution of the Biomagnetic Inverse Problem''. In: 18th Annual Int. Conf. of the IEEE Engineering in Medicine and Biology Society, Paper Number 115, Amsterdam, 1996.
- K. Matsuura and Y. Okabe. ``Multiple Current-Dipole Distribution Reconstructed by Modified Selective Minimum-Norm Method''. In: 10th Int. Conf. on Biomagnetism, Santa Fe, 1996.
- K. Matsuura and Y. Okabe. ``Multi-Dipole Estimation by Selective-Minimum-Norm Method''. In: C. Baumgartner, L. Deecke, G. Stroink, and S. J. Williamson, editors, Biomagnetism: Fundamental Research and Clinical Applications, pp. 381-384. Elsevier, Amsterdam, 1995.
- K. Matsuura, N. Shimizu, and Y. Okabe. ``Reconstruction of Sparse Dipole Source by Modified SMN Method''. In: 10th Tokyo Institute of Psychiatry Int. Symposium, 1995.
- K. Matsuura and Y. Okabe. ``A Parametric Simplex Algorithm for Multi-Dipole Estimation''. Human Brain Mapping, Suppl. 1, p. 104, 1995.
- K. Matsuura and Y. Okabe. ``Selective Minimum-Norm Solution of the Biomagnetic Inverse Problem''. IEEE Trans. Biomed. Eng., Vol. 42, No. 6, pp. 608-615, 1995.
- K. Matsuura and Y. Okabe. ``Multi-Dipole Estimation by Selective-Minimum-Norm Method''. 9th Int. Conf. on Biomagnetism, Vienna, 1993.
- Others
- K. Matsuura and H. Imai. ``A revised signature mode for the Internet Key Exchange''. Internet Draft, Matsuura_sign_mode_02.txt (current version), Sep. 1999.
- K. Matsuura and H. Imai. ``A revised signature mode for the Internet Key Exchange''. Internet Draft, Matsuura_sign_mode_01.txt (previous version), Mar. 1999.
Back
Matsuura Laboratory/
Department of Informatics and Electronics / Institute of Industrial Science, The University of Tokyo/
4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan