Publication List in Cryptography Area (Selected)

(Update: November 1, 2006) Japanese version is here.
Nuttapong Attrapadung, Hideki Imai: ``Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure'', IEICE Transaction on Fundamentalof Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, Vol.E90-A, No.1, pp.187-203, Jan. 2007.
Marc P.C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura: ``An Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication'', Proceeding of 7th International Conference on Cryptology in India: Indocrypt'06 , Kalkata, India , Dec. 2006.
Nuttapong Attrapadung, Jun Furukawa, Takeshi Gomi, Goichiro Hanaoka, Hideki Imai, Rui Zhang: ``Efficient Identity-Based Encryption with Tight Security Reduction'', Lecture Notes in Computer Science (The 5th International Conference on Cryptology and Network Security: CANS 2006) , vol. 4301 , pp. 19-36 , Suzhou, Jiangsu, China , Dec. 2006.
Nuttapong Attrapadung, Jun Furukawa, Hideki Imai: ``Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys'', Lecture Notes in Computer Science (ASIACRYPT 2006) , vol. 4284 , pp. 161-177 , Shanghai, China , Dec. 2006.
Thi Lan Anh PHAN, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``A New Key-Insulated Public Key Encryption Scheme with Auxiliary Helper Key'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Security Tightness Evaluation of Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Nuttapong Attrapadung, Jun Furukawa, Kanta Matsuura, Hideki Imai: ``Searchable Public-Key Broadcast Encryption'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai: ``Asymmetric RFID System Secure against Active Attack'', Proceeding of the 29th Symposium of Information Theory and Its Application: SITA'06 , Hakodate, Hokkaido , Nov. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
Nuttapong Attrapadung, Kazukuni Kobara, Hideki Imai: ``Subset Incremental Chain Based Broadcast Encryption with Shorter Ciphertext'', Proceedings of the 2006 International Symposium on Information Theory and Its Applications: ISITA'06 , Seoul, Korea , Oct. 2006.
Yang Cui, Kazukuni Kobara, Hideki Imai: ``Efficient Multiple Encryption from OW-PCA Primitives'', Proceeding of International Symposium on Information Theory and its Applications: ISITA2006 , Seoul, Korea , Oct. 2006.
Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai: ``Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption'', International Conference on Cryptology in Vietnam 2006:VietCrypt 2006 , Hanoi, Vietnam , Sep. 2006.
Peng Yang, Goichiro Hanaoka, Yang Cui, Rui Zhang, Nuttapong Attrapadung, Kanta Matsuura, Hideki Imai: ``Relations among Notions of Security for Identity Based Encryption Schemes'', IPSJ Journal , vol. 47 , no. 8 , pp. 2417-2429 , Aug. 2006.
Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa: ``Tag-KEM from Set Partial Domain One-Way Permutations'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 360-370 , Melbourne, Australia , Jul. 2006.
Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai: ``Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT'', Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006) , vol. 4058 , pp. 348-359 , Melbourne, Australia , Jul. 2006.
Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang: ``Relations Among Notions of Security for Identity Based Encryption Schemes'', Lecture Notes in Computer Science (Jose R. Correa, Alejandro Hevia, Marcos Kiwi (editors)) (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium) , vol. 3887 , pp. 130-141 , Valdivia, Chile , Mar. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Applying Fujisaki-Okamoto to Identity-Based Encryption'', Lecture Notes in Computer Science (Marc Fossorier, Hideki Imai, Shu Lin, and Alain Poli (editors)) (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16) , vol. 3857 , pp. 183-192 , Las Vegas, NV, USA , Feb. 2006.
Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai: ``Towards Security Enhancement with Efficient Reduction for Identity Based Encryption'', Proceedings of the 28th Symposium on Information Theory and Its Applications: SITA2005 , vol. I , pp. 163-166 , Okinawa , Nov. 2005.
Atsuhiro Yamagishi, Kanta Matsuura, Hideki Imai: ``Cryptographic Module Validation Program in Japan'', Proceedings of the 2005 IEEE International Engineering Management Conference: IEMC 2005 , vol. II , pp. 485-489 , St. John's, Canada , Sep. 2005.
R. Zhang, M. Kudo, K. Matsuura and H. Imai: ``A Model for Signature Revocation'', Proc. of 2002 International Symposium on Information Theory and Its Applications (ISITA 2002), pp.455-458, Xi'an, PRC, Oct. 2002. (Abstract) (PDF file)
R. Zhang, M. Kudoh, K. Matsuura and H. Imai. ``Instance Revocation of Digital Signature and Its Applications'', Proc. of the 2002 Symposium on Cryptography and Information Security (SCIS2002), Vol.II, pp.1143-1148, Jan. 2002. (Abstract) (PDF file)
K. Matsuura, Y. Zheng, and H. Imai. ``Compact and Flexible Resolution of CBT Multicast Key-Distribution''. Proc. of Worldwide Computing and Its Applications '98 (WWCA'98), Lecture Notes in Computer Science 1368, Springer-Verlag, pp. 190-205, Mar. 1998. (Abstract) (gzipped PS file)
K. Matsuura, Y. Zheng, and H. Imai. ``Compact, Secure, and Unforgeable Key Agreement on Internet''. Rump Session of International Conference on Information and Communications Security '97, Beijing, Nov. 1997.
T. Nishioka, K. Matsuura, Y. Zheng, and H. Imai. ``A Proposal for Authenticated Key Recovery System''. Proceedings of JW-ISC'97 (1997 Korea-Japan Joint Workshop on Information Security and Cryptology), Seoul, pp. 189-196, Oct. 1997.

Back


Matsuura Laboratory/
Department of Informatics and Electronics / Institute of Industrial Science, The University of Tokyo/
4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan