List of Publications

Update: Jan, 2024

Year 2023

Journal (incl. LNCS)

  • Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura. On Private Information Retrieval Supporting Range Queries, International Journal of Information Security (2023), pp.1-19, 2023 [detail]
  • Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanakoka, Kanta Matsuura, Tsutomu Matsumoto. Signature for Objects: Formalizing How to Authenticate Physical Data and More, Lecture Notes in Computer Science (The 27th International Conference on Financial Cryptography and Data Security: FC2023), Vol.13950, pp.182-199, 2023 [detail]

Conference

  • Taichi Igarashi, Hiroya Kato, Iwao Sasase, Kanta Matsuura. A Realtime IoT Malware Classification System Based on Pending Samples, 2023 IEEE International Conference on Communications (ICC): Communication and Information System Security Symposium (ICC2023), pp.4380-4385, 2023 [detail]
  • Taichi Igarashi, Kanta Matsuura. A Refined Classification of Malicious Smart Contract, Lecture Notes in Computer Science (The 27th International Conference on Financial Cryptography and Data Security: FC2023, Posters presentation), 2023 [detail]

Year 2022

Journal (incl. LNCS)

  • Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto. Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures, IEICE Transactons on Information and Systems, Vol.E105-D, No.11, pp.1845-1856, 2022 [detail]
  • Ryu Ishii, Kyosuke Yamashita, Zihao Song, Yusuke Sakai, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, and Tsutomu Matsumoto. Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality, Lecture Notes in Computer Science (Attacks and Defenses for the Internet-of-Things 5th International Workshop, ADIoT 2022), Vol.13745, pp.51-71, 2022 [detail]
  • Takeshi Miyamae, Kanta Matsuura. Coin Transfer Unlinkability Under the Counterparty Adversary Model, Ledger, Vol.7, pp.17-34, 2022 [detail]
  • Kittiphop Phalakarn, Nuttapong Attrapadung, Kanta Matsuura. Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA, Lecture Notes in Computer Science (Applied Cryptography and Network Security - ACNS 2022 - 20th International Conference on Applied Cryptography and Network Security), Vol.13269, No., pp.605-625, 2022 [detail]

Conference

  • Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Kanta Matsuura. Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks, Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2022), pp.380-394, 2022 [detail]

Year 2021

Journal (incl. LNCS)

  • Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura. Evolving Homomorphic Secret Sharing for Hierarchical Access Structures, Lecture Notes in Computer Science (Advances in Information and Computer Security - IWSEC 2021 - 16th International Workshop on Security), Vol.12835, pp.77-96, 2021 [detail]
  • Ryu Ishii, Kyosuke Yamashita, Yusuke Sakai, Takahiro Matsuda, Tadanori Teruya, Goichiro Hanaoka, Kanta Matsuura, and Tsutomu Matsumoto. Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures, Lecture Notes in Computer Science (2nd ACNS Workshop on Secure Cryptographic Implementation: 2nd ACNS SCI Workshop), Vol.12809, pp.378-396, 2021 [detail]
  • Toshinori Usui, Yuto Otsuki, Tomonori Ikuse, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. Automatic Reverse Engineering of Script Engine Binaries for Building Script API Tracers, Digital Threats: Research and Practice, Vol.2, No.1, pp.1-31, 2021 [detail]
  • Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura. Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E104-A, No.1, pp.89-103, 2021 [detail]

Conference

  • Hajime Kuno, Kanta Matsuura. Towards Automation of Penetration Testing for Web Applications by Deep Reinforcement Learning, Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC '21), 2021 [detail]
  • Daisuke Sumita, Kanta Matsuura. Identifying Crypto API Usages in Android Apps using a Static Analysis Framework, First DFRWS APAC Conference (poster presentation), 2021 [detail]

Year 2020

Journal (incl. LNCS)

  • Kittiphop Phalakarn, Vorapong Suppakitpaisarn, Nuttapong Attrapadung, Kanta Matsuura. Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials, Lecture Notes in Computer Science (Progress in Cryptology - INDOCRYPT 2020 - 21st International Conference on Cryptology in India), Vol.12578, pp.763-785, 2020 [detail]
  • Junichiro Hayata, Jacob C. N. Schuldt, Goichiro Hanaoka, Kanta Matsuura. On Private Information Retrieval Supporting Range Queries, Lecture Notes in Computer Science (Computer Security - ESORICS 2020 - 25th European Symposium on Research in Computer Security, Proceedings, Part II), Vol.12309, pp.674-694, 2020 [detail]
  • Toshinori Usui, Tomonori Ikuse, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. ROPminer: Learning-based Static Detection of ROP Chain Considering Linkability of ROP Gadgets, IEICE Transactions on Information and Systems, Vol.E103-D, No.7, pp.1-17, 2020 [detail]
  • Yuya Senzaki, Satsuya Ohata, Kanta Matsuura. Simple Black-box Adversarial Examples Generation with Very Few Queries, IEICE Transactions on Information and Systems, Vol.E103-D, No.2, pp.212-221, 2020 [detail]
  • Takahiro Nagamine, Kanta Matsuura. A New Protocol for Fair Addition of a Transaction Fee When Closing a Payment Channel Uncooperatively, 24th International Conference on Financial Cryptography and Data Security (FC'20), Poster presentation, 2020 [detail]
  • Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura. Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E103-A, No.1, pp.107-113, 2020 [detail]

Year 2019

Journal (incl. LNCS)

  • Kanta Matsuura. Security Evaluation Methods in Trust Infrastructure Based on Engineering and Economics, Impact, Vol.2019, No.10, pp.24-26, 2019 [detail]
  • Junichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura. Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 14th International Workshop on Security: IWSEC2019), Vol.11689, pp.253-272, 2019 [detail]
  • Kanta Matsuura. Token Model and Interpretation Function for Blockchain-Based FinTech Applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E102-A, No.1, pp.3-10, 2019 [detail]
  • Kensuke Tamura, Kanta Matsuura. Improvement of Anomaly Detection Performance using Packet Flow Regularity in Industrial Control Networks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E102-A, No.1, pp.65-73, 2019 [detail]

Conference

  • Toshinori Usui, Yuto Otsuki, Yuhei Kawakoya, Makoto Iwamura, Jun Miyoshi, Kanta Matsuura. My Script Engines Know What You Did In The Dark: Converting Engines into Script API Tracers, Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC '19), pp.466-477, 2019 [detail]
  • Kanta Matsuura. Proof-of-Verification for Proof-of-Work: Miners Must Verify the Signatures on Bitcoin Transactions, Scaling Bitcoin Workshop 2019, 2019 [detail]

Year 2018

Journal (incl. LNCS)

  • Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. More Constructions of Re-Splittable Threshold Public Key Encryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E101-A, No.9, pp.1473-1483, 2018 [detail]
  • Masahito Ishizaka, Kanta Matsuura. Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption, Lecture Notes in Computer Science (The 17th International Conference on Cryptology and Network Security: CANS2018), Vol.11124, pp.417-439, 2018 [detail]
  • Masahito Ishizaka, Kanta Matsuura. Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions, Lecture Notes in Computer Science (The 21st Information Security Conference), Vol.11060, pp.422-441, 2018 [detail]

Conference

  • Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura. Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption, Proceeding of the 2018 International Symposium on Information Theory and its Applications (ISITA2018), pp.739-743, 2018 [detail]
  • Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura. Provably Secure Password Reset Protocol: Model, Definition, and Construction, The 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18), pp.774-782, 2018 [detail]

Year 2016

Journal (incl. LNCS)

  • Masahito Ishizaka, Satsuya Ohata, Kanta Matsuura. Generic Construction of Ciphertext-Policy Attribute-Based Signcryption Secure in the Adaptive Predicate Model, IPSI Transactions on Advanced Research, Special issue - "Advances in Cryptology and Information Security", Vol.12, No.2, pp.16-26, 2016 [detail]
  • Miodrag J. Mihaljevic, Aleksandar Kavcic, Kanta Matsuura. An Encryption Technique for Provably Secure Transmission from a High Performance Computing Entity to a Tiny One, Mathematical Problems in Engineering, Vol.2016, pp.10 pages, 2016 [detail]
  • Shiori Shinoda, Kanta Matsuura. Empriical Investigation of Threats to Loyalty Programs by Using Models Inspired by the Gordon-Loeb Formulation of Security Investment, Journal of Information Security (JIS), Vol.7, No.2, pp.29-48, 2016 [detail]

Conference

  • Andreas Gutmann, Karen Renaud, Joseph Maguire, Peter Mayer, Melanie Volkamer, Kanta Matsuura, Joern Mueller-Quade. ZeTA --- Zero-Trust Authentication: Relying on Innate Human Ability, not Technology, Proceedings of the 1st IEEE European Symposium on Security and Privacy, pp.357-371, 2016 [detail]

Year 2015

Journal (incl. LNCS)

  • Satsuya Ohata, Yutaka Kawai, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption, Lecture Notes in Computer Science (Topics in Cryptology: CT-RSA2015), Vol.9048, pp.410-428, 2015 [detail]
  • Kanta Matsuura, Takurou Hosoi. Mechanism Design of Data Sharing for Cybersecurity Research, IPSI Transactions on Advanced Research, Vol.11, No.1, pp.35-40, 2015 [detail]

Conference

  • Aleksandar Kavcic, Miodrag Mihaljevic, Kanta Matsuura. Light-Weight Secrecy System Using Channels with Insertion Errors: Cryptographic Implications, Proceedings of the 2015 IEEE Information Theory Workshop -- Fall (ITW2015), pp.257-261, 2015 [detail]
  • Satsuya Ohata, Takahiro Matsuda, Kanta Matsuura. On Rigorous Security of Password Recovery Protocols, The Tenth International Workshop on Security (IWSEC2015), Poster Session, 2015 [detail]

Year 2014

Journal (incl. LNCS)

  • David S. L. Wei, Siani Pearson, Kanta Matsuura, Patrick P. C. Lee, Kshirasagar Naik. Guest Editorial: Cloud Security, IEEE Transactions on Cloud Computing, Vol.2, No.4, pp.377-379, 2014
  • Satsuya Ohata, Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. More Constructions of Re-splittable Threshold Public Key Encryption, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 9th International Workshop on Security: IWSEC2014), Vol.8639, pp.109-118, 2014 [detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification, IEICE Transactions on Information and Systems, Vol.E97-D, No.3, pp.510-523, 2014 [detail]
  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. Toward Optimal Fusion Algorithms with Security against Wolves and Lambs in Biometrics, IEEE Transactions on Information Forensics and Security (IEEE TIFS), Vol.9, No.2, pp.259-271, 2014 [detail]

Conference

  • Bongkot Jenjarrussakul, Kanta Matsuura. Analysis of Japanese Loyalty Programs Considering Liquidity, Security Efforts, and Actual Security Levels, 13th Workshop on the Economics of Information Security (WEIS2014), on web, 2014 [detail]

Year 2013

Journal (incl. LNCS)

  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Construction of Even- variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, SCIENCE CHINA Information Sciences, Vol.56, No.3, pp.1-9, 2013 [detail]

Conference

  • Kanta Matsuura, Takurou Hosoi. Data Sharing for Cybersecurity Research and Information Sharing for Cybersecurity Practice, The 8th International Workshop on Security (IWSEC2013), 2013 [detail]
  • Takurou Hosoi, Kanta Matsuura. Effectiveness of a Change in TCP Retransmission Timer Management for Low-rate DoS Attack Mitigation and Attack Variants, The 8th International Workshop on Security (IWSEC2013), 2013 [detail]
  • Naveen Kumar, Anish Matsuria, Maniklal Das, Kanta Matsuura. Improving Security and Efficiency of Time-Bound Access to Outsourced Data, The 6th ACM India Computing Convention (Compute2013), 2013
  • Kanta Matsuura, Takurou Hosoi. Data Sharing for Cybersecurity Research: A Comparison with Information Sharing for Cybersecurity Practice, Ninth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2013

Year 2012

Journal (incl. LNCS)

  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura. Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2012, 15th International Conference on Practice and Theory in Public Key Cryptography: PKC 2012), Vol.7293, pp.576-594, 2012 [detail]
  • Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of highly nonlinear resilient S-boxes with given degree, Designs, Codes and Cryptography, Vol.64, No.3, pp.241-253, 2012 [detail]

Conference

  • Takao Murakami, Kenta Takahashi, Kanta Matsuura. Towards Optimal Countermeasures against Wolves and Lambs in Biometrics, Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, Applications and Systems (BTAS 2012), 2012 [detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks, 11th Workshop on the Economics of Information Security (WEIS2012), on web, 2012 [detail]
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Impact on Information Security from the Great East Japan Earthquake on March 11, 2011, Eighth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2012 [detail]

Year 2011

Journal (incl. LNCS)

  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Blanced 2p-variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, Applied mathematical Letters, Vol.24, No.12, pp.2093-2096, 2011 [detail]
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu.. Construction of Odd- variable Resilient Boolean Functions with Optimal Degree, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.VE94-A, pp.265-267, 2011 [detail]
  • Daiki Chiba, Takahiro Matsuda, Jacob C.N. Schuldt, Kanta Matsuura. Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting, Lecture Notes in Computer Science (9th International Conference on Applied Cryptography and Network Security: ACNS 2011), Vol.6715, pp.220-237, 2011
  • Jacob C.N. Schuldt, Kanta Matsuura. On-line Non-transferable Signatures Revisited, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2011, 14th International Conference on Practice and Theory in Public Key Cryptography: PKC 2011), Vol.6571, pp.369-386, 2011 [detail]
  • Takahiro Matsuda, Kanta Matsuura. On Black-Box Separations among Injective One-Way Functions, Lecture Notes in Computer Science (Theory of Cryptography, 8th Theory of Cryptography Conference: TCC 2011), Vol.6597, pp.597-614, 2011
  • Takahiro Matsuda, Kanta Matsuura. Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks, Lecture Notes in Computer Science (Public Key Cryptography - PKC 2011, 14th International Conference on Practice and Theory in Public Key Cryptography: PKC 2011), Vol.6571, pp.246-264, 2011 [detail]
  • Jacob Schuldt, Kanta Matsuura. Efficient Convertible Undeniable Signatures with Delegatable Verification, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.94-A, No.1, pp.71-83, 2011

Conference

  • Ken Ichikawa, Kanta Matsuura. Preventing execution of JIT shellcode by isolating running process, Annual Computer Security Applications Conference 2011, 2011
  • Kanta Matsuura. Passive and Active Measurements of Cybersecurity Risk Parameters, The 12th International Workshop on Information Security Applications (WISA2011), 2011
  • Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura. Empirical Study on Interdependency of Information Security Between Industrial Sectors and Regions, Seventh Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2011 [detail]

Year 2010

Journal (incl. LNCS)

  • Takahiro Matsuda, Yasumasa Nakai, Kanta Matsuura. Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability, Lecture Notes in Computer Science (Pairing-Based Cryptography, 4th International Conference on Pairing-Based Cryptography: Pairing 2010), Vol.6487, pp.225-245, 2010 [detail]
  • Takurou HOSOI, Kanta Matsuura. Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009, Lecture Notes in Computer Science (Recent Advances in Intrusion Detection, 13th International Symposium on Recent Advances in Intrusion Detection: RAID 2010), Vol.6307, pp.496-497, 2010
  • Jacob C. N. Schuldt, Kanta Matsuura. An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification, Lecture Notes in Computer Science (6th International Conference on Information Security Practice and Experience: ISPEC2010), Vol.6047, pp.276-293, 2010
  • Shaojing Fu, Chao Li, Kanta Matsuura, Longjiang Qu. Enumeration of Balanced Symmetric Functions over GF(p), Information Processing Letters, Vol.110, pp.544-548, 2010

Conference

  • Kanta Matsuura. Security Economics and Cryptographic Industry, 2010 Japan-Taiwan Joint Research Symposium on Cryptography and Information Technology toward Next IT-society, 2010
  • Kanta Matsuura. A Guideline for Product-Validation Systems Regarding Security Modules, Computer Security Institute Annual Conference (CSI 2010), 2010
  • Kanta Matsuura. Impacts of Information-Security Evaluation, The 11th CTINS (Cybercrime Technology Information Network System) Annual Conference, 2010
  • Toshihiko Takemura, Hideyuki Tanaka, Kanta Matsuura. Awareness Gaps on Effects of Information Security Measure between Managers and Employees: An Empirical Study Using Micro Data Collected from Web-Based Survey, Short Paper Proceedings of the Fourth IFIP WG11.11 International Conference on Trust Management (IFIPTM 2010), pp.25-32, 2010
  • Peng Yang, Kanta Matsuura. An Introduction of A Users' Guideline to Japan Cryptographic Module Validation Program, ASIACCS 2010 (5th ACM Symposium on Information, Computer and Communications Security), 2010
  • Kanta Matsuura. Economic Implications of Light-Weight Security Mechanisms, The 2010 Workshop on RFID Security (RFIDsec'10 Asia), 2010

Year 2009

Journal (incl. LNCS)

  • Yi Shi, Kanta Matsuura. Fingerprinting Attack on the Tor Anonymity System, Lecture Notes in Computer Science (11th International Conference on Information and Communications Security: ICICS 2009), Vol.5927, pp.425-438, 2009 [detail]
  • Shaojing Fu, Kanta Matsuura, Chao Li, Longjiang Qu. Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity, Lecture Notes in Computer Science (The 8th International Conference on Cryptology and Network Security: CANS 2009), Vol.5888, pp.402-412, 2009
  • Takahiro Matsuda, Kanta Matsuura, Jacob C. N. Schuldt. Efficient Constructions of Signcryption Schemes and Signcryption Composability, Lecture Notes in Computer Science (Progress in Cryptology, 10th International Conference on Cryptology in India: INDOCRYPT 2009), Vol.5922, pp.321-342, 2009 [detail]
  • Yasumasa Nakai, Takahiro Matsuda, Wataru Kitada, Kanta Matsuura. A Generic Construction of Timed-Release Encryption with Pre-open Capability, Lecture Notes in Computer Science (Advances in Information and Computer Security, The 4th International Workshop on Security: IWSEC2009), Vol.5824, pp.53-70, 2009 [detail]
  • Peng Yang, Rui Zhang, Kanta Matsuura, Hideki Imai. Generic Construction of Stateful Identity Based Encryption, Lecture Notes in Computer Science (Information Security, 12th International Conference: ISC2009), Vol.5735, pp.338-346, 2009
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations, Lecture Notes in Computer Science (Topics in Cryptology: CT-RSA2009), Vol.5473, pp.16-31, 2009 [detail]

Conference

  • Hitoshi Tanuma, Akira Otsuka, Hideki Imai, Kanta Matsuura. A Consideration to the Attacker's Prospect on Security Patch Management, Sixth Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2009
  • Kanta Matsuura. Economics of provable security and probable security, 4th International Workshop on Mathematical Cryptology, 2009

Year 2008

Journal (incl. LNCS)

  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption, Lecture Notes in Computer Science (The 11th International Conference on Information Security and Cryptology: ICISC2008), Vol.5461, pp.1-19, 2008 [detail]
  • Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai. Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way, IEICE Transactions on Information and Systems, Vol.E91-D, No.5, pp.1457-1465, 2008 [detail]
  • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions, IEICE Transactions on Information and Systems, Vol.E91-D, No.5, pp.1466-1476, 2008 [detail]
  • Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson. Proxy Signatures Secure Against Proxy Key Exposure, Lecture Notes in Computer Science (11th International Workshop on Practice and Theory in Public Key Cryptography : PKC'08), Vol.4939, pp.141-161, 2008 [detail]

Conference

  • Kanta Matsuura. Impacts of Optimal Investment Models on Cybersecurity Risk Management, The Institute for Operations Research and the Management Sciences (INFORMS) Annual Meeting 2008, 2008
  • Peng Yang, Kanta Matsuura. Stateful Public Key Encryption: How to Remove Gap Assumptions and Maintaining Tight Reductions, Proceedings of 2008 International Symposium on Information Theory and its Applications (ISITA2008), CD-ROM, 2008 [detail]
  • Peng Yang, Kanta Matsuura. A Forward Secure Identity Based Encryption Scheme with Master Key Update, Proceedings of 2008 International Symposium on Information Theory and its Applications (ISITA2008), CD-ROM, 2008 [detail]
  • Vadim Jefte Zendejas Samano, Takuro Hosoi, Kanta Matsuura. Time Categorization in a Social-Network-Analysis Spam Filter, Workshop on Information Security Applications (WISA2008), CD-ROM, 2008 [detail]
  • Kanta Matsuura. Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model , Workshop on the Economics of Information Security 2008 (WEIS2008), 2008 [detail]

Year 2007

Journal (incl. LNCS)

  • Takahiro Matsuda, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function, Lecture Notes in Computer Science (Provable Security-First International Conference: ProvSec 2007), Vol.4784, pp.68-84, 2007 [detail]
  • Thi Lan Anh Phan, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Construcrtions and Formal Security Proofs, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.9, pp.1814-1829, 2007 [detail]
  • Kazuto Ogawa, Goichiro Hanaoka, Kazukuni Kobara, Kanta Matsuura, Hideki Imai. Anonymous Pay-TV System with Secure Revenue Sharing, Lecture Notes in Computer Science (11th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems:KES 2007), Vol.4694, pp.984-991, 2007
  • Takahiro Matsuda, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. A Practical Provider Authentication System for Bidirectional Broadcast Service, Lecture Notes in Computer Science (11th International Conference on Knowledge-Based and Intelligent Information & Engineering Systems:KES 2007), Vol.4694, pp.967-974, 2007 [detail]
  • Wataru Kitada, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Unconditionally Secure Chaffing-and-Winnowing for Multiple Use, Lecture Notes in Computer Science (International Conference on Information Theoretic Security: ICITS 2007), Vol.4883, pp.133-145, 2007 [detail]

Conference

  • Takuro Hosoi, Kanta Matsuura, Hideki Imai. IP Trace Back by Packet Marking Method with Bloom Filters, Proceedings of the 2007 IEEE International Carnahan Conference on Security Technology (2007 ICCST) 41st Annual Conference, pp.255-263, 2007
  • Kanta Matsuura. Attack-Discouragement and Its Economic Implications, DST-JST Joint Workshop for Awareness of Funding Opportunities under Bilateral Cooperation in Field of ICT, pp.29, 2007
  • Yang Cui, Kazukuni Kobara, Kanta Matsuura, Hideki Imai. Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack, Fourth IEEE International Workshop on Pervasive Computing and Communication Security (PerCom 2007), 2007

Year 2006

Journal (incl. LNCS)

  • Marc P.C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui, Kanta Matsuura. An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocol for RFID Authentication, Lecture Notes in Computer Science (7th International Conference on Cryptology in India: Indocrypt'06), Vol.4329, pp.48-62, 2006 [detail]
  • Thi Lan Anh Phan, Yumiko Hanaoka, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai. Reducing the Spread of Damage of Key Exposure in Key Insulated Encryption, Lecture Notes in Computer Science (First International Conference on Cryptology in Vietnam: VietCrypt 2006), Vol.4341, pp.366-384, 2006 [detail]
  • Takashi Kitagawa, Peng Yang, Goichro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai. Generic Transforms to Acquire CCA-Security for Identity Based Encryptions: The Cases of FOpkc and REACT, Lecture Notes in Computer Science (11th Australasian Conference on Information Security and Provacy: ACISP 2006), Vol.4058, pp.348-359, 2006 [detail]
  • Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. Silent Cascade: Enhancing Location Privacy without Communication QoS Degradation, Lecture Notes in Computer Science (Security in Pervasive Computing: Third International Conference: SPC 2006), Vol.3934, pp.165-180, 2006 [detail]
  • Nuttapong Attrapadung, Yang Cui, David Galindo, Goichiro Hanaoka, Ichiro Hasuo, Hideki Imai, Kanta Matsuura, Peng Yang, Rui Zhang. Relations among Notions of Security for Identity Based Encryption Schemes, Lecture Notes in Computer Science (LATIN 2006: Theoretical Informatics: 7th Latin American Symposium), Vol.3887, pp.130-141, 2006 [detail]
  • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Kanta Matsuura, Hideki Imai. Applying Fujisaki-Okamoto to Identity-Based Encryption, Lecture Notes in Computer Science (Applied Algebra, Algebraic Algorithms and Error-Correcting Codes: 16th International Symposium: AAECC-16), Vol.3857, pp.183-192, 2006 [detail]

Conference

  • Kanta Matsuura. Security Securities: How to Measure the Market View on Information-Security Risks, 6th Japan-America Frontiers of Engineering Symposium, 2006
  • Peng Yang, Takashi Kitagawa, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai. A Simple Approach to Evaluate Fujisaki-Okamoto Conversion in Identity Based Encryption, Proceedings of the 2006 International Symposium on Information Theory and Its Applications (ISITA'06), pp.507-512, 2006 [detail]
  • Masaki Ishiguro, Hideyuki Tanaka, Kanta Matsuura, Ichiro Murase. The Effect of Information Security Incidents on Corporate Values in the Japanese Stock Market, The Workshop on the Economics of Securing the Information Infrastructure, 2006 [detail]
  • Wei Liu, Hideyuki Tanaka, Kanta Matsuura. An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan, Workshop on the Economics of Information Security 2006 (WEIS2006), 2006 [detail]

Year 2005

Journal (incl. LNCS)

  • Takayuki Furuya, Takahiro Matsuzaki, Kanta Matsuura. Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation, Lecture Notes in Computer Science (Information Security and Cryptology: First SKLOIS Conference: CISC 2005), Vol.3822, pp.395-406, 2005 [detail]
  • Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. Towards Modeling Wireless Location Privacy, Lecture Notes in Computer Science (5th International Workshop on Privacy Enhancing Technologies: PET 2005), Vol.3856, pp.59-77, 2005 [detail]
  • Hideyuki Tanaka, Kanta Matsuura, Osamu Sudo. Vulnerability and information security investment: An empirical analysis of e-local government in Japan, The Journal of Accounting and Public Policy, Vol.24, No.Issue. 1, pp.37-59, 2005 [detail]

Conference

  • Krishna Sampigethaya, Leping Huang, Mingyan Li, Radha Poovendran, Kanta Matsuura, Kaoru Sezaki. CARAVAN: Providing Location Privacy for VANET, Embedded Security in Cars 2005 (ESCAR 2005), 2005
  • Atsuhiro Yamagishi, Kanta Matsuura, Hideki Imai. Cryptographic Module Validation Program in Japan, Proceedings of the 2005 IEEE International Engineering Management Conference (IEMC 2005), Vol.II, pp.485-489, 2005 [detail]
  • Kanta Matsuura. University-Industry Collaboration in the Information Security Field: An International Comparison, Proceedings of the 2005 IEEE International Engineering Management Conference (IEMC 2005), Vol.I, pp.95-98, 2005
  • Leping Huang, Hiroshi Yamane, Kanta Matsuura, Kaoru Sezaki. Protecting Location Privacy for Wireless Network, ARO workshop on Localization in Wireless Sensor Networks, 2005
  • Hideyuki Tanaka, Kanta Matsuura. Vulnerability and Effects of Information Security Investment: A Firm Level Empirical Analysis of Japan, International Forum of Financial Information Systems and Cybersecurity: A Public Policy Perspective, 2005
  • Kanta Matsuura. Cross-Sector Collaboration in Japanese Information-Security Industry, and the Shock of Personal Information Protection Laws, Proceedings of the 11th International Conference on Industrial Engineering and Engineering Management, pp.1178-1181, 2005
  • Leping Huang, Kanta Matsuura, Hiroshi Yamane, Kaoru Sezaki. Enhancing Wireless Location Privacy Using Silent Periods, Proceedings of IEEE Wireless Communications and Networking Conference 2005, Vol.2, pp.1187-1192, 2005
Before 2005
Matsuura Laboratory, Department of Informatics and Electronics, Institute of Industrial Science, The University of Tokyo4-6-1 Komaba, Meguro-ku, Tokyo 153-8505, Japan