2024
Simple Privacy-Preserving Federated Learning with Different Encryption Keys.
Proceedings of the International Symposium on Information Theory and Its Applications, 2024
Security Evaluation of Decision Tree Meets Data Anonymization.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024
2023
Construction of a Support Tool for Japanese User Reading of Privacy Policies and Assessment of its User Impact.
IEICE Trans. Inf. Syst., May, 2023
Designing a Location Trace Anonymization Contest.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Proc. Priv. Enhancing Technol., January, 2023
Differential Private (Random) Decision Tree Without Adding Noise.
Proceedings of the Neural Information Processing - 30th International Conference, 2023
2022
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
,
,
,
,
,
,
,
,
,
,
,
J. Inf. Process., 2022
Continuous Group Key Agreement with Flexible Authorization and Its Applications.
IACR Cryptol. ePrint Arch., 2022
Membership Privacy for Asynchronous Group Messaging.
IACR Cryptol. ePrint Arch., 2022
Construction of a Support Tool for User Reading of Privacy Policies and Assessment of its User Impact.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
2021
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021
The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers.
CoRR, 2021
2020
On Limitation of Plausible Deniability.
Proceedings of the Advances in Information and Computer Security, 2020
2018
How to Handle Excessively Anonymized Datasets.
J. Inf. Process., 2018
2016
On the security of CBC Mode in SSL3.0 and TLS1.0.
J. Internet Serv. Inf. Secur., 2016
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016
Analyzing Randomized Response Mechanisms Under Differential Privacy.
Proceedings of the Information Security - 19th International Conference, 2016
How does the willingness to provide private information change?
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
Generic Fully Simulatable Adaptive Oblivious Transfer.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Can We Securely Use CBC Mode in TLS1.0?
Proceedings of the Information and Communication Technology, 2015
A Secure Automobile Information Sharing System.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
New leakage-resilient CCA-secure public key encryption.
J. Math. Cryptol., 2013
UC-Secure Multi-Session OT Using Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2013
2010
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption.
IACR Cryptol. ePrint Arch., 2010
2009
Cryptographically Secure Bloom-Filters.
Trans. Data Priv., 2009
Simple Adaptive Oblivious Transfer Without Random Oracle.
IACR Cryptol. ePrint Arch., 2009
A Storage Efficient Redactable Signature in the Standard Model.
Proceedings of the Information Security, 12th International Conference, 2009
2008
Semantic security for the McEliece cryptosystem without random oracles.
Des. Codes Cryptogr., 2008
2006
Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.
Proceedings of the Progress in Cryptology, 2006
2005
Using Trapdoor Permutations in a Complete Subtree Method for Broadcast Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005