Hiroshi Doi

According to our database1, Hiroshi Doi authored at least 23 papers between 1984 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hierarchical Secret-Sharing Scheme Based on XOR Operations.
J. Inf. Process., 2024

2021
New Proof Techniques Using the Properties of Circulant Matrices for XOR-based (<i>k</i>, <i>n</i>) Threshold Secret Sharing Schemes.
J. Inf. Process., 2021

2018
XOR-Based Hierarchical Secret Sharing Scheme.
Proceedings of the Advances in Information and Computer Security, 2018

A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
A Hierarchical Secret Sharing Scheme over Finite Fields of Characteristic 2.
J. Inf. Process., 2017

2016
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.
J. Inf. Process., 2016

({1, 3}, n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search.
J. Inf. Process., 2015

2013
Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.
Proceedings of the Financial Cryptography and Data Security, 2013

2011
A Fully Secure Spatial Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Secure and Efficient IBE-PKE Proxy Re-Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010

2009
On the Security of Adding Confirmers into Designated Confirmer Signatures.
Proceedings of the SECRYPT 2009, 2009

Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - 5th International Conference, 2009

An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Efficient IBE-PKE Proxy Re-Encryption.
Proceedings of the SECRYPT 2008, 2008

2007
An ID-SP-M4M Scheme and Its Security Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

2005
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
Proceedings of the Coding and Cryptography, International Workshop, 2005

On the Security of Condorcet Electronic Voting Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2000
A Structured ElGamal-Type Multisignature Scheme.
Proceedings of the Public Key Cryptography, 2000

On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1984
Relationships-based recognition of structural industrial parts stacked in a bin.
Robotica, 1984


  Loading...