Kazuto Ogawa

Orcid: 0000-0002-4999-3790

According to our database1, Kazuto Ogawa authored at least 47 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023

2022
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022

Continuous Group Key Agreement with Flexible Authorization and Its Applications.
IACR Cryptol. ePrint Arch., 2022

Membership Privacy for Asynchronous Group Messaging.
IACR Cryptol. ePrint Arch., 2022

Output Prediction Attacks on Block Ciphers Using Deep Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Privacy-Preserving System for Enriched-Integrated Service.
IEICE Trans. Inf. Syst., 2021

Output Prediction Attacks on SPN Block Ciphers using Deep Learning.
IACR Cryptol. ePrint Arch., 2021

2020
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Short Lattice Signatures in the Standard Model with Efficient Tag Generation.
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020

2019
Privacy Preservation for Versatile Pay-TV Services.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

Privacy Preserving System for Real-Time Enriched-Integrated Service with Feedback to Providers.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

2018
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Attribute-Based Encryption for Range Attributes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Key Management for Versatile Pay-TV Services.
Proceedings of the Security and Trust Management - 13th International Workshop, 2017

2016
Application Authentication System with Efficiently Updatable Signature.
IEICE Trans. Inf. Syst., 2016

2015
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption.
IEEE Trans. Consumer Electron., 2015

Content and Key Management to Trace Traitors in Broadcasting Services.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Privacy preserving system for integrated broadcast-broadband services.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Watermarking for HEVC/H.265 stream.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Practically secure update of scrambling scheme.
Proceedings of the 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2015

2014
Weakened Anonymity of Group Signature and Its Application to Subscription Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2011
Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Application Authentication for Hybrid Services of Broadcasting and Communications Networks.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

2010
Efficient Provider Authentication for Bidirectional Broadcasting Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Efficient Broadcast Encryption with Personalized Messages.
Proceedings of the Provable Security - 4th International Conference, 2010

2009
A Trade-off Traitor Tracing Scheme.
IEICE Trans. Inf. Syst., 2009

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

An improvement of discrete Tardos fingerprinting codes.
Des. Codes Cryptogr., 2009

On the Theoretical Gap between Group Signatures with and without Unlinkability.
Proceedings of the Progress in Cryptology, 2009

2008
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure.
Proceedings of the Advances in Information and Computer Security, 2008

An Efficient Strong Key-Insulated Signature Scheme and Its Application.
Proceedings of the Public Key Infrastructure, 2008

2007
Extension of Broadcasting Service by Using Electronic Tokens.
IEICE Trans. Inf. Syst., 2007

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Anonymous Prepaid Content Viewing System with Mobile Terminal.
Proceedings of the SECRYPT 2007, 2007

Anonymous Pay-TV System with Secure Revenue Sharing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Anonymous Authentication Scheme for Subscription Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Trade-Off Traitor Tracing.
Proceedings of the Progress in Cryptology, 2007

A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with Very Short Lengths.
Proceedings of the Applied Algebra, 2007

2006
Flexible License Transfer System Using Mobile Terminal.
Proceedings of the SECRYPT 2006, 2006

Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
A secure traitor tracing scheme against key exposure.
Proceedings of the 2005 IEEE International Symposium on Information Theory, 2005

2004
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
Separating Encryption and Key Issuance in Digital Rights Management Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...