Takeshi Koshiba

Orcid: 0000-0001-8994-729X

According to our database1, Takeshi Koshiba authored at least 107 papers between 1995 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage.
IEEE/ACM Trans. Netw., February, 2024

2023
Computing the quantumguesswork: a quadratic assignment problem.
Quantum Inf. Comput., July, 2023

A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm.
J. Inf. Secur. Appl., March, 2023

2022
Guesswork of a Quantum Ensemble.
IEEE Trans. Inf. Theory, 2022

Quantum verifiable protocol for secure modulo zero-sum randomness.
Quantum Inf. Process., 2022

Perfectly Secure Message Transmission Against Rational Adversaries.
IEEE J. Sel. Areas Inf. Theory, 2022

From Random Numbers to Random Objects.
Entropy, 2022

The Odyssey of Entropy: Cryptography.
Entropy, 2022

Bangla-BERT: Transformer-Based Efficient Model for Transfer Learning and Language Understanding.
IEEE Access, 2022

CARAN: A Context-Aware Recency-Based Attention Network for Point-of-Interest Recommendation.
IEEE Access, 2022

2021
Plant Leaf Disease Recognition Using Depth-Wise Separable Convolution-Based Models.
Symmetry, 2021

CricShotClassify: An Approach to Classifying Batting Shots from Cricket Videos Using a Convolutional Neural Network and Gated Recurrent Unit.
Sensors, 2021

Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis.
Entropy, 2021

Classification of Indoor Human Fall Events Using Deep Learning.
Entropy, 2021

Image Defogging Framework Using Segmentation and the Dark Channel Prior.
Entropy, 2021

Content Delivery Networks: State of the Art, Trends, and Future Roadmap.
ACM Comput. Surv., 2021

Efficient Private Conjunctive Query Protocol Over Encrypted Data.
Cryptogr., 2021

Classical computation of quantum guesswork.
CoRR, 2021

Frequent contiguous pattern mining over biological sequences of protein misfolded diseases.
BMC Bioinform., 2021

2020
Blind Audio Watermarking Based on Parametric Slant-Hadamard Transform and Hessenberg Decomposition.
Symmetry, 2020

Blind Image Watermarking in Canonical and Cepstrum Domains Based on 4-Connected t-o'clock Scrambling.
Symmetry, 2020

Efficient protocols for private wildcards pattern matching.
J. Inf. Secur. Appl., 2020

Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation.
Int. J. Grid Util. Comput., 2020

Generalized M<sub>m, r</sub>-Network: A Case for Fixed Message Dimensions.
IEEE Commun. Lett., 2020

Almost Fully Secured Lattice-Based Group Signatures with Verifier-Local Revocation.
Cryptogr., 2020

Enhanced Secure Comparison Schemes Using Homomorphic Encryption.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Fourier-based Verifiable Function Secret Sharing.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Arbitrable blind quantum computation.
Quantum Inf. Process., 2019

Impossibility Of Perfectly-Secure Ono-Round Delegated Quantum Computing for classical client.
Quantum Inf. Comput., 2019

Efficient private database queries using ring-LWE somewhat homomorphic encryption.
J. Inf. Secur. Appl., 2019

Verifiable Quantum Secure Modulo Summation.
CoRR, 2019

A Guests Managing System with Lattice-Based Verifier-Local Revocation Group Signature Scheme with Time-Bound Keys.
Proceedings of the Fifth International Conference on Mathematics and Computing, 2019

Perfectly Secure Message Transmission Against Independent Rational Adversaries.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019

2018
Achieving Strong Security and Member Registration for Lattice-based Group Signature Scheme with Verifier-local Revocation.
J. Internet Serv. Inf. Secur., 2018

Outsourcing private equality tests to the cloud.
J. Inf. Secur. Appl., 2018

Non-transferable proxy re-encryption for multiple groups.
Int. J. Space Based Situated Comput., 2018

Secure Modulo Zero-Sum Randomness as Cryptographic Resource.
IACR Cryptol. ePrint Arch., 2018

Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions.
Proceedings of the Security and Trust Management - 14th International Workshop, 2018

Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation.
Proceedings of the Advances in Network-Based Information Systems, 2018

Achieving Almost-Full Security for Lattice-Based Fully Dynamic Group Signatures with Verifier-Local Revocation.
Proceedings of the Information Security Practice and Experience, 2018

Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication.
Proceedings of the 2018 IEEE International Symposium on Information Theory, 2018

Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys.
Proceedings of the Internet and Distributed Computing Systems, 2018

New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Achieving Full Security for Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Perfectly Secure Message Transmission Against Rational Timid Adversaries.
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018

2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
J. Math. Cryptol., 2017

Foreword.
IEICE Trans. Inf. Syst., 2017

Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority.
IACR Cryptol. ePrint Arch., 2017

Perfectly Secure Message Transmission Scheme against Rational Adversaries.
IACR Cryptol. ePrint Arch., 2017

Fourier-based Function Secret Sharing with General Access Structure.
CoRR, 2017

Non-Malleable Codes Against Affine Errors.
CoRR, 2017

An Efficient Privacy-Preserving Comparison Protocol.
Proceedings of the Advances in Network-Based Information Systems, 2017

Function Secret Sharing Using Fourier Basis.
Proceedings of the Advances in Network-Based Information Systems, 2017

Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership.
Proceedings of the Advances in Network-Based Information Systems, 2017

Secure SMS Transmission Based on Verifiable Hash Convergent Group Signcryption.
Proceedings of the 18th IEEE International Conference on Mobile Data Management, 2017

Private Comparison Protocol and Its Application to Range Queries.
Proceedings of the Internet and Distributed Computing Systems, 2017

Privacy-Preserving Equality Test Towards Big Data.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017

Efficient Protocols for Private Database Queries.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Big Data Cloud Deduplication Based on Verifiable Hash Convergent Group Signcryption.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

Fully Secure Lattice-Based Group Signatures with Verifier-Local Revocation.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Secure Deduplication in a Multiple Group Signature Setting.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Private Conjunctive Query over Encrypted Data.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups.
IACR Cryptol. ePrint Arch., 2016

An Enhancement of Privacy-Preserving Wildcards Pattern Matching.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2015
New packing method in somewhat homomorphic encryption and its applications.
Secur. Commun. Networks, 2015

Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
J. Math. Cryptol., 2014

Linear Programming Relaxations for Goldreich's Generators over Non-Binary Alphabets.
CoRR, 2014

Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Practical Packing Method in Somewhat Homomorphic Encryption.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Secure pattern matching using somewhat homomorphic encryption.
Proceedings of the CCSW'13, 2013

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Quantum Cryptography.
Proceedings of the Handbook of Natural Computing, 2012

Computational Indistinguishability Between Quantum States and Its Cryptographic Application.
J. Cryptol., 2012

2010
Public Discussion Must Be Back and Forth in Secure Message Transmission.
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010

2009
Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function.
Proceedings of the Theory of Quantum Computation, 2009

Strengthening the Security of Distributed Oblivious Transfer.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions.
IEEE Trans. Inf. Theory, 2008

Reducing Complexity Assumptions for Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2008

Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification.
Proceedings of the Information Theoretic Security, Third International Conference, 2008

2007
More on Security of Public-Key Cryptosystems Based on Chebyshev Polynomials.
IEEE Trans. Circuits Syst. II Express Briefs, 2007

How to Derive Lower Bound on Oblivious Transfer Reduction.
IACR Cryptol. ePrint Arch., 2007

Direct Reduction of String (1, 2)-OT to Rabin's OT.
IACR Cryptol. ePrint Arch., 2007

Low-density attack revisited.
Des. Codes Cryptogr., 2007

2006
Progress in Quantum Computational Cryptography.
J. Univers. Comput. Sci., 2006

Round-Efficient One-Way Permutation Based Perfectly Concealing Bit Commitment Scheme.
Electron. Colloquium Comput. Complex., 2006

2005
Universal test for quantum one-way permutations.
Theor. Comput. Sci., 2005

2004
Theoretical Analysis of chi<sup>2</sup> Attack on RC6.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Short Exponent Diffie-Hellman Problems.
Proceedings of the Public Key Cryptography, 2004

2002
Theoretical Analysis of "Correlations in RC6".
IACR Cryptol. ePrint Arch., 2002

On Sufficient Randomness for Secure Public-Key Cryptosystems.
Proceedings of the Public Key Cryptography, 2002

Multiple Linear Cryptanalysis of a Reduced Round RC6.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002

2001
A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes.
Proceedings of the Public Key Cryptography, 2001

Polynomial-Time Algorithms for the Equivalence for One-Way Quantum Finite Automata.
Proceedings of the Algorithms and Computation, 12th International Symposium, 2001

2000
Inferring pure context-free languages from positive data.
Acta Cybern., 2000

A Note on Finding One-Variable Patterns Consistent with Examples and Counterexamples.
Proceedings of the International Colloquium on Words, 2000

1999
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.
Proceedings of the Information Security and Cryptology, 1999

1998
Enhancing D-ABDUCTOR towards a diagrammatic user interface platform.
Proceedings of the Knowledge-Based Intelligent Electronic Systems, 1998

1997
Learning Deterministic even Linear Languages From Positive Examples.
Theor. Comput. Sci., 1997

On a Hierarchy of Slender Languages Based on Control Sets.
Fundam. Informaticae, 1997

Computational learning theoretic cryptanalysis of language theoretic cryptosystems.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
A machine learning approach to knowledge acquisitions from text databases.
Int. J. Hum. Comput. Interact., 1996

Decision Tree Learning Systems with Switching Evaluators.
Proceedings of the Advances in Artificial Intelligence, 1996

1995
Typed pattern languages and their learnability.
Proceedings of the Computational Learning Theory, Second European Conference, 1995

Learning Strongly Deterministic Even Linear Languages from Positive Examples.
Proceedings of the Algorithmic Learning Theory, 6th International Conference, 1995


  Loading...