Atsushi FUJIOKA


Secure Hierarchical Identity-Based Identification without Random Oracles
Atsushi FUJIOKA Taiichi SAITO Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1307-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hierarchical identity-based identificationimpersonation under active and concurrent attackscomputational Diffie-Hellman assumptionRSA assumption
 Summary | Full Text:PDF(652.3KB)

Non-malleable Multiple Public-Key Encryption
Atsushi FUJIOKA Eiichiro FUJISAKI Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1318-1334
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Multiple public-key encryptionNon-malleabilityAdversarially chosen public-key attacksThreshold public-key encryptionand Completely non-malleable public-key encryption.
 Summary | Full Text:PDF(715.9KB)

id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
Atsushi FUJIOKA Fumitaka HOSHINO Tetsutaro KOBAYASHI Koutarou SUZUKI Berkant USTAOLU Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1139-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
identity-based authenticated key exchangegap Bilinear Diffie-Hellman assumptionidentity-based extended Canetti-Krawczyk modelrandom oracle model
 Summary | Full Text:PDF(695.8KB)

Characterization of Strongly Secure Authenticated Key Exchanges without NAXOS Technique
Atsushi FUJIOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1088-1099
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
two-pass authenticated key exchangeextended Canetti-Krawczyk securitygap Diffie-Hellman assumptionNAXOS technique
 Summary | Full Text:PDF(252.1KB)

Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
Atsushi FUJIOKA Yoshiaki OKAMOTO Taiichi SAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 76-91
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
timed-release public-key encryptionpublic-key encryptionidentity-based encryptionrandom oracle model.
 Summary | Full Text:PDF(345.6KB)

Security of Sequential Multiple Encryption
Atsushi FUJIOKA Yoshiaki OKAMOTO Taiichi SAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 57-69
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
multiple encryptionsequential constructionrandom oracle modelFujisaki-Okamoto conversion
 Summary | Full Text:PDF(413.9KB)

Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
Minkyu KIM Atsushi FUJIOKA Berkant USTAOLU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 29-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
authenticated key exchangeeCK modelNAXOS' approachtrapdoor test
 Summary | Full Text:PDF(358.4KB)

Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 40-56
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
predicate-based AKEeCK securitykey-policysession-policy
 Summary | Full Text:PDF(493.3KB)

Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1306-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hierarchical ID-based AKEeCK security
 Summary | Full Text:PDF(406.2KB)

Interactive Bi-proof Systems and Undeniable Signature Schemes
Atsushi FUJIOKA Tatsuaki OKAMOTO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1992/01/25
Vol. E75-D  No. 1  pp. 102-109
Type of Manuscript:  Special Section PAPER (Special Section on Theoretical Foundations of Computing)
Category: 
Keyword: 
interactive proof systemrandom self-reducibilityminimum knowledgenessdigital signature
 Summary | Full Text:PDF(644.7KB)

Abuses of Undeniable Signatures and Their Countermeasures
Kazuo OHTA Tatsuaki OKAMOTO Atsushi FUJIOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2109-2113
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF(384.9KB)