Hajime WATANABE


Attribute-Based Encryption for Range Attributes
Nuttapong ATTRAPADUNG Goichiro HANAOKA Kazuto OGAWA Go OHTAKE Hajime WATANABE Shota YAMADA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1440-1455
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
attribute-based encryptionrange attributegeneric construction
 Summary | Full Text:PDF(2MB)

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF(729.8KB)

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
Koji NUIDA Satoshi FUJITSU Manabu HAGIWARA Hideki IMAI Takashi KITAGAWA Kazuto OGAWA Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 197-206
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
fingerprintc-secure codecollusion attacksecurity analysiswatermarkDRM
 Summary | Full Text:PDF(528.7KB)

A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code
Hajime WATANABE Takashi KITAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10  pp. 2589-2595
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
illegal copyfingerprintingwatermarkingcollusion attackc-Secure CRT Code
 Summary | Full Text:PDF(297.4KB)

Relations among Security Goals of Probabilistic Public-Key Cryptosystems
Ako SUZUKI Yuichi KAJI Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 172-178
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
probabilistic public-key encryption schemeschosen-plaintext attackchosen-ciphertext attackequivalence undecidabilitynon-verifiability
 Summary | Full Text:PDF(270.3KB)

Security Verification of Real-Time Cryptographic Protocols Using a Rewriting Approach
Takehiko TANAKA Yuichi KAJI Hajime WATANABE Toyoo TAKATA Tadao KASAMI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1998/04/25
Vol. E81-D  No. 4  pp. 355-363
Type of Manuscript:  PAPER
Category: Software Theory
Keyword: 
security verificationcryptographic protocoltimestampconditional term rewriting system network security
 Summary | Full Text:PDF(893KB)

An lmproved Method for Formal Security Verification of Cryptographic Protocols
Hajime WATANABE Toru FUJIWARA Tadao KASAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/07/25
Vol. E79-A  No. 7  pp. 1089-1096
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticationcomputer securitycryptographic protocolprotocol verification
 Summary | Full Text:PDF(689.3KB)

A System for Deciding the Security of Cryptographic Protocols
Hajime WATANABE Toru FUJIWARA Tadao KASAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 96-103
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
computer securitycryptographic protocolprotocol verification
 Summary | Full Text:PDF(630.8KB)