Hideki IMAI


Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation
Go OHTAKE Kazuto OGAWA Goichiro HANAOKA Shota YAMADA Kohei KASAMATSU Takashi YAMAKAWA Hideki IMAI 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1846-1856
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
attribute-based encryptionciphertext policywildcard
 Summary | Full Text:PDF(1.8MB)

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 34-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor tracingcollusion attackcontent comparisonencodingwatermarkingc-secure code
 Summary | Full Text:PDF(857.6KB)

On Finding Secure Domain Parameters Resistant to Cheon's Algorithm
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2456-2470
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
elliptic curve domain parametersSDH/related problemsCheon's algorithm
 Summary | Full Text:PDF(1.5MB)

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
Manabu INUMA Akira OTSUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/02/01
Vol. E96-D  No. 2  pp. 357-364
Type of Manuscript:  PAPER
Category: Image Recognition, Computer Vision
Keyword: 
biometricswolf attackwolf attack probabilitymatching algorithmsecurity
 Summary | Full Text:PDF(292.5KB)

A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes
Masakazu YOSHIDA Manabu HAGIWARA Takayuki MIYADERA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9  pp. 1561-1569
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
entanglement distillation protocolquantum error-correcting codesquantum low-density parity-check codessum-product decoding
 Summary | Full Text:PDF(1.2MB)

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2095-2110
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
password-authenticated key exchangepasswordson-line/off-line dictionary attacksanonymityinsider attacksprovable security
 Summary | Full Text:PDF(693.9KB)

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF(729.8KB)

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael DOWSLEY Jorn MULLER-QUADE Akira OTSUKA Goichiro HANAOKA Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2  pp. 725-734
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
verifiable secret sharingdishonest majoritypre-distributed dataunconditional securityuniversal composable
 Summary | Full Text:PDF(553.4KB)

Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2092-2095
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
PAKEon-line/off-line dictionary attacksaugmented PAKEserver-compromise impersonation attacksIEEE P1363.2 working group
 Summary | Full Text:PDF(92.3KB)

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1086-1101
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attacksRSAleakage of stored secretsreplacement attacks
 Summary | Full Text:PDF(7.4MB)

Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 116-125
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
attribute based encryptionciphertext policykey policy
 Summary | Full Text:PDF(230.4KB)

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 102-115
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attackspassword-authenticated key exchangeanonymityefficiencyprovable security
 Summary | Full Text:PDF(452.8KB)

Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
Manabu HAGIWARA Marc P.C. FOSSORIER Takashi KITAGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/11/01
Vol. E92-A  No. 11  pp. 2891-2894
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesdifference matrixquasi-cyclic codesregular LDPC codescirculant matrixlower bounds
 Summary | Full Text:PDF(84.2KB)

Strong Anonymous Signature
Rui ZHANG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2487-2491
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
anonymous signaturestrong anonymitygeneric and efficient constructions
 Summary | Full Text:PDF(101.6KB)

CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
Yang CUI Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 967-970
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
CCA-secure public-key encryptiongroup-dependent hash
 Summary | Full Text:PDF(86.2KB)

A Trade-off Traitor Tracing Scheme
Go OHTAKE Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 859-875
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Contents Protection
Keyword: 
dynamic traitor tracingwatermarkingdigital rights managementcontent distribution
 Summary | Full Text:PDF(786.3KB)

Combining Public Key Encryption with Keyword Search and Public Key Encryption
Rui ZHANG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 888-896
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
PEKSPKEPEKS/PKECCA security
 Summary | Full Text:PDF(196.5KB)

A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose CARRIJO Rafael TONICELLI Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2  pp. 658-662
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
authenticationprotocol HB/HB+cryptoanalysis
 Summary | Full Text:PDF(83KB)

A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
Huanfei MA Haibin KAN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/02/01
Vol. E92-B  No. 2  pp. 671-674
Type of Manuscript:  LETTER
Category: Wireless Communication Technologies
Keyword: 
MIMOSpace-Time block codeorthogonal designquaternion
 Summary | Full Text:PDF(100.7KB)

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
Koji NUIDA Satoshi FUJITSU Manabu HAGIWARA Hideki IMAI Takashi KITAGAWA Kazuto OGAWA Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 197-206
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
fingerprintc-secure codecollusion attacksecurity analysiswatermarkDRM
 Summary | Full Text:PDF(528.7KB)

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang CUI Eiichiro FUJISAKI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 53-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
identity based encryptiondigital signaturesecurity notions
 Summary | Full Text:PDF(449.3KB)

Tag-KEM from Set Partial Domain One-Way Permutations
Masayuki ABE Yang CUI Hideki IMAI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 42-52
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
Tag-KEMhybrid encryptionOAEPSAEP
 Summary | Full Text:PDF(282.9KB)

A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/11/01
Vol. E91-A  No. 11  pp. 3312-3324
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password authenticationkey exchangePAKEanonymityprovable security
 Summary | Full Text:PDF(402.8KB)

A New Security Architecture for Personal Networks and Its Performance Evaluation
SeongHan SHIN Hanane FATHI Kazukuni KOBARA Neeli R. PRASAD Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/07/01
Vol. E91-B  No. 7  pp. 2255-2264
Type of Manuscript:  PAPER
Category: Network
Keyword: 
personal networksleakage of stored secretsauthentication and key exchangeleakage-resilienceforward secrecysecurity architectureperformance evaluation
 Summary | Full Text:PDF(557.1KB)

Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
Masashi UNE Akira OTSUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1380-1389
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Biometrics
Keyword: 
biometric authentication systembrute-force attackfinger-vein-pattern based algorithmminutiae-matching algorithmwolf attack probability
 Summary | Full Text:PDF(724.7KB)

RSA-Based Password-Authenticated Key Exchange, Revisited
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1424-1438
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Key Management
Keyword: 
password authenticationkey exchangeRSAon-line/off-line attackse-residue attacksprovable security
 Summary | Full Text:PDF(408KB)

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA Nuttapong ATTRAPADUNG Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1466-1476
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
digital signaturestrong unforgeabilitytarget collision resistant hash functionstandard model
 Summary | Full Text:PDF(335.9KB)

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
Yang CUI Kazukuni KOBARA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1457-1465
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication
Keyword: 
lightweight protocolasymmetric authenticationprivacy-preservingactive attack
 Summary | Full Text:PDF(293.4KB)

IVs to Skip for Immunizing WEP against FMS Attack
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/01/01
Vol. E91-B  No. 1  pp. 164-171
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
RC4WEPIEEE802.11WLANFMS attack
 Summary | Full Text:PDF(1.4MB)

Invisibly Sanitizable Digital Signature Scheme
Kunihiko MIYAZAKI Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 392-402
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
digital signatureinformation disclosureprivacy issue
 Summary | Full Text:PDF(358.5KB)

A Secure Authenticated Key Exchange Protocol for Credential Services
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 139-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
password authenticationkey exchangeleakage of stored secretsroaming protocolpassword-enabled PKIcredential servicesprovable security
 Summary | Full Text:PDF(266.1KB)

Extension of Broadcasting Service by Using Electronic Tokens
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11  pp. 1741-1750
Type of Manuscript:  PAPER
Category: Contents Technology and Web Information Systems
Keyword: 
content distributiontokenanonymitygroup signatureprivacy preservation
 Summary | Full Text:PDF(470.5KB)

Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong ATTRAPADUNG Jun FURUKAWA Takeshi GOMI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1803-1813
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
identity based encryptiontight security reduction
 Summary | Full Text:PDF(341.8KB)

Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs
Thi Lan Anh PHAN Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1814-1829
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
key insulated public key encryptionauxiliary helper keyIND-KE-CCA
 Summary | Full Text:PDF(344.4KB)

Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
Miodrag J. MIHALJEVI Marc P.C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/06/01
Vol. E90-A  No. 6  pp. 1248-1251
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
conditional data access controlbroadcast encryptioncryptographic key managementcryptanalysisbirthday paradox
 Summary | Full Text:PDF(72.7KB)

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5  pp. 1000-1011
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
traitor tracingkey exposurekey updatetwo variable-polynomial
 Summary | Full Text:PDF(547.8KB)

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/02/01
Vol. E90-A  No. 2  pp. 474-490
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticated key exchangepasswordson-line and off-line dictionary attacksRSAleakage of stored secretsefficiencyperfect forward secrecy
 Summary | Full Text:PDF(321.4KB)

Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 187-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
broadcast encryptionrevocation scheme
 Summary | Full Text:PDF(678KB)

Key-Dependent Weak IVs and Weak Keys in WEP--How to Trace Conditions Back to Their Patterns--
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/08/01
Vol. E89-A  No. 8  pp. 2198-2206
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
RC4WEPIEEE802.11WLANFMS attack
 Summary | Full Text:PDF(201.4KB)

An Efficient Group Signature Scheme from Bilinear Maps
Jun FURUKAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1328-1338
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
group signaturebilinear mapefficient
 Summary | Full Text:PDF(230.2KB)

A Provably Secure Refreshable Partially Anonymous Token and Its Applications
Rie SHIGETOMI Akira OTSUKA Jun FURUKAWA Keith MARTIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1396-1406
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymous credentialrefreshable tokensanonymityprivacy protection
 Summary | Full Text:PDF(280KB)

Efficient Algorithms for Tate Pairing
Tetsutaro KOBAYASHI Kazumaro AOKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 134-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
Weil pairingTate pairingelliptic curve cryptosystemfast computation
 Summary | Full Text:PDF(207.6KB)

Security Protocols Protection Based on Anomaly Detection
Abdulrahman ALHARBY Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1  pp. 189-200
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet III)
Category: Intrusion Detection
Keyword: 
intrusion detectionsecurity protocolsanomaly detectiondynamic Bayesian network
 Summary | Full Text:PDF(2.1MB)

Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions
Masayuki ABE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 99-105
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
Mix-netanonymitychosen-ciphertext attackssecurity notion
 Summary | Full Text:PDF(152.8KB)

Relation between the XL Algorithm and Grobner Basis Algorithms
Makoto SUGITA Mitsuru KAWAZOE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 11-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
algebraic attacksGrobner basis algorithmF4XL algorithm
 Summary | Full Text:PDF(199.4KB)

How to Break COT-Based Fingerprinting Schemes and Design New One
JaeGwi CHOI Goichiro HANAOKA KyungHyune RHEE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10  pp. 2800-2807
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
fingerprintingcommitted oblivious transfer protocoltwo-lock cryptosystem
 Summary | Full Text:PDF(183.1KB)

A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing
Tatsuyuki MATSUSHITA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A  No. 4  pp. 1055-1062
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
public-key traitor tracingblack-box tracingflexible revocation
 Summary | Full Text:PDF(171.8KB)

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A  No. 3  pp. 736-754
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
entropy of passwordson-line and off-line attacksauthenticationkey establishment protocolleakage of stored secretsproactive securityDDH problemstandard model
 Summary | Full Text:PDF(524.8KB)

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control
Kunihiko MIYAZAKI Mitsuru IWAMURA Tsutomu MATSUMOTO Ryoichi SASAKI Hiroshi YOSHIURA Satoru TEZUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 239-246
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
digital signaturedisclosure of official informationprivacy issue
 Summary | Full Text:PDF(365.7KB)

Personal Entropy from Graphical Passwords: Methods for Quantification and Practical Key Generation
Masato AKAO Shinji YAMANAKA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2543-2554
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
personal entropygraphical passwordsbiometricshumancryptkey generation
 Summary | Full Text:PDF(384.6KB)

Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions
Yumiko HANAOKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2521-2532
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
key exposurekey-insulated encryptionunconditional security
 Summary | Full Text:PDF(292.7KB)

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF(293.6KB)

Traceability Schemes against Illegal Distribution of Signed Documents
Shoko YONEZAWA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1172-1182
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
signed documentillegal distributiontraceabilitygroup signaturepartially blind signature
 Summary | Full Text:PDF(228.1KB)

The Role of Arbiters for Unconditionally Secure Authentication
Goichiro HANAOKA Junji SHIKATA Yumiko HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1132-1140
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authentication codearbiterunconditional security
 Summary | Full Text:PDF(212.8KB)

Managing Encryption and Key Publication Independently in Digital Rights Management Systems
Goichiro HANAOKA Kazuto OGAWA Itsuro MUROTA Go OHTAKE Keigo MAJIMA Seiichi GOHSHI Kimiyuki OYAMADA Seiichi NAMBA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 160-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
digital rights management systemscopyright protectionsemantic securityadaptive attacks
 Summary | Full Text:PDF(407.4KB)

Efficient Unconditionally Secure Digital Signatures
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 120-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
digital signatureunconditional security
 Summary | Full Text:PDF(325.1KB)

Constructing c-Secure CRT Codes Using Polynomials over Finite Fields
Mira KIM Junji SHIKATA Hirofumi MURATANI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/12/01
Vol. E86-A  No. 12  pp. 3259-3266
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
fingerprintingcollusion attacksChinese remainder theorem (CRT)
 Summary | Full Text:PDF(314.2KB)

Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems
Jonas KARLSSON Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/10/01
Vol. E86-B  No. 10  pp. 2996-3003
Type of Manuscript:  PAPER
Category: Wireless Communication Technology
Keyword: 
interference cancellationcellular systemsCDMA
 Summary | Full Text:PDF(461.5KB)

Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometries
Wataru MATSUMOTO Weigang XU Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/07/01
Vol. E86-A  No. 7  pp. 1820-1834
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
Euclidean geometrylow-density parity-check codeirregular LDPC code
 Summary | Full Text:PDF(731.3KB)

CDMA Multi-Cell Performance of Combined Serial Interference Canceller and Normalized Griffiths' Algorithm
Jonas KARLSSON Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/01/01
Vol. E86-B  No. 1  pp. 162-169
Type of Manuscript:  Special Section PAPER (Special Issue on Multiple Access and Signal Transmission Techniques for Future Mobile Communications)
Category: 
Keyword: 
interference cancellationsingle-user detectormulti-user detectorcellular systemsCDMA
 Summary | Full Text:PDF(940.4KB)

Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions
Makoto SUGITA Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 2-12
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipher camelliatruncated differential cryptanalysisimpossible differential cryptanalysis
 Summary | Full Text:PDF(921.5KB)

Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10  pp. 2229-2237
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
entropy of passwordskey exchangeauthenticationDDH problemstandard model
 Summary | Full Text:PDF(271.4KB)

Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels
Tadashi MINOWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10  pp. 2211-2219
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
flat-Rayleigh fading channelnoisy channel estimatechannel capacityturbo-coded modulation
 Summary | Full Text:PDF(535.5KB)

An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability
Akira OTSUKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 140-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic cashinformation theoretic securityunconditionally secure signature
 Summary | Full Text:PDF(281.3KB)

Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher
Miodrag J. MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersnonlinear filtercryptanalysis
 Summary | Full Text:PDF(280.4KB)

A Traitor Traceable Conference System with Dynamic Sender
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 167-174
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor traceable schemeauthentication schemedynamic senderunconditional security
 Summary | Full Text:PDF(252.6KB)

Semantically Secure McEliece Public-Key Cryptosystem
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 74-83
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
McEliece public-key cryptosystemsemantic securityprovable securityconversioncoding theory
 Summary | Full Text:PDF(258.1KB)

Reliability-Based Decoding Algorithm in Multistage Decoding of Multilevel Codes
Motohiko ISAKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2528-2531
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Communication Systems
Keyword: 
multilevel codemultistage decodingpartitioning reliability-based decodingordered statistics
 Summary | Full Text:PDF(212.6KB)

A Novel Method of Reducing the Decoding Complexity for High-Rate Turbo Codes
Tadashi MINOWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/08/01
Vol. E84-B  No. 8  pp. 2151-2160
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
turbo codehigh-rate convolutional codereduced-complexity decoding
 Summary | Full Text:PDF(853.3KB)

Improving the Secure Electronic Transaction Protocol by Using Signcryption
Goichiro HANAOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/08/01
Vol. E84-A  No. 8  pp. 2042-2051
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
signcryptionSETcomputational overheadmessage overhead
 Summary | Full Text:PDF(413KB)

On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms
Miodrag J. MIHALJEVIC Marc P. C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4  pp. 919-930
Type of Manuscript:  Special Section PAPER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
decodingcryptanalysiskeystream generatorsfast correlation attack
 Summary | Full Text:PDF(309.6KB)

Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 222-230
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF(299.1KB)

Development of Cryptology in the Nineties
Hideki IMAI Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 61-67
Type of Manuscript:  INVITED PAPER (Special Section on the 10th Anniversary of the IEICE Transactions of Fundamentals: "Last Decade and 21st Century")
Category: 
Keyword: 
cryptologysecret-key cryptographypublic-key cryptographykey managementhumancrypt
 Summary | Full Text:PDF(317.7KB)

A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
Tsuyoshi NISHIOKA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 214-221
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemdigital signature
 Summary | Full Text:PDF(223.2KB)

Hierarchical Coding Based on Multilevel Bit-Interleaved Channels
Motohiko ISAKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/01/01
Vol. E84-B  No. 1  pp. 1-9
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
multilevel codingbit-interleavingunequal error protectionmultistage decoding
 Summary | Full Text:PDF(360.6KB)

An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations
Miodrag J. MIHALJEVIC Marc P. C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 311-318
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersfast correlation attackdecoding
 Summary | Full Text:PDF(245.7KB)

An Image Correction Scheme for Video Watermarking Extraction
Akihiko KUSANAGI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 273-280
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital watermarkingMPEGimage correctionpatchwork algorithmgeometrical alteration
 Summary | Full Text:PDF(1MB)

An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8  pp. 1681-1690
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
credit-based paymentelectronic toll collection systemkey predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF(613.8KB)

Tradeoffs between Error Performance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding
Motohiko ISAKA Robert H. MORELOS-ZARAGOZA Marc P. C. FOSSORIER Shu LIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8  pp. 1704-1712
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
multilevel codesmultistage decodingtradeoffsdecoding complexityerror performance
 Summary | Full Text:PDF(734KB)

Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks
Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/05/25
Vol. E83-D  No. 5  pp. 972-979
Type of Manuscript:  Special Section PAPER (Special Issue on Next Generation Internet Technologies and Their Applications)
Category: 
Keyword: 
InternetsecurityIKEDenial-of-ServiceCookie
 Summary | Full Text:PDF(409.8KB)

Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
Junji SHIKATA Yuliang ZHENG Joe SUZUKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/04/25
Vol. E83-A  No. 4  pp. 756-763
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curve cryptographyelliptic curve discrete logarithm problemMenezes-Okamoto-Vanstone (MOV) algorithmsupersingular elliptic curvesordinary elliptic curves
 Summary | Full Text:PDF(458KB)

A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF (q) and Time-Variant Table
Miodrag MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 32-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
data encryptionstream cipherkeystream generatorscellular automata
 Summary | Full Text:PDF(155.7KB)

A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q)
Miodrag MIHALJEVIC Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 40-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information integritycryptographic hash-functionscellular automata
 Summary | Full Text:PDF(166.7KB)

Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings
Motohiko ISAKA Robert H. MORELOS-ZARAGOZA Marc P. C. FOSSORIER Shu LIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2055-2063
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coded Modulation
Keyword: 
block coded modulationmultistage decodingunequal error protectionunconventional partitioningssatellite broadcasting
 Summary | Full Text:PDF(862.8KB)

FOREWORD
Shojiro SAKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2051-2051
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(111.9KB)

Block Coding Scheme Based on Complementary Sequences for Multicarrier Signals
Hideki OCHIAI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2136-2143
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Communications/Coded Modulation/Spread Spectrum
Keyword: 
multicarrier modulationmultiphase complementary sequencepeak to average power ratioblock coding
 Summary | Full Text:PDF(596.9KB)

Multi-Dimensional Turbo Codes: Performance and Simplified Decoding Structure
Jifeng LI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2089-2094
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
multi-dimensional turbo codeiterative decodingMAP algorithminterleaver
 Summary | Full Text:PDF(451.2KB)

On Strictly Geometrically Uniform Codes: Construction and New Codes
Oscar Yassuo TAKESHITA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/03/25
Vol. E80-A  No. 3  pp. 590-597
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
geometrically uniform codesgroup codestrellis code
 Summary | Full Text:PDF(625.9KB)

Viterbi Decoding Considering Synchronization Errors
Takuo MORI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1324-1329
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
synchronization errorinsertion/deletion errorViterbi decodingLevenshtein distance
 Summary | Full Text:PDF(471.7KB)

Coded Modulation for Satellite Digital Video Broadcasting
Robert MORELOS-ZARAGOZA Oscar Yassuo TAKESHITA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1355-1360
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coded Modulation
Keyword: 
coded modulationdigital videosatellite broadcasting
 Summary | Full Text:PDF(580.3KB)

MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
Weidong MAO Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/09/25
Vol. E78-A  No. 9  pp. 1117-1126
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
two-stage codingMFSKFH-CDMAaddress codemulti-user detectionerasure decoding
 Summary | Full Text:PDF(875.2KB)

A Simple Method to Control Indirect Information Flows
Satoshi OZAKI Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/11/25
Vol. E77-A  No. 11  pp. 1938-1941
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
Category: 
Keyword: 
access controlflow controlinformation flowinformation securityUNIX
 Summary | Full Text:PDF(261.4KB)

Variable Error Controlling Schemes for Intelligent Error Controlling Systems
Taroh SASAKI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1281-1288
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
error correcting codesunequal error protectionvariable error controlimportanceintelligent communication
 Summary | Full Text:PDF(698.7KB)

Multilevel RLL (D,K,l) Constrained Sequences
Oscar Yassuo TAKESHITA Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1238-1245
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
runlength limited sequencesrecording signalschannel capacitypower spectra density
 Summary | Full Text:PDF(553.5KB)

An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images
Noriko SUZUKI Taroh SASAKI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1289-1297
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
human communicationfacial image codingintelligent error-controllingunequal error protection codesmodel-based coding
 Summary | Full Text:PDF(734.6KB)

Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method
Minami NAGATSUKA Naoto ISHII Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1994/05/25
Vol. E77-B  No. 5  pp. 624-633
Type of Manuscript:  Special Section PAPER (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)
Category: 
Keyword: 
adaptive array antennamaximum entropy methodspatial samplingtemporal sampling
 Summary | Full Text:PDF(752.9KB)

Shared Pseudo-Random Secret Generation Protocols
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4  pp. 636-645
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographypseudo-random number generationsecret sharing schemesnon-interactive secure computation
 Summary | Full Text:PDF(793.3KB)

Asymptotic Bounds for Unidirectional Byte Error-Correcting Codes
Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/09/25
Vol. E76-A  No. 9  pp. 1437-1441
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
asymptotic bounderror-correction codinggeneralized concatenated codingunidirectional byte errorVarshamov-Gilbert bound
 Summary | Full Text:PDF(337KB)

A Fast Automatic Fingerprint Identification Method Based on a Weighted-Mean of Binary Image
Yu HE Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/09/25
Vol. E76-A  No. 9  pp. 1469-1482
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
automatic fingerprint identificationpattern recognitionweighted-meanoptimizationpersonal identification
 Summary | Full Text:PDF(1.1MB)

Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique
Atsushi HOSHIKUKI Michio YAMAMOTO Satoru ISHII Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/08/25
Vol. E76-B  No. 8  pp. 984-989
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Applications)
Category: 
Keyword: 
industrial R/C systemhybrid DS/FHDSFHspread spectrum
 Summary | Full Text:PDF(535.2KB)

Multihopping and Decoding of Error-Correcting Code for MFSK/FH-SSMA Systems
Tetsuo MABUCHI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/08/25
Vol. E76-B  No. 8  pp. 874-885
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Applications)
Category: 
Keyword: 
spread spectrum multiple accessfrequency hoppingerror-correcting code
 Summary | Full Text:PDF(927.4KB)

Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4  pp. 532-545
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographydigital signaturesmultiparty protocolsnoninteracitve secure computationdiscrete log-based cryptosystems
 Summary | Full Text:PDF(1.2MB)

Construction Techniques for Error-Control Runlength-Limited Block Codes
Yuichi SAITOH Takahiro OHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/03/25
Vol. E76-A  No. 3  pp. 453-458
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
coding theory(d,k) constraintserror-correction codingerror-detection codingmodulation coding,recording code
 Summary | Full Text:PDF(480.9KB)

Adaptive Equalization with Dual Diversity-Combining
Kouei MISAIZU Takashi MATSUOKA Hiroshi OHNISHI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/02/25
Vol. E76-B  No. 2  pp. 131-138
Type of Manuscript:  Special Section PAPER (Special Issue on Land Mobile/Portable Propagation)
Category: 
Keyword: 
adaptive equalizerdual diversity-combiningdigital mobile radio communicationmultipath fading channel
 Summary | Full Text:PDF(628.7KB)

Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels
Young C. YOON Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/02/25
Vol. E76-B  No. 2  pp. 163-168
Type of Manuscript:  Special Section LETTER (Special Issue on Land Mobile/Portable Propagation)
Category: 
Keyword: 
spread-spectrum multi-accessco-channel interference cancellationdiversity combiningmultipath fading
 Summary | Full Text:PDF(357.9KB)

Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Tomoyuki ASANO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 88-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitypersonalized telecommunicationcaller authenticationcallee specificationkey predistribution systemcryptography
 Summary | Full Text:PDF(655.1KB)

Runlength-Limited Short-Length Codes for Unidirectional-Byte-Error-Control
Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1057-1062
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
byte errorscoding/decodingerror-correction codingmemory fault-tolerancerecording codeunidirectional error
 Summary | Full Text:PDF(426.2KB)

Median Differential Order Statistic Filters
Peiheng QI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1100-1109
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
median filterorder statistic filtermedian differential order informationpiecewise linear functionoutput mean square error
 Summary | Full Text:PDF(712.8KB)

An Error-Controlling Scheme Based on Different Importance of Segments of a Natural Language
Taroh SASAKI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1076-1086
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
intelligent communicationerror-correcting codesnatural language
 Summary | Full Text:PDF(834.7KB)

Runlength-Limited Codes which Turn Peak-Shift Errors into Unidirectional Byte Errors
Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/07/25
Vol. E75-A  No. 7  pp. 898-900
Type of Manuscript:  Special Section LETTER (Special Section on the 1992 IEICE Spring Conference)
Category: 
Keyword: 
coding theoryrecording codeerror-correcting codeconcatenated codepeak-shift errorunidirectional byte error
 Summary | Full Text:PDF(208.6KB)

A Multi-Purpose Proof System and Its Analysis
Chaosheng SHU Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/06/25
Vol. E75-A  No. 6  pp. 735-743
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
identity proofmembership proofzero-knowledge proof
 Summary | Full Text:PDF(785KB)

Proving Identity in Three Moves
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A  No. 11  pp. 3602-3606
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
 Summary | Full Text:PDF(392.4KB)

Recent Applications of Error-Correcting Codes
Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A  No. 9  pp. 2473-2482
Type of Manuscript:  INVITED PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF(753.3KB)

New Decoding Techniques for Punctured Convolutional Codes
Pisit CHARN KEIT KONG Yuichi SAITOH Kazuhiko YAMAGUCHI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A  No. 9  pp. 2571-2578
Type of Manuscript:  Special Section PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF(566.4KB)

New Binary Encoding Schemes of Positive Integers
Yoko MIYAKAWA Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A  No. 9  pp. 2504-2512
Type of Manuscript:  Special Section PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF(484.6KB)

Pseudo-Noise Sequences for Tracking and Data Relay Satellite and Related Systems
Hidenobu FUKUMASA Ryuji HOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1991/05/25
Vol. E74-B  No. 5  pp. 1137-1144
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF(602.3KB)

Performance of Multihop Fast Frequency Hopping/Spread Spectrum Multiple Access System in a Selective Fading Channel
Hideya YAMAMURA Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1991/05/25
Vol. E74-B  No. 5  pp. 1145-1154
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF(678KB)

Information Security of Spread Spectrum Systems
Hideki IMAI Ryuji KOHNO Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/03/25
Vol. E74-A  No. 3  pp. 488-505
Type of Manuscript:  INVITED PAPER
Category: 
Keyword: 
 Summary | Full Text:PDF(1.5MB)

Recent Development of Cryptology in Japan
Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1026-1030
Type of Manuscript:  REVIEW PAPER
Category: 
Keyword: 
 Summary | Full Text:PDF(408.5KB)

A Prototype KPS and Its Application--IC Card Based Key Sharing and Cryptographic Communication--
Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI Minoru SASAKI Hiroharu YOSHIKAWA Shin-ichiro WATANABE 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1111-1119
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Applications
Keyword: 
 Summary | Full Text:PDF(769.1KB)

Connections among Several Versions of One-Way Hash Functions
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1092-1099
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Authentication Techniques
Keyword: 
 Summary | Full Text:PDF(772.7KB)

On Generating Cryptographically Desirable Substitutions
Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1031-1035
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Common-Key Systems
Keyword: 
 Summary | Full Text:PDF(403.6KB)

Several Theorems on Probabilistic Cryptosystems
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E  No. 7  pp. 819-827
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF(788.4KB)

Residuosity Problem and Its Applications to Cryptography
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E  No. 8  pp. 759-767
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF(809.3KB)

On Seeking Smart Public-Key-Distribution Systems
Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1986/02/25
Vol. E69-E  No. 2  pp. 99-106
Type of Manuscript:  PAPER
Category: Information and Communication Theory
Keyword: 
 Summary | Full Text:PDF(504.5KB)

A Cryptographically Useful Theorem on the Connection between Uni and Multivariate Polynomials
Tsutomu MATSUMOTO Hideki IMAI Hiroshi HARASHIMA Hiroshi MIYAKAWA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1985/03/25
Vol. E68-E  No. 3  pp. 139-146
Type of Manuscript:  PAPER
Category: Cryptography
Keyword: 
 Summary | Full Text:PDF(467.5KB)

Boolean-Function Representations of a Mapping
Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1982/06/25
Vol. E65-E  No. 6  pp. 337-344
Type of Manuscript:  PAPER
Category: Computers
Keyword: 
 Summary | Full Text:PDF(592.7KB)