Keisuke TANAKA


Generic Constructions for Fully Secure Revocable Attribute-Based Encryption
Kotoko YAMADA Nuttapong ATTRAPADUNG Keita EMURA Goichiro HANAOKA Keisuke TANAKA 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1456-1472
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
revocable attribute-based encryptionpair encodingidentity-based revocationdoubly spatial encryption
 Summary | Full Text:PDF(1.9MB)

Group Signature with Deniability: How to Disavow a Signature
Ai ISHIDA Keita EMURA Goichiro HANAOKA Yusuke SAKAI Keisuke TANAKA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1825-1837
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
group signaturedeniabilitynon-interactive zero-knowledge proofbilinear map
 Summary | Full Text:PDF(1.5MB)

Generic Transformation for Signatures in the Continual Leakage Model
Yuyu WANG Keisuke TANAKA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1857-1869
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
generic transformationstrong existential unforgeabilitycontinual leakage modelcontinuous leakage resilient chameleon hash function
 Summary | Full Text:PDF(623.4KB)

FOREWORD
Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6  pp. 1011-1011
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(201.9KB)

FOREWORD
Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/03/01
Vol. E99-D  No. 3  pp. 558-558
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(67.2KB)

Disavowable Public Key Encryption with Non-Interactive Opening
Ai ISHIDA Keita EMURA Goichiro HANAOKA Yusuke SAKAI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2446-2455
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryption with non-interactive openingdisavowabilitynon-interactive zero-knowledge proof
 Summary | Full Text:PDF(1.4MB)

Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
Eiichiro FUJISAKI Akinori KAWACHI Ryo NISHIMAKI Keisuke TANAKA Kenji YASUNAGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/03/01
Vol. E98-A  No. 3  pp. 853-862
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
post-challenge (bounded) leakagesimultaneous secret-key and sender-randomness leakageCCA2 security for multiple messages
 Summary | Full Text:PDF(864.8KB)

Randomness Leakage in the KEM/DEM Framework
Hitoshi NAMIKI Keisuke TANAKA Kenji YASUNAGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 191-199
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
leakage resilient cryptographypublic-key encryptionKEM/DEM frameworkhash proof system
 Summary | Full Text:PDF(739.8KB)

Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
Manh Ha NGUYEN Kenji YASUNAGA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1100-1111
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionhash proof systemkey-leakagechosen-ciphertext attack
 Summary | Full Text:PDF(766.6KB)

An Efficient Non-interactive Universally Composable String-Commitment Scheme
Ryo NISHIMAKI Eiichiro FUJISAKI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 167-175
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
universal composabilitycommitmentall-but-one trapdoor functionhomomorphic encryption
 Summary | Full Text:PDF(347.8KB)

A Multi-Trapdoor Commitment Scheme from the RSA Assumption
Ryo NISHIMAKI Eiichiro FUJISAKI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 176-184
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
non-interactive commitmentmulti-trapdoor commitmentnon-malleabilityRSA assumptionweak signature
 Summary | Full Text:PDF(333.1KB)

Information-Theoretic Secrecy with Access to Decryption Oracles
Christopher PORTMANN Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/07/01
Vol. E94-A  No. 7  pp. 1585-1590
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographyinformation-theoretic securityencryption schemedecryption oracle
 Summary | Full Text:PDF(101.6KB)

Key Generation for Fast Inversion of the Paillier Encryption Function
Takato HIRANO Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1111-1121
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
Paillier's encryption functionkey generationinversionRSAChinese remainder theorem
 Summary | Full Text:PDF(388.9KB)

A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI Koichiro WADA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 42-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
secret sharinggame theoryfairnessRSAOAEP
 Summary | Full Text:PDF(201.3KB)

Primitive Power Roots of Unity and Its Application to Encryption
Takato HIRANO Koichiro WADA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1836-1844
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
Paillier's encryption schemefactoringhomomorphismpower roots of unity
 Summary | Full Text:PDF(254.4KB)

Symmetricity of the Protocols Related to Oblivious Transfer
Daisuke INOUE Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 217-221
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious transferstrong conditional oblivious transfersymmetricity
 Summary | Full Text:PDF(123.4KB)

Conditional Converge Cast
Daisuke INOUE Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/06/01
Vol. E91-A  No. 6  pp. 1537-1540
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
oblivious transferoblivious castconverge cast
 Summary | Full Text:PDF(84.7KB)

A Cramer-Shoup Variant Related to the Quadratic Residuosity Problem
Harunaga HIWATARI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 203-205
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
encryptionsemantically securequadratic residuosity
 Summary | Full Text:PDF(77.7KB)

Schemes for Encryption with Anonymity and Ring Signature
Ryotaro HAYASHI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
encryptionring signaturekey-privacyanonymity
 Summary | Full Text:PDF(171.1KB)

Shuffle for Paillier's Encryption Scheme
Takao ONODERA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1241-1248
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Paillier's encryption schemezero-knowledge proofshuffle
 Summary | Full Text:PDF(168.2KB)

Density Attack to the Knapsack Cryptosystems with Enumerative Source Encoding
Keiji OMURA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/06/01
Vol. E87-A  No. 6  pp. 1564-1569
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
knapsack cryptosystemlow-density attackenumerative source encodingLLL algorithm
 Summary | Full Text:PDF(198KB)

An Efficient Anonymous Group Identification Scheme with Short Secret Keys
Toshiyuki ISSHIKI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/03/01
Vol. E87-A  No. 3  pp. 757-760
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
group identificationanonymityprotocoldiscrete logarithm
 Summary | Full Text:PDF(89KB)

Single Machine Scheduling to Minimize the Maximum Lateness with Both Specific and Generalized Due Dates
Keisuke TANAKA Milan VLACH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/03/25
Vol. E80-A  No. 3  pp. 557-563
Type of Manuscript:  Special Section PAPER (Special Section of Selected Papers from the 9th Karuizawa Workshop on Circuits and Systems)
Category: 
Keyword: 
single machine schedulinglatenessNP-hardness
 Summary | Full Text:PDF(518.5KB)

A Relationship between the Number of Negations and the Circuit Size
Keisuke TANAKA Tetsuro NISHINO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1996/09/25
Vol. E79-D  No. 9  pp. 1355-1357
Type of Manuscript:  LETTER
Category: Algorithm and Computational Complexity
Keyword: 
computational complexitytheory of computation
 Summary | Full Text:PDF(216.9KB)

On the Negation-Limited Circuit Complexity of Clique Functions
Tetsuro NISHINO Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1995/01/25
Vol. E78-D  No. 1  pp. 86-89
Type of Manuscript:  LETTER
Category: Algorithm and Computational Complexity
Keyword: 
computational complexityboolean circuitclique function
 Summary | Full Text:PDF(217.4KB)