Keyword : anonymity


Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered
SeongHan SHIN Kazukuni KOBARA 
Publication:   
Publication Date: 2017/02/01
Vol. E100-A  No. 2 ; pp. 639-652
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
passwordauthenticationanonymityprovable security
 Summary | Full Text:PDF(926.7KB)

Average-Case Analysis of Certificate Revocation in Combinatorial Certificate Management Schemes
Dae Hyun YUM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/02/01
Vol. E99-A  No. 2 ; pp. 663-665
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key infrastructureprivacyanonymitycombinatorial certificate schemecertificate revocation
 Summary | Full Text:PDF(78.9KB)

Randomized Certificate Replacement with Bounded Collateral Damage
Dae Hyun YUM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/11/01
Vol. E98-D  No. 11 ; pp. 1990-1993
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
PKIprivacyanonymitycertificate revocation
 Summary | Full Text:PDF(86.4KB)

On Unlinkability of Password-Based Anonymous Authentication
SeongHan SHIN Kazukuni KOBARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/06/01
Vol. E98-A  No. 6 ; pp. 1320-1324
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
passwordauthenticationanonymityISO/IEC 20009-4unlinkability
 Summary | Full Text:PDF(95KB)

On the Probability of Certificate Revocation in Combinatorial Certificate Management Schemes
Dae Hyun YUM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/05/01
Vol. E98-D  No. 5 ; pp. 1104-1107
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
vehicular communicationspublic key infrastructureprivacyanonymitycertificate revocation
 Summary | Full Text:PDF(78.6KB)

RFID Authentication with Un-Traceability and Forward Secrecy in the Partial-Distributed-Server Model
Hung-Yu CHIEN Tzong-Chen WU Chien-Lung HSU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2015/04/01
Vol. E98-D  No. 4 ; pp. 750-759
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security―Against Cyberattacks―)
Category: 
Keyword: 
authenticationRFIDanonymitydistributed serverserror correction code
 Summary | Full Text:PDF(1.6MB)

Revocable Group Signatures with Compact Revocation List Using Accumulators
Toru NAKANISHI Nobuo FUNABIKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 117-131
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
anonymitygroup signaturesrevocationsaccumulators
 Summary | Full Text:PDF(635KB)

Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/01/01
Vol. E98-B  No. 1 ; pp. 160-170
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationkey exchangeauthenticationanonymitycommunication binding property
 Summary | Full Text:PDF(762.6KB) | Errata[Uploaded on May 15,2015]

Key-Private Proxy Re-Encryption from Lattices, Revisited
Ryo NISHIMAKI Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 100-116
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
proxy re-encryptionkey privacyanonymitylattices
 Summary | Full Text:PDF(616.6KB)

An Anonymous Reputation System with Reputation Secrecy for Manager
Toru NAKANISHI Nobuo FUNABIKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12 ; pp. 2325-2335
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
reputation systemanonymityanonymous credentialspairings
 Summary | Full Text:PDF(568.9KB)

Weakened Anonymity of Group Signature and Its Application to Subscription Services
Kazuto OGAWA Go OHTAKE Arisa FUJII Goichiro HANAOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1240-1258
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
subscription serviceanonymitylinkabilityunlinkabilitygroup signature
 Summary | Full Text:PDF(1.2MB)

Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System
Nasima BEGUM Toru NAKANISHI Nobuo FUNABIKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2422-2433
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
anonymityanonymous credentialsattributesCNF formulas
 Summary | Full Text:PDF(878.9KB)

A New Privacy-Enhanced Matchmaking Protocol
Ji Sun SHIN Virgil D. GLIGOR 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/08/01
Vol. E96-B  No. 8 ; pp. 2049-2059
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
anonymityforward privacyoff-line dictionary attackson-line matchmakingprivacy
 Summary | Full Text:PDF(807.9KB) | Errata[Uploaded on March 1,2016]

Cryptanalysis of a Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environments
Debiao HE Hao HU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/01/01
Vol. E96-D  No. 1 ; pp. 138-140
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
authentication schememulti-server environmentdynamic ID-basedanonymity
 Summary | Full Text:PDF(60.5KB)

Anonymous Authentication Scheme without Verification Table for Wireless Environments
Ryoichi ISAWA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2488-2492
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
anonymityauthenticationsecuritywireless communication
 Summary | Full Text:PDF(92.8KB)

An Enhanced Secure Authentication Scheme with Anonymity for Wireless Environments
Woongryul JEON Jeeyeon KIM Junghyun NAM Youngsook LEE Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/07/01
Vol. E95-B  No. 7 ; pp. 2505-2508
Type of Manuscript:  LETTER
Category: Terrestrial Wireless Communication/Broadcasting Technologies
Keyword: 
wireless communicationanonymityuser authenticationpassword guessing attack
 Summary | Full Text:PDF(201.3KB)

Cryptanalysis of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1687-1689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisauthenticationanonymitywireless communicationssecurity
 Summary | Full Text:PDF(61.1KB)

A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/05/01
Vol. E95-B  No. 5 ; pp. 1819-1821
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationauthenticationanonymitytraceabilitysmart card
 Summary | Full Text:PDF(212.6KB)

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Hu XIONG Xiaofeng WANG Fagen LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 256-258
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
wireless communicationuser authenticationanonymitycryptanalysis
 Summary | Full Text:PDF(63.3KB)

Undeniable and Unpretendable Signatures
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 138-150
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Authentication
Keyword: 
anonymityundeniable signaturesselective/all conversionunpretendable signaturesanonymous auction
 Summary | Full Text:PDF(406.7KB)

JXTAnonym: An Anonymity Layer for JXTA Services Messaging
Marc DOMINGO-PRIETO Joan ARNEDO-MORENO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 169-176
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
peer-to-peersecurityanonymityJXTAJavaonion routing
 Summary | Full Text:PDF(261.6KB)

Recipients' Anonymity in Multihop Ad-Hoc Networks
Helena RIFA-POUS Emmanouil A. PANAOUSIS Christos POLITIS 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 181-184
Type of Manuscript:  Special Section LETTER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
anonymitycryptographyscalabilityad-hoc network
 Summary | Full Text:PDF(137.6KB)

A Privacy-Preserving Dynamic ID-Based Remote User Authentication Scheme with Access Control for Multi-Server Environment
Min-Hua SHAO Ying-Chih CHIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 161-168
Type of Manuscript:  Special Section PAPER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
anonymitysingle registrationkey agreementsmart cardsecurity
 Summary | Full Text:PDF(870.1KB)

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2095-2110
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
password-authenticated key exchangepasswordson-line/off-line dictionary attacksanonymityinsider attacksprovable security
 Summary | Full Text:PDF(693.9KB)

Improved User Authentication Scheme with User Anonymity for Wireless Communications
Miyoung KANG Hyun Sook RHEE Jin-Young CHOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2 ; pp. 860-864
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
authenticationanonymitywireless communications
 Summary | Full Text:PDF(81.3KB)

An Enhanced User Authentication Scheme for Wireless Communications
Xinchun CUI Xiaolin QIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/01/01
Vol. E94-D  No. 1 ; pp. 155-157
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
user authenticationanonymitywireless communications
 Summary | Full Text:PDF(55.4KB)

Forward-Secure Group Signatures from Pairings
Toru NAKANISHI Yuta HIRA Nobuo FUNABIKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 2007-2016
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
anonymitygroup signaturesforward-securitypairings
 Summary | Full Text:PDF(441.3KB)

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka KAWAI Shotaro TANNO Takahiro KONDO Kazuki YONEYAMA Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6 ; pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret handshake with multiple groupsprivacy preserving authenticationanonymitymonotone condition
 Summary | Full Text:PDF(1.3MB)

Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Toru NAKANISHI Hiroki FUJII Yuta HIRA Nobuo FUNABIKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 50-62
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
anonymitygroup signaturesrevocationspairings
 Summary | Full Text:PDF(286KB)

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 102-115
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attackspassword-authenticated key exchangeanonymityefficiencyprovable security
 Summary | Full Text:PDF(452.8KB)

Analysis of Revocable-iff-Linked Ring Signature Scheme
Ik Rae JEONG Jeong Ok KWON Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 322-325
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
ring signatureanonymitylinkabilityrevocability
 Summary | Full Text:PDF(88KB)

Anonymous Identity Based Encryption with Plaintext Awareness in the Two Identities Setting
Changlu LIN Yong LI Qiupu ZHANG Dingfeng YE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/12/01
Vol. E91-A  No. 12 ; pp. 3828-3832
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
anonymityidentity based encryptionrandom oracle model
 Summary | Full Text:PDF(104.7KB)

A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/11/01
Vol. E91-A  No. 11 ; pp. 3312-3324
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password authenticationkey exchangePAKEanonymityprovable security
 Summary | Full Text:PDF(402.8KB)

Analysis and Improvement of an Anonymity Scheme for P2P Reputation Systems
Li-ming HAO Song-nian LU Shu-tang YANG Ning LIU Qi-shan HUANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10 ; pp. 2893-2895
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
anonymityblind signatureunlinkabilityPeer-to-Peer (P2P) reputation system
 Summary | Full Text:PDF(107.3KB)

On Backward-Style Anonymity Verification
Yoshinobu KAWABE Ken MANO Hideki SAKURADA Yasuyuki TSUKADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2597-2606
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
formal methodsanonymitysoftware securityverificationtheorem-proving
 Summary | Full Text:PDF(667.2KB)

An Adversary Model for Simulation-Based Anonymity Proof
Yoshinobu KAWABE Hideki SAKURADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/04/01
Vol. E91-A  No. 4 ; pp. 1112-1120
Type of Manuscript:  Special Section PAPER (Special Section on Selected Papers from the 20th Workshop on Circuits and Systems in Karuizawa)
Category: 
Keyword: 
formal methodsanonymitysoftware securityverificationtheorem-proving
 Summary | Full Text:PDF(209.4KB)

On the Definitions of Anonymity for Ring Signatures
Miyako OHKUBO Masayuki ABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 272-282
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Security Notions
Keyword: 
ring signatureanonymitylinkability
 Summary | Full Text:PDF(213.9KB)

A Flexible Personal Data Disclosure Method Based on Anonymity Quantification
Miyuki IMADA Masakatsu OHTA Mitsuo TERAMOTO Masayasu YAMAGUCHI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/12/01
Vol. E90-B  No. 12 ; pp. 3460-3469
Type of Manuscript:  Special Section PAPER (Special Section on Ubiquitous Sensor Networks)
Category: 
Keyword: 
privacy protectiondata miningentropyanonymitycrime-information-sharing service
 Summary | Full Text:PDF(1MB)

Extension of Broadcasting Service by Using Electronic Tokens
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11 ; pp. 1741-1750
Type of Manuscript:  PAPER
Category: Contents Technology and Web Information Systems
Keyword: 
content distributiontokenanonymitygroup signatureprivacy preservation
 Summary | Full Text:PDF(470.5KB)

Anonymous P2P Web Browse History Sharing for Web Page Recommendation
Makoto IGUCHI Shigeki GOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/09/01
Vol. E90-D  No. 9 ; pp. 1343-1353
Type of Manuscript:  Special Section PAPER (Special Section on Software Agent and Its Applications)
Category: 
Keyword: 
webuser profileinformation retrievalanonymityp2p network
 Summary | Full Text:PDF(518.1KB)

A Provably Secure Refreshable Partially Anonymous Token and Its Applications
Rie SHIGETOMI Akira OTSUKA Jun FURUKAWA Keith MARTIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1396-1406
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymous credentialrefreshable tokensanonymityprivacy protection
 Summary | Full Text:PDF(280KB)

Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions
Masayuki ABE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 99-105
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
Mix-netanonymitychosen-ciphertext attackssecurity notion
 Summary | Full Text:PDF(152.8KB)

Schemes for Encryption with Anonymity and Ring Signature
Ryotaro HAYASHI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
encryptionring signaturekey-privacyanonymity
 Summary | Full Text:PDF(171.1KB)

A License Management Protocol for Protecting User Privacy and Digital Contents in Digital Rights Management Systems
Bok-Nyong PARK Wonjun LEE Jae-Won KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/08/01
Vol. E88-D  No. 8 ; pp. 1958-1965
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
DRMlicense management protocolprivacyanonymityaliaspublic-key cryptosystem
 Summary | Full Text:PDF(715.4KB)

Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext
Koji CHIDA Masayuki ABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 211-221
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
Mix-netHybrid MixOnion Routinganonymity
 Summary | Full Text:PDF(328.9KB)

An Efficient Anonymous Group Identification Scheme with Short Secret Keys
Toshiyuki ISSHIKI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/03/01
Vol. E87-A  No. 3 ; pp. 757-760
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
group identificationanonymityprotocoldiscrete logarithm
 Summary | Full Text:PDF(89KB)

Design of a Mobility Protocol Framework to Support Multiple Namespaces
Masahiro ISHIYAMA Kensuke YASUMA Mitsunobu KUNISHI Michimune KOHNO Fumio TERAOKA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/03/01
Vol. E87-B  No. 3 ; pp. 453-461
Type of Manuscript:  Special Section PAPER (Special Section on Internet Technology IV)
Category: Mobile Networking
Keyword: 
mobile computingnode mobilityanonymityIPv6
 Summary | Full Text:PDF(494.3KB)

Analysis and Design for Private Message Board Systems
Kenji IMAMOTO Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 204-211
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
message boardcertified e-mailprivacyanonymitynotice boardSend-and-Forget
 Summary | Full Text:PDF(232.7KB)

A Distributed Sign-and-Encryption for Anonymity
DongJin KWAK SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 228-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritysignaturegroup signaturesigncryptionanonymity
 Summary | Full Text:PDF(131.7KB)

Randomization Enhanced Blind Signature Schemes Based on RSA
Moonsang KWON Yookun CHO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/03/01
Vol. E86-A  No. 3 ; pp. 730-733
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
blind signature schemeanonymitychosen-plaintext attackrandomization
 Summary | Full Text:PDF(144.8KB)

A Practical English Auction with Simple Revocation
Kazumasa OMOTE Atsuko MIYAJI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5 ; pp. 1054-1061
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymitysignature of knowledgebulletin board
 Summary | Full Text:PDF(300.6KB)

(M+1)st-Price Auction Protocol
Hiroaki KIKUCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/03/01
Vol. E85-A  No. 3 ; pp. 676-683
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
electronic auctionanonymitysecret multiparty computation
 Summary | Full Text:PDF(205.5KB)

A Scheme of Secret Communication Using Internet Control Message Protocol
Masataka SUZUKI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 181-189
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
InternetICMPIP spoofingsecret communicationsteganographyanonymity
 Summary | Full Text:PDF(621.9KB)

Rivulet: An Anonymous Communication Method Based on Group Communication
Daisuke INOUE Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 94-101
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
anonymous communicationgroup communicationanonymitymulticasting
 Summary | Full Text:PDF(513.2KB)

Multi-Round Anonymous Auction Protocols
Hiroaki KIKUCHI Michael HAKAVY Doug TYGAR 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1999/04/25
Vol. E82-D  No. 4 ; pp. 769-777
Type of Manuscript:  Special Section PAPER (Special Issue on Internet Technology and Its Applications)
Category: 
Keyword: 
auctionmultiparty computationanonymitycommunication cost
 Summary | Full Text:PDF(226.3KB)

Anonymous Public Key Certificates and their Applications
Kazuomi OISHI Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 56-64
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public key certificatesone-time certificatesanonymityunlinkability
 Summary | Full Text:PDF(816.5KB)

Communicative Characteristics of Small Group Teleconferences in Virtual Environments
Atsuya YOSHIDA Jun KAKUTA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1994/12/25
Vol. E77-D  No. 12 ; pp. 1385-1389
Type of Manuscript:  Special Section PAPER (Special Issue on Networked Reality)
Category: 
Keyword: 
computer-mediated communicationvisual keyboard conferenceHabitaton-line virtual environmentuser behaviorutteranceelectronic personalityanonymity
 Summary | Full Text:PDF(532KB)

Electronic Voting Scheme Allowing Open Objection to the Tally
Kazue SAKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 24-30
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic votinganonymityprivacycryptographic protocol
 Summary | Full Text:PDF(507.1KB)