Keyword : provable security


Meeting Tight Security for Multisignatures in the Plain Public Key Model
Naoto YANAI 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9 ; pp. 1484-1493
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
multisignaturesplain public key modelprovable securitytight reductionrandom oracle modelCDH problem
 Summary | Full Text:PDF(690.6KB)

A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications
Shoichi HIROSE Hidenori KUWAKADO Hirotaka YOSHIDA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 110-118
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
compression functionMACprovable securitypseudorandom functionvector-input PRF
 Summary | Full Text:PDF(959.2KB)

Tighter Reductions for Deterministic Identity-Based Signatures
Naoto YANAI Toru FUJIWARA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1 ; pp. 64-76
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
identity-based signaturesdeterministic identity-based signaturesprovable securityCDH problemrandom oracle modeltight reduction
 Summary | Full Text:PDF(874KB)

Provably Secure Structured Signature Schemes with Tighter Reductions
Naoto YANAI Tomoya IWASAKI Masaki INAMURA Keiichi IWAMURA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9 ; pp. 1870-1881
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
structured signaturesidentity-based structured signaturesprovable securityCDH problemrandom oracle modeltight reduction
 Summary | Full Text:PDF(1008.4KB)

Simple Anonymous Password-Based Authenticated Key Exchange (SAPAKE), Reconsidered
SeongHan SHIN Kazukuni KOBARA 
Publication:   
Publication Date: 2017/02/01
Vol. E100-A  No. 2 ; pp. 639-652
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
passwordauthenticationanonymityprovable security
 Summary | Full Text:PDF(926.7KB)

Cryptanalysis and Improvement of a Provably Secure RFID Ownership Transfer Protocol
Daisuke MORIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1 ; pp. 130-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RFIDauthenticationownership transferprovable security
 Summary | Full Text:PDF(233.4KB)

A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem
Shinsuke HAMASHO Yasuyuki MURAKAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 298-299
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
subset sum problemprovable securityattack
 Summary | Full Text:PDF(72.3KB)

Provable Security against Cryptanalysis with Impossible Differentials
Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 233-236
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
impossible differentialcryptanalysis with impossible differentialsdifferential cryptanalysisprovable securityMarkov cipher
 Summary | Full Text:PDF(78.1KB)

Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions
Bernardo MACHADO DAVID Anderson C.A. NASCIMENTO Rafael T. DE SOUSA, JR. 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/11/01
Vol. E95-A  No. 11 ; pp. 2059-2066
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
oblivious transferMcEliece assumptionsprovable securitypost quantum cryptographycryptography
 Summary | Full Text:PDF(338.7KB)

Collision Resistance of Hash Functions in a Weak Ideal Cipher Model
Shoichi HIROSE Hidenori KUWAKADO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1 ; pp. 252-255
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
hash functionprovable securitycollision resistance
 Summary | Full Text:PDF(98.2KB)

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11 ; pp. 2095-2110
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
password-authenticated key exchangepasswordson-line/off-line dictionary attacksanonymityinsider attacksprovable security
 Summary | Full Text:PDF(693.9KB)

Efficient Convertible Undeniable Signatures with Delegatable Verification
Jacob C. N. SCHULDT Kanta MATSUURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 71-83
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Identification
Keyword: 
undeniable signaturesuniversal/selective convertibilityprovable security
 Summary | Full Text:PDF(428.3KB)

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 102-115
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attackspassword-authenticated key exchangeanonymityefficiencyprovable security
 Summary | Full Text:PDF(452.8KB)

New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model
Le Trieu PHONG Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1822-1835
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
blind HIBEidentity-based blind signatureblind decryptionprovable securitystandard model
 Summary | Full Text:PDF(440.4KB)

Leaky Random Oracle
Kazuki YONEYAMA Satoshi MIYAGAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1795-1807
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
hash functionrandom oracle modelstandard modelprovable securityleakage
 Summary | Full Text:PDF(257.5KB)

A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/11/01
Vol. E91-A  No. 11 ; pp. 3312-3324
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password authenticationkey exchangePAKEanonymityprovable security
 Summary | Full Text:PDF(402.8KB)

Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
Jongsung KIM Changhoon LEE Jaechul SUNG Seokhie HONG Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10 ; pp. 3047-3058
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
provable securitydifferential cryptanalysislinear cryptanalysisFeistelCLEFIAMISTY
 Summary | Full Text:PDF(320.7KB)

RSA-Based Password-Authenticated Key Exchange, Revisited
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1424-1438
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Key Management
Keyword: 
password authenticationkey exchangeRSAon-line/off-line attackse-residue attacksprovable security
 Summary | Full Text:PDF(408KB)

Security of the Five-Round KASUMI Type Permutation
Tetsu IWATA Tohru YAGI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 30-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
blockcipherKASUMIadaptive chosen plaintext and chosen ciphertext attacksprovable security
 Summary | Full Text:PDF(262.5KB)

A Secure Authenticated Key Exchange Protocol for Credential Services
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 139-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
password authenticationkey exchangeleakage of stored secretsroaming protocolpassword-enabled PKIcredential servicesprovable security
 Summary | Full Text:PDF(266.1KB)

Provably Secure Untraceable Electronic Cash against Insider Attacks
Yoshikazu HANATANI Yuichi KOMANO Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5 ; pp. 980-991
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
blind multisignatureelectronic cashprovable securityrandom oracle modelinsider attacks
 Summary | Full Text:PDF(279.5KB)

A Study of Blind Message Authentication Codes
Chanathip NAMPREMPRE Gregory NEVEN Michel ABDALLA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 75-82
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
provable securityblind signaturesblind MACs
 Summary | Full Text:PDF(204.7KB)

PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis
Wonil LEE Mridul NANDI Palash SARKAR Donghoon CHANG Sangjin LEE Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 39-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
hash functionblock cipherblack-box modelprovable security
 Summary | Full Text:PDF(266KB)

Provably Secure Three-Party Password-Authenticated Key Exchange
Chun-Li LIN Hsiang-An WEN Tzonelih HWANG Hung-Min SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/11/01
Vol. E87-A  No. 11 ; pp. 2990-3000
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographypassworddictionary attackauthenticationkey exchangeprovable security
 Summary | Full Text:PDF(369.5KB)

A Fast Signature Scheme with New On-line Computation
Takeshi OKAMOTO Hirofumi KATSUNO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1154-1161
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital signatureon-line computationrandom oracle modelprovable security
 Summary | Full Text:PDF(187KB)

On the Pseudorandomness of KASUMI Type Permutations
Tetsu IWATA Tohru YAGI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1098-1109
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyblock cipherKASUMIpseudorandomnessprovable security
 Summary | Full Text:PDF(296.6KB)

On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1110-1118
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyf 8f 9modes of operationprovable securityblock cipherpseudorandom permutation
 Summary | Full Text:PDF(211.8KB)

TMAC: Two-Key CBC MAC
Kaoru KUROSAWA Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 46-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyCBC MACblock cipherprovable security
 Summary | Full Text:PDF(277.9KB)

Semantically Secure McEliece Public-Key Cryptosystem
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 74-83
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
McEliece public-key cryptosystemsemantic securityprovable securityconversioncoding theory
 Summary | Full Text:PDF(258.1KB)

A Signature Scheme with Message Recovery as Secure as Discrete Logarithm
Masayuki ABE Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 197-204
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signature with message recoveryrandom oracle modelconcrete security analysisprovable securityelliptic curve cryptosystem
 Summary | Full Text:PDF(227.2KB)

Multi-Signature Schemes Secure against Active Insider Attacks
Kazuo OHTA Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 21-31
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signatureFiat-Shamir schemeSchnorr schemerandom oracle modelzero-knowledge interactive proofprovable security
 Summary | Full Text:PDF(219.6KB)

On a Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis
Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1 ; pp. 117-122
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherdifferential cryptanalysislinear cryptanalysisprovable security
 Summary | Full Text:PDF(198.6KB)

A New Approach to Constructing a Provably Secure Variant of Schnorr's Identification Scheme
Satoshi HADA Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/09/25
Vol. E78-A  No. 9 ; pp. 1154-1159
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
interactive identification schemeprovable securitySchnorr's schemeOkamoto's scheme
 Summary | Full Text:PDF(472.6KB)