Keyword : standard model


Convertible Nominative Signatures from Standard Assumptions without Random Oracles
Goichiro HANAOKA Jacob SCHULDT 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6 ; pp. 1107-1121
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
user certificationnominative signaturesstandard model
 Summary | Full Text:PDF(570.7KB)

Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model
Xiaoming HU Yinchun YANG Jian WANG Huajie XU Wenan TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 758-761
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographysecurity analysisID-based proxy signaturestandard model
 Summary | Full Text:PDF(97.1KB)

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6 ; pp. 1345-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangetripartite key exchangestandard modeldual-receiver encryption
 Summary | Full Text:PDF(347.1KB)

Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru KUROSAWA Ryo NOJIMA Le Trieu PHONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 215-224
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
selectively convertible undeniable signaturesverifiable random functionstandard model
 Summary | Full Text:PDF(655.2KB)

On the Security of an Identity-Based Proxy Signature Scheme in the Standard Model
Ying SUN Yong YU Xiaosong ZHANG Jiwen CHAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/03/01
Vol. E96-A  No. 3 ; pp. 721-723
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy signatureidentity-based cryptographystandard model
 Summary | Full Text:PDF(72.6KB)

Analysis of an Identity-Based Signcryption Scheme in the Standard Model
Fagen LI Yongjian LIAO Zhiguang QIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 268-269
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyidentity-based signcryptionstandard modelattack
 Summary | Full Text:PDF(78.7KB)

New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1 ; pp. 63-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
RSAundeniable signatureselective/all conversionstandard model
 Summary | Full Text:PDF(284.6KB)

New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model
Le Trieu PHONG Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1822-1835
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
blind HIBEidentity-based blind signatureblind decryptionprovable securitystandard model
 Summary | Full Text:PDF(440.4KB)

Leaky Random Oracle
Kazuki YONEYAMA Satoshi MIYAGAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 1795-1807
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
hash functionrandom oracle modelstandard modelprovable securityleakage
 Summary | Full Text:PDF(257.5KB)

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA Nuttapong ATTRAPADUNG Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1466-1476
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
digital signaturestrong unforgeabilitytarget collision resistant hash functionstandard model
 Summary | Full Text:PDF(335.9KB)

General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
Isamu TERANISHI Takuro OYAMA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 94-106
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
signature schemestrong unforgeabilitystandard modelchameleon commitmentchosen message security
 Summary | Full Text:PDF(283.6KB)

Relationship between Standard Model Plaintext Awareness and Message Hiding
Isamu TERANISHI Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 244-261
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Security Notions
Keyword: 
plaintext awarenessstandard model
 Summary | Full Text:PDF(324.8KB)

On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme
Le Trieu PHONG Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 226-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
hybrid encryptionstandard modelDDH assumptionIND-CCA
 Summary | Full Text:PDF(99KB)

k-Resilient Identity-Based Encryption in the Standard Model
Swee-Huay HENG Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 39-46
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
identity-based encryptionstandard model
 Summary | Full Text:PDF(164.2KB)

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A  No. 3 ; pp. 736-754
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
entropy of passwordson-line and off-line attacksauthenticationkey establishment protocolleakage of stored secretsproactive securityDDH problemstandard model
 Summary | Full Text:PDF(524.8KB)

Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10 ; pp. 2229-2237
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
entropy of passwordskey exchangeauthenticationDDH problemstandard model
 Summary | Full Text:PDF(271.4KB)