Keyword : unconditional security


Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage
Yohei WATANABE Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6 ; pp. 1097-1106
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
broadcast encryptionkey predistribution systemsinformation theoretic securityunconditional security
 Summary | Full Text:PDF(578.2KB)

Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing
Ryo KIKUCHI Dai IKARASHI Koki HAMADA Koji CHIDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 223-231
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundation
Keyword: 
secret sharing schememultiparty computationunconditional securityactive securityhonest majority
 Summary | Full Text:PDF(848.4KB)

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael DOWSLEY Jorn MULLER-QUADE Akira OTSUKA Goichiro HANAOKA Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2 ; pp. 725-734
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
verifiable secret sharingdishonest majoritypre-distributed dataunconditional securityuniversal composable
 Summary | Full Text:PDF(553.4KB)

Security Proof of Quantum Key Distribution
Kiyoshi TAMAKI Toyohiro TSURUMARU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/05/01
Vol. E93-A  No. 5 ; pp. 880-888
Type of Manuscript:  INVITED PAPER (Special Section on Leading-Edge Developments in Quantum Cryptographic Systems)
Category: 
Keyword: 
unconditional securityone-time padquantum key distributiontrojan horse attack
 Summary | Full Text:PDF(371.5KB)

Changes to Quantum Cryptography
Yasuyuki SAKAI Hidema TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/05/01
Vol. E93-A  No. 5 ; pp. 872-879
Type of Manuscript:  INVITED PAPER (Special Section on Leading-Edge Developments in Quantum Cryptographic Systems)
Category: 
Keyword: 
modern cryptographyquantum key distributionunconditional security
 Summary | Full Text:PDF(346.6KB)

Unconditionally Secure Group Signatures
Takenobu SEITO Yuki HARA Junji SHIKATA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 2067-2085
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
group signatureinformation-theoretic securityunconditional security
 Summary | Full Text:PDF(337.6KB)

Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions
Yumiko HANAOKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10 ; pp. 2521-2532
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
key exposurekey-insulated encryptionunconditional security
 Summary | Full Text:PDF(292.7KB)

The Role of Arbiters for Unconditionally Secure Authentication
Goichiro HANAOKA Junji SHIKATA Yumiko HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1132-1140
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authentication codearbiterunconditional security
 Summary | Full Text:PDF(212.8KB)

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF(293.6KB)

Efficient Unconditionally Secure Digital Signatures
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 120-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
digital signatureunconditional security
 Summary | Full Text:PDF(325.1KB)

A Traitor Traceable Conference System with Dynamic Sender
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 167-174
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor traceable schemeauthentication schemedynamic senderunconditional security
 Summary | Full Text:PDF(252.6KB)