Eiichiro FUJISAKI


A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
Kaisei KAJITA Kazuto OGAWA Eiichiro FUJISAKI 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 141-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signatureCDH assumptiontrapdoor commitmenttight security reduction
 Summary | Full Text:PDF(1MB)

Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
Eiichiro FUJISAKI Akinori KAWACHI Ryo NISHIMAKI Keisuke TANAKA Kenji YASUNAGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/03/01
Vol. E98-A  No. 3  pp. 853-862
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
post-challenge (bounded) leakagesimultaneous secret-key and sender-randomness leakageCCA2 security for multiple messages
 Summary | Full Text:PDF(864.8KB)

Non-malleable Multiple Public-Key Encryption
Atsushi FUJIOKA Eiichiro FUJISAKI Keita XAGAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1318-1334
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Multiple public-key encryptionNon-malleabilityAdversarially chosen public-key attacksThreshold public-key encryptionand Completely non-malleable public-key encryption.
 Summary | Full Text:PDF(715.9KB)

An Efficient Non-interactive Universally Composable String-Commitment Scheme
Ryo NISHIMAKI Eiichiro FUJISAKI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 167-175
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
universal composabilitycommitmentall-but-one trapdoor functionhomomorphic encryption
 Summary | Full Text:PDF(347.8KB)

Sub-Linear Size Traceable Ring Signatures without Random Oracles
Eiichiro FUJISAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 151-166
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Authentication
Keyword: 
traceable ring signaturesub-linear size ring signaturelinkable ring signatureGroth-Sahai proofs
 Summary | Full Text:PDF(339.3KB)

A Multi-Trapdoor Commitment Scheme from the RSA Assumption
Ryo NISHIMAKI Eiichiro FUJISAKI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 176-184
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
non-interactive commitmentmulti-trapdoor commitmentnon-malleabilityRSA assumptionweak signature
 Summary | Full Text:PDF(333.1KB)

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang CUI Eiichiro FUJISAKI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 53-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
identity based encryptiondigital signaturesecurity notions
 Summary | Full Text:PDF(449.3KB)

Traceable Ring Signature
Eiichiro FUJISAKI Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 83-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
ring signaturetraceabilitysecurity model
 Summary | Full Text:PDF(234KB)

Security of ESIGN-PSS
Tetsutaro KOBAYASHI Eiichiro FUJISAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/07/01
Vol. E90-A  No. 7  pp. 1395-1405
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
ESIGNPSS encodingAER assumptionexistential unforgeability against chosen-message attack (CMA security)
 Summary | Full Text:PDF(265.5KB)

Plaintext Simulatability
Eiichiro FUJISAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 55-65
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
plaintext simulatabilityplaintext awarenesschosen-ciphertext security (CCA2-security)Dolev-Dwork-Naor's encryption schemeCCA2-secure encryption scheme without overhead
 Summary | Full Text:PDF(179.4KB)

A Simple Approach to Secretly Sharing a Factoring Witness in a Publicly-Verifiable Manner
Eiichiro FUJISAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5  pp. 1041-1049
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
publicly verifiable secret sharing (PVSS)integer commitment scheme on a group with hidden orderfair-cryptosystem
 Summary | Full Text:PDF(285.1KB)

A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring
Eiichiro FUJISAKI Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 179-187
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
chosen-cipher securityfactoringrandom oracleexact security
 Summary | Full Text:PDF(265.5KB)

How to Enhance the Security of Public-Key Encryption at Minimum Cost
Eiichiro FUJISAKI Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 24-32
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
indistinguishabilitychosen-plaintext attackadaptive chosen-ciphertext attackrandom oracle model
 Summary | Full Text:PDF(362.7KB)

Statistical Zero-Knowledge Protocols to Prove Modular Polynomial Relations
Eiichiro FUJISAKI Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 81-92
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
bit commitmentstatistical zero-knowledgeargument of knowledge
 Summary | Full Text:PDF(249.3KB)

Practical Escrow Cash Schemes
Eiichiro FUJISAKI Tatsuaki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 11-19
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
escrowtrusteeelectronic cashmoney launderingextortion crime
 Summary | Full Text:PDF(751.4KB)