Kazuki YONEYAMA


Verification of LINE Encryption Version 1.0 Using ProVerif
Cheng SHI Kazuki YONEYAMA 
Publication:   
Publication Date: 2019/08/01
Vol. E102-D  No. 8  pp. 1439-1448
Type of Manuscript:  Special Section PAPER (Special Section on Formal Approaches)
Category: 
Keyword: 
formal methodsend-to-end encryptionLINE EncryptionProVerif
 Summary | Full Text:PDF

Exposure-Resilient Identity-Based Dynamic Multi-Cast Key Distribution
Kazuki YONEYAMA Reo YOSHIDA Yuto KAWAHARA Tetsutaro KOBAYASHI Hitoshi FUJI Tomohide YAMAMOTO 
Publication:   
Publication Date: 2018/06/01
Vol. E101-A  No. 6  pp. 929-944
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multi-cast key distributionID-based cryptographyexposure resiliencescalability
 Summary | Full Text:PDF

Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack
Yukou KOBAYASHI Naoto YANAI Kazuki YONEYAMA Takashi NISHIDE Goichiro HANAOKA Kwangjo KIM Eiji OKAMOTO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2991-3006
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password-based authenticated key exchange (PAKE)threshold cryptography
 Summary | Full Text:PDF | (Errata[Uploaded on January 1,2018])

On Randomness Exposure Resilience of Group Signatures
Tomoyoshi ONO Kazuki YONEYAMA 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2357-2367
Type of Manuscript:  Special Section PAPER (Special Section on Security, Privacy and Anonymity in Computation, Communication and Storage Systems)
Category: Privacy, anonymity, and fundamental theory
Keyword: 
group signaturefull-anonymityselfless-anonymityrandomness exposure
 Summary | Full Text:PDF

Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols
Kazuki YONEYAMA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1794-1803
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
formal methodscomputational soundnessasymmetric bilinear pairing
 Summary | Full Text:PDF

Oblivious Polynomial Evaluation in the Exponent, Revisited
Naoto ITAKURA Kaoru KUROSAWA Kazuki YONEYAMA 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 26-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious polynomial evaluationDDH assumption
 Summary | Full Text:PDF

Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 132-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
authenticated key exchangekey encapsulation mechanismbounded CCA
 Summary | Full Text:PDF

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1345-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangetripartite key exchangestandard modeldual-receiver encryption
 Summary | Full Text:PDF

Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1335-1344
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangehierarchical ID-based authenticated key exchangeexposure-resilience
 Summary | Full Text:PDF

Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1112-1123
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangeattribute-based authenticated key exchangeCK model
 Summary | Full Text:PDF

One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1124-1138
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangestrong forward secrecysigncryption
 Summary | Full Text:PDF

id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
Atsushi FUJIOKA Fumitaka HOSHINO Tetsutaro KOBAYASHI Koutarou SUZUKI Berkant USTAOLU Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1139-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
identity-based authenticated key exchangegap Bilinear Diffie-Hellman assumptionidentity-based extended Canetti-Krawczyk modelrandom oracle model
 Summary | Full Text:PDF

Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 40-56
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
predicate-based AKEeCK securitykey-policysession-policy
 Summary | Full Text:PDF

Indifferentiable Security Reconsidered: Role of Scheduling
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 185-195
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Formal Approach
Keyword: 
indifferentiabilityschedulingnondeterminismtask-PIOAreducibility
 Summary | Full Text:PDF

Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1306-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hierarchical ID-based AKEeCK security
 Summary | Full Text:PDF

Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
Kazuki YONEYAMA Masayuki TERADA Sadayuki HONGO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1263-1273
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fairnessfair exchangeelectronic voucheruniversal composabilitynon-blocking atomic commitment
 Summary | Full Text:PDF

Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
Yusuke NAITO Kazuki YONEYAMA Lei WANG Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 57-70
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
indifferentiabilityMerkle-Damgård hash functionvariants of random oraclecryptosystems security
 Summary | Full Text:PDF

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka KAWAI Shotaro TANNO Takahiro KONDO Kazuki YONEYAMA Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret handshake with multiple groupsprivacy preserving authenticationanonymitymonotone condition
 Summary | Full Text:PDF

Leaky Random Oracle
Kazuki YONEYAMA Satoshi MIYAGAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1795-1807
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
hash functionrandom oracle modelstandard modelprovable securityleakage
 Summary | Full Text:PDF

Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi NISHIDE Kazuki YONEYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 22-32
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
attribute-based encryptionrecipient anonymityaccess control on encrypted data
 Summary | Full Text:PDF

Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 113-121
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordleakage of static keyleakage of ephemeral key3-party setting
 Summary | Full Text:PDF

Universally Composable Hierarchical Hybrid Authenticated Key Exchange
Haruki OTA Kazuki YONEYAMA Shinsaku KIYOMOTO Toshiaki TANAKA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
passwordDiffie-Hellmanauthenticated key exchangeuniversal composabilityhierarchical hybrid constructionMAC (Message Authentication Code)
 Summary | Full Text:PDF

Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu IWAMOTO Lei WANG Kazuki YONEYAMA Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1382-1395
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
visual secret sharing schemesvisual cryptographysecret sharing schemesmultiple secret imagesrotation of shares
 Summary | Full Text:PDF