Kazuki YONEYAMA


Computational Soundness of Asymmetric Bilinear Pairing-Based Protocols
Kazuki YONEYAMA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1794-1803
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
formal methodscomputational soundnessasymmetric bilinear pairing
 Summary | Full Text:PDF(269.9KB)

Oblivious Polynomial Evaluation in the Exponent, Revisited
Naoto ITAKURA Kaoru KUROSAWA Kazuki YONEYAMA 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 26-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious polynomial evaluationDDH assumption
 Summary | Full Text:PDF(404KB)

Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 132-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
authenticated key exchangekey encapsulation mechanismbounded CCA
 Summary | Full Text:PDF(254.4KB)

Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1335-1344
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangehierarchical ID-based authenticated key exchangeexposure-resilience
 Summary | Full Text:PDF(251.4KB)

Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1345-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangetripartite key exchangestandard modeldual-receiver encryption
 Summary | Full Text:PDF(347.1KB)

One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1124-1138
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangestrong forward secrecysigncryption
 Summary | Full Text:PDF(302.3KB)

id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
Atsushi FUJIOKA Fumitaka HOSHINO Tetsutaro KOBAYASHI Koutarou SUZUKI Berkant USTAOLU Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1139-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
identity-based authenticated key exchangegap Bilinear Diffie-Hellman assumptionidentity-based extended Canetti-Krawczyk modelrandom oracle model
 Summary | Full Text:PDF(695.8KB)

Generic Construction of Two-Party Round-Optimal Attribute-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1112-1123
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangeattribute-based authenticated key exchangeCK model
 Summary | Full Text:PDF(258.6KB)

Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 40-56
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
predicate-based AKEeCK securitykey-policysession-policy
 Summary | Full Text:PDF(493.3KB)

Indifferentiable Security Reconsidered: Role of Scheduling
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 185-195
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Formal Approach
Keyword: 
indifferentiabilityschedulingnondeterminismtask-PIOAreducibility
 Summary | Full Text:PDF(1.3MB)

Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1306-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hierarchical ID-based AKEeCK security
 Summary | Full Text:PDF(406.2KB)

Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
Kazuki YONEYAMA Masayuki TERADA Sadayuki HONGO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1263-1273
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
fairnessfair exchangeelectronic voucheruniversal composabilitynon-blocking atomic commitment
 Summary | Full Text:PDF(419.5KB)

Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
Yusuke NAITO Kazuki YONEYAMA Lei WANG Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 57-70
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
indifferentiabilityMerkle-Damgård hash functionvariants of random oraclecryptosystems security
 Summary | Full Text:PDF(657.3KB)

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka KAWAI Shotaro TANNO Takahiro KONDO Kazuki YONEYAMA Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret handshake with multiple groupsprivacy preserving authenticationanonymitymonotone condition
 Summary | Full Text:PDF(1.3MB)

Leaky Random Oracle
Kazuki YONEYAMA Satoshi MIYAGAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1795-1807
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
hash functionrandom oracle modelstandard modelprovable securityleakage
 Summary | Full Text:PDF(257.5KB)

Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi NISHIDE Kazuki YONEYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 22-32
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
attribute-based encryptionrecipient anonymityaccess control on encrypted data
 Summary | Full Text:PDF(255.5KB)

Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 113-121
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordleakage of static keyleakage of ephemeral key3-party setting
 Summary | Full Text:PDF(217.7KB)

Universally Composable Hierarchical Hybrid Authenticated Key Exchange
Haruki OTA Kazuki YONEYAMA Shinsaku KIYOMOTO Toshiaki TANAKA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
passwordDiffie-Hellmanauthenticated key exchangeuniversal composabilityhierarchical hybrid constructionMAC (Message Authentication Code)
 Summary | Full Text:PDF(334.6KB)

Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu IWAMOTO Lei WANG Kazuki YONEYAMA Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1382-1395
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
visual secret sharing schemesvisual cryptographysecret sharing schemesmultiple secret imagesrotation of shares
 Summary | Full Text:PDF(527.7KB)