Koutarou SUZUKI


Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1345-1355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangetripartite key exchangestandard modeldual-receiver encryption
 Summary | Full Text:PDF(347.1KB)

id-eCK Secure ID-Based Authenticated Key Exchange on Symmetric and Asymmetric Pairing
Atsushi FUJIOKA Fumitaka HOSHINO Tetsutaro KOBAYASHI Koutarou SUZUKI Berkant USTAOLU Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1139-1155
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
identity-based authenticated key exchangegap Bilinear Diffie-Hellman assumptionidentity-based extended Canetti-Krawczyk modelrandom oracle model
 Summary | Full Text:PDF(695.8KB)

Message Recovery Signature Schemes from Sigma-Protocols
Masayuki ABE Tatsuaki OKAMOTO Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 92-100
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
message recovery signaturesSigma-protocolchosen message attacks
 Summary | Full Text:PDF(328.4KB)

Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
Mark MANULIS Koutarou SUZUKI Berkant USTAOGLU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 101-110
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
group key exchangegroup-oriented extended Canetti-Krawczyk modeltripartite key exchangegap Bilinear Diffie-Hellman assumptionrandom oracle model
 Summary | Full Text:PDF(461.1KB)

Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 40-56
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
predicate-based AKEeCK securitykey-policysession-policy
 Summary | Full Text:PDF(493.3KB)

Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
Atsushi FUJIOKA Koutarou SUZUKI Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1306-1317
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hierarchical ID-based AKEeCK security
 Summary | Full Text:PDF(406.2KB)

Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
Jae Hong SEO Tetsutaro KOBAYASHI Miyako OHKUBO Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 45-56
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
anonymous identity-based encryptionanonymous hierarchical identity-based encryptionpublic-key encryption with keyword search
 Summary | Full Text:PDF(669.6KB)

Traceable Ring Signature
Eiichiro FUJISAKI Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 83-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
ring signaturetraceabilitysecurity model
 Summary | Full Text:PDF(234KB)

Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications
Koji CHIDA Go YAMAMOTO Koutarou SUZUKI Shigenori UCHIYAMA Noburou TANIGUCHI Osamu SHIONOIRI Atsushi KANAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 128-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
secure circuit evaluationmultiparty protocolElGamal encryptionimplementation
 Summary | Full Text:PDF(467.6KB)

Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation
Makoto YOKOO Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 255-261
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
generalized Vickrey auctioncombinatorial auctionmechanism designgame-theory
 Summary | Full Text:PDF(140.1KB)

Efficient Threshold Signer-Ambiguous Signatures from Variety of Keys
Masayuki ABE Miyako OHKUBO Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/02/01
Vol. E87-A  No. 2  pp. 471-479
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
signer ambiguityring signaturethreshold signaturegroup signature
 Summary | Full Text:PDF(218.4KB)

1-out-of-n Signatures from a Variety of Keys
Masayuki ABE Miyako OHKUBO Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 131-140
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
signer ambiguityring signaturediscrete-log
 Summary | Full Text:PDF(304.4KB)

M+1-st Price Auction Using Homomorphic Encryption
Masayuki ABE Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 136-141
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols etc.
Keyword: 
M+1-st price auctionVickrey auctionhomomorphic encryptionmix and match
 Summary | Full Text:PDF(190.2KB)

Permutation Network with Arbitrary Number of Inputs and Its Application to Mix-Net
Koutarou SUZUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 194-197
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
permutation networkMix-netelectronic voting
 Summary | Full Text:PDF(178.1KB)

Efficient Sealed-Bid Auction by Using One-Way Functions
Kunio KOBAYASHI Hikaru MORITA Koutarou SUZUKI Mitsuari HAKUTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 289-294
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
sealed-bid auctionquantitative competitionone-way functionbit commitment
 Summary | Full Text:PDF(216.9KB)