Nuttapong ATTRAPADUNG


New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
Nuttapong ATTRAPADUNG Goichiro HANAOKA Shota YAMADA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1882-1890
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Boneh-Boyen identity-based encryptiontight security reductionmulti-challenge security
 Summary | Full Text:PDF(1.1MB)

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF(729.8KB)

Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 116-125
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
attribute based encryptionciphertext policykey policy
 Summary | Full Text:PDF(230.4KB)

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA Nuttapong ATTRAPADUNG Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1466-1476
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
digital signaturestrong unforgeabilitytarget collision resistant hash functionstandard model
 Summary | Full Text:PDF(335.9KB)

Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong ATTRAPADUNG Jun FURUKAWA Takeshi GOMI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1803-1813
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
identity based encryptiontight security reduction
 Summary | Full Text:PDF(341.8KB)

Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 187-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
broadcast encryptionrevocation scheme
 Summary | Full Text:PDF(678KB)