Satoshi HADA


Zero-Knowledge and Correlation Intractability
Satoshi HADA Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10  pp. 2894-2905
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
one-way functionscorrelation intractabilityzero-knowledgeinteractive proofsround complexityrandom oracle
 Summary | Full Text:PDF

A Formal Treatment of Non-repudiation Protocols
Satoshi HADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/02/01
Vol. E87-A  No. 2  pp. 461-470
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
non-repudiationdigital signaturesconcurrent compositionuniversal composition
 Summary | Full Text:PDF

A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity
Satoshi HADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 2-9
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Fundamental
Keyword: 
interactive proof systemsArthur-Merlin gameszero-knowledgedecisional Diffie-Hellman problem
 Summary | Full Text:PDF

Access Control Model with Provisional Actions
Michiharu KUDO Satoshi HADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 295-302
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
access control policyauthorizationprovisionpolicy management
 Summary | Full Text:PDF

A New Approach to Constructing a Provably Secure Variant of Schnorr's Identification Scheme
Satoshi HADA Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/09/25
Vol. E78-A  No. 9  pp. 1154-1159
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
interactive identification schemeprovable securitySchnorr's schemeOkamoto's scheme
 Summary | Full Text:PDF