Seiko ARITA


Fully Homomorphic Encryption Scheme Based on Decomposition Ring
Seiko ARITA Sari HANDA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 195-211
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
fully homomorphic encryptionring-LWEcyclotomic ringdecomposition ringplaintext slots
 Summary | Full Text:PDF(809.6KB)

Attribute-Based Identification: Definitions and Efficient Constructions
Hiroaki ANADA Seiko ARITA Sari HANDA Yosuke IWABUCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/05/01
Vol. E97-A  No. 5  pp. 1086-1102
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
access policyattributeidentificationKEM
 Summary | Full Text:PDF(530.1KB)

A Constant-Round Resettably-Sound Resettable Zero-Knowledge Argument in the BPK Model
Seiko ARITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/08/01
Vol. E95-A  No. 8  pp. 1390-1401
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
resettable zero-knowledgeresettable soundnessconditional commitmentresettably extractable
 Summary | Full Text:PDF(245.3KB)

Identification Schemes from Key Encapsulation Mechanisms
Hiroaki ANADA Seiko ARITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/07/01
Vol. E95-A  No. 7  pp. 1136-1155
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
identification schemekey encapsulation mechanismone-way-CCA2 securityconcurrent man-in-the-middle attackthe computational Diffie-Hellman assumption
 Summary | Full Text:PDF(410.8KB)

An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
Seiko ARITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 367-382
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
commitment schemesadaptivitydeniabilityconcurrencynon-malleability
 Summary | Full Text:PDF(2.5MB)

An Identification Scheme with Tight Reduction
Seiko ARITA Natsumi KAWASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1949-1955
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
identification schemerewindingKEA1 assumptiontight reduction
 Summary | Full Text:PDF(179.1KB)

A Straight-Line Extractable Non-malleable Commitment Scheme
Seiko ARITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/07/01
Vol. E90-A  No. 7  pp. 1384-1394
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
commitment schemenon-malleabilitythe KEA1 assumptionextractability
 Summary | Full Text:PDF(197KB)