Yusuke SAKAI


Verifiable Privacy-Preserving Data Aggregation Protocols
Satoshi YASUDA Yoshihiro KOSEKI Yusuke SAKAI Fuyuki KITAGAWA Yutaka KAWAI Goichiro HANAOKA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 183-194
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
homomorphic encryptionverifiable homomorphic encryptionSXDH
 Summary | Full Text:PDF(1.8MB)

Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
Junichiro HAYATA Masahito ISHIZAKA Yusuke SAKAI Goichiro HANAOKA Kanta MATSUURA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 107-113
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-key searchable encryptionattribute-based encryption
 Summary | Full Text:PDF(1.4MB)

A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications
Goichiro HANAOKA Yusuke SAKAI Toshiya SHIMIZU Takeshi SHIMOYAMA SeongHan SHIN 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 150-164
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
threshold encryptionECDSABitcoinprovable securityimplementation
 Summary | Full Text:PDF(1.5MB)

Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 165-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-key encryptionchosen-ciphertext securitytight security
 Summary | Full Text:PDF(782.7KB)

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology
Kazuma OHARA Keita EMURA Goichiro HANAOKA Ai ISHIDA Kazuo OHTA Yusuke SAKAI 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1101-1117
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
group signaturerevocationscalability
 Summary | Full Text:PDF(1.8MB)

Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening
Yusuke SAKAI Takahiro MATSUDA Goichiro HANAOKA 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2677-2687
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
Public-key encryption with non-interactive openingTag-KEM
 Summary | Full Text:PDF(832.1KB)

Group Signature with Deniability: How to Disavow a Signature
Ai ISHIDA Keita EMURA Goichiro HANAOKA Yusuke SAKAI Keisuke TANAKA 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1825-1837
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
group signaturedeniabilitynon-interactive zero-knowledge proofbilinear map
 Summary | Full Text:PDF(1.5MB)

Disavowable Public Key Encryption with Non-Interactive Opening
Ai ISHIDA Keita EMURA Goichiro HANAOKA Yusuke SAKAI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2446-2455
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryption with non-interactive openingdisavowabilitynon-interactive zero-knowledge proof
 Summary | Full Text:PDF(1.4MB)

Methods for Restricting Message Space in Public-Key Encryption
Yusuke SAKAI Keita EMURA Goichiro HANAOKA Yutaka KAWAI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1156-1168
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public-key encryptionabuse detectionformat checking
 Summary | Full Text:PDF(978.9KB)

Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
Mitsuhiro HATTORI Takato HIRANO Takashi ITO Nori MATSUDA Takumi MORI Yusuke SAKAI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 53-67
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
hidden vector encryptionsearchable encryptionpairing-based cryptography
 Summary | Full Text:PDF(1.2MB)

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA Kaoru KUROSAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1293-1305
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionchosen-ciphertext securitykey encapsulation mechanism
 Summary | Full Text:PDF(435.6KB)