Kazue Sako

教授(任期付)

Calculated based on number of publications stored in Pure and citations from Scopus
1994 …2022

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2022

    Formalising Linked-Data based Verifiable Credentials for Selective Disclosure

    Yamamoto, D., Suga, Y. & Sako, K., 2022, Proceedings - 7th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2022. Institute of Electrical and Electronics Engineers Inc., p. 52-65 14 p. (Proceedings - 7th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2021

    Ledger-based Points Transfer System in LPWAN: From Disaster Management Aspect

    Qi, X., Yu, K., Sato, T., Shibata, K., Brigham, E., Tokutake, T., Eguchi, R., Maruyama, Y., Wen, Z., Tamesue, K., Katsuyama, Y., Sako, K. & Sato, T., 2021, 2021 International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2021. Institute of Electrical and Electronics Engineers Inc., p. 150-155 6 p. (2021 International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Optimizing Packet Transmission for Ledger-Based Points Transfer System in LPWAN: Solutions, Evaluation and Standardization

    Qi, X., Yu, K., Sato, T., Shibata, K., Brigham, E., Tokutake, T., Eguchi, R., Maruyama, Y., Wen, Z., Tamesue, K., Katsuyama, Y., Sako, K. & Sato, T., 2021, 2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds, ITU K 2021. Institute of Electrical and Electronics Engineers Inc., (2021 ITU Kaleidoscope: Connecting Physical and Virtual Worlds, ITU K 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2020

    A Lightweight Ledger-Based Points Transfer System for Application-Oriented LPWAN

    Yu, K., Shibata, K., Tokutake, T., Eguchi, R., Kondo, T., Maruyama, Y., Qi, X., Wen, Z., Sato, T., Katsuyama, Y., Sako, K. & Sato, T., 2020 Dec 11, 2020 IEEE 6th International Conference on Computer and Communications, ICCC 2020. Institute of Electrical and Electronics Engineers Inc., p. 1972-1978 7 p. 9344885. (2020 IEEE 6th International Conference on Computer and Communications, ICCC 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2019

    A Fair Anonymous Auction Scheme Utilizing Trusted Hardware and Blockchain

    Enkhtaivan, B., Takenouchi, T. & Sako, K., 2019 Aug, 2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings. Ghorbani, A., Ray, I., Lashkari, A. H., Zhang, J. & Lu, R. (eds.). Institute of Electrical and Electronics Engineers Inc., 8949020. (2019 17th International Conference on Privacy, Security and Trust, PST 2019 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2016

    Topics in Cryptology - CT-RSA 2016: The Cryptographers’ Track at the RSA Conference 2016 San Francisco, CA, USA, February 29 - March 4, 2016 Proceedings

    Sako, K., 2016, Topics in Cryptology - The Cryptographers Track at the RSA Conference, CT-RSA 2016. Sako, K. (ed.). Springer Verlag, (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9610).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology

    Morioka, S., Isshiki, T., Obana, S., Nakamura, Y. & Sako, K., 2011, 2011 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2011. p. 57-62 6 p. 5954996. (2011 IEEE International Symposium on Hardware-Oriented Security and Trust, HOST 2011).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2010

    An implementation of a mix-net based network voting scheme and its use in a private organization

    Furukawa, J., Mori, K. & Sako, K., 2010, Towards Trustworthy Elections - New Directions in Electronic Voting. Chaum, D., Jakobsson, M., Rivest, R. L., Ryan, P. Y. A., Benaloh, J., Kutylowski, M. & Adida, B. (eds.). p. 141-154 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6000 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • 2009

    IC card-based single sign-on system that remains secure under card analysis

    Furukawa, J., Sako, K. & Obana, S., 2009, Proceedings of the 5th ACM Workshop on Digital Identity Management, DIM '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 63-71 9 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2006

    An efficient publicly verifiable mix-net for long inputs

    Furukawa, J. & Sako, K., 2006, Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers. Springer Verlag, p. 111-125 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • k-Times Anonymous Authentication with a constant proving cost

    Teranishi, I. & Sako, K., 2006, Public Key Cryptography - PKC 2006 - 9th International Conference on Theory and Practice in Public-Key Cryptography, Proceedings. p. 525-542 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3958 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    44 Citations (Scopus)
  • Using group signatures for identity management and its implementation

    Isshiki, T., Mori, K., Sako, K., Teranishi, I. & Yonezawa, S., 2006, Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06. p. 73-78 6 p. (Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006. Co-located with the 13th ACM Conference on Computer and Communications Security, CCS'06).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    24 Citations (Scopus)
  • 2003

    An implementation of a universally verifiable electronic voting scheme based on shuffling

    Furukawa, J., Miyauchi, H., Mori, K., Obana, S. & Sako, K., 2003, Financial Cryptography - 6th International Conference, FC 2002, Revised Papers. Blaze, M. (ed.). Springer Verlag, p. 16-30 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2357).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    20 Citations (Scopus)
  • 2001

    An efficient scheme for proving a shuffle

    Furukawa, J. & Sako, K., 2001, Advances in Cryptology, CRYPTO 2001 - 21st Annual International Cryptology Conference, Proceedings. Kilian, J. (ed.). Springer Verlag, p. 368-387 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2139 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    212 Citations (Scopus)
  • 2000

    An auction protocol which hides bids of losers

    Sako, K., 2000, Public Key Cryptography - 3rd International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Proceedings. Imai, H. & Zheng, Y. (eds.). Springer Verlag, p. 422-432 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1751).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    90 Citations (Scopus)
  • Efficient receipt-free voting based on homomorphic encryption

    Hirt, M. & Sako, K., 2000, Advances in Cryptology - EUROCRYPT 2000 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Preneel, B. (ed.). Springer Verlag, p. 539-556 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1807).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    282 Citations (Scopus)
  • 1999

    Implementation of a digital lottery server on WWW

    Sako, K., 1999, Secure Networking – CQRE [Secure] 1999 - International Exhibition and Congress, Proceedings. Baumgart, R. (ed.). Springer Verlag, p. 101-108 8 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1740).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Citations (Scopus)
  • 1996

    Designated verifier proofs and their applications

    Jakobsson, M., Sako, K. & Impagliazzo, R., 1996, Advances in Cryptology - EUROCRYPT 1996 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Maurer, U. (ed.). Springer Verlag, p. 143-154 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1070).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    625 Citations (Scopus)
  • 1995

    Receipt-free mix-type voting scheme - A practical solution to the implementation of a voting booth-

    Sako, K. & Kilian, J., 1995, Advances in Cryptology — EUROCRYPT 1995 - International Conference on the Theory and Application of Cryptographic Techniques, Proceedings. Quisquater, J-J. & Guillou, L. C. (eds.). Springer Verlag, p. 393-403 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 921).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    335 Citations (Scopus)
  • 1994

    Secure voting using partially compatible homomorphisms

    Sako, K. & Kilian, J., 1994, Advances in Cryptology — CRYPTO 1994 - 14th Annual International Cryptology Conference, Proceedings. Desmedt, Y. G. (ed.). Springer Verlag, p. 411-424 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 839 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    93 Citations (Scopus)