• 454 Citations
  • 12 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

2020

Blind audio watermarking based on parametric slant-hadamard transform and hessenberg decomposition

Dhar, P. K., Chowdhury, A. H. & Koshiba, T., 2020 Mar 1, In : Symmetry. 12, 3, 333.

Research output: Contribution to journalArticle

Open Access

Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling

Chowdhury, F. S., Dhar, P. K., Deb, K. & Koshiba, T., 2020 Feb 1, In : Symmetry. 12, 2, 266.

Research output: Contribution to journalArticle

Open Access

GeneralizedMm,r-Network: A Case for Fixed Message Dimensions

Singh, V., Zolfaghari, B., Kumar, C. V. D., Rai, B. K., Bibak, K., Srivastava, G., Roy, S. & Koshiba, T., 2020 Jan, In : IEEE Communications Letters. 24, 1, p. 38-42 5 p., 8886606.

Research output: Contribution to journalArticle

2019

Arbitrable blind quantum computation

Sato, G., Koshiba, T. & Morimae, T., 2019 Dec 1, In : Quantum Information Processing. 18, 12, 370.

Research output: Contribution to journalArticle

Efficient private database queries using ring-LWE somewhat homomorphic encryption

Saha, T. K., Rathee, M. & Koshiba, T., 2019 Dec, In : Journal of Information Security and Applications. 49, 102406.

Research output: Contribution to journalArticle

Impossibility of perfectly-secure one-round delegated quantum computing for classical client

Morimae, T. & Koshiba, T., 2019 Mar 1, In : Quantum Information and Computation. 19, 3-4, p. 214-221 8 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

New assumptions on isogenous pairing groups with applications to attribute-based encryption

Koshiba, T. & Takashima, K., 2019 Jan 1, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Perfectly Secure Message Transmission Against Independent Rational Adversaries

Yasunaga, K. & Koshiba, T., 2019, Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Proceedings. Alpcan, T., Vorobeychik, Y., Baras, J. S. & Dán, G. (eds.). Springer, p. 563-582 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11836 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation

Perera, M. N. S. & Koshiba, T., 2019, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 772-782 11 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 22).

Research output: Chapter in Book/Report/Conference proceedingChapter

2018

Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer-Verlag, p. 229-247 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Achieving full security for lattice-based group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S. & Samarati, P. (eds.). Springer-Verlag, p. 287-302 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11149 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Security and Trust Management - 14th International Workshop, STM 2018, Proceedings. Alcaraz, C., Katsikas, S. K. & Katsikas, S. K. (eds.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11091 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Proceedings. Guerrieri, A., Jung, J. J., Fortino, G., Sun, J. & Xiang, Y. (eds.). Springer-Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11226 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Fourier-based function secret sharing with general access structure

Koshiba, T., 2018 Jan 1, Springer Proceedings in Mathematics and Statistics. Springer New York LLC, Vol. 253. p. 417-428 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Fully dynamic group signature scheme with member registration and verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Springer Proceedings in Mathematics and Statistics. Springer New York LLC, Vol. 253. p. 399-415 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Outsourcing private equality tests to the cloud

Saha, T. K. & Koshiba, T., 2018 Dec, In : Journal of Information Security and Applications. 43, p. 83-98 16 p.

Research output: Contribution to journalArticle

Perfectly secure message transmission against rational timid adversaries

Fujita, M., Yasunaga, K. & Koshiba, T., 2018 Jan 1, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer-Verlag, p. 127-144 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Privacy-preserving equality test towards big data

Saha, T. K. & Koshiba, T., 2018 Jan 1, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Springer-Verlag, p. 95-110 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Private comparison protocol and its application to range queries

Saha, T. K., Mayank, Deevashwer & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 10th International Conference, IDCS 2017, Proceedings. Springer-Verlag, p. 128-141 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10794 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication

Hayashi, M. & Koshiba, T., 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 2614-2618 5 p. 8437751

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2017

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2017 Mar 1, In : Journal of Mathematical Cryptology. 11, 1, p. 1-24 24 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

An enhancement of privacy-preserving wildcards pattern matching

Saha, T. K. & Koshiba, T., 2017, Foundations and Practice of Security - 9th International Symposium, FPS 2016, Revised Selected Papers. Springer Verlag, Vol. 10128 LNCS. p. 145-160 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Big data cloud deduplication based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 8, Proceedings - 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7944949

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Efficient protocols for private database queries

Saha, T. K., Mayank & Koshiba, T., 2017 Jan 1, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Fully secure lattice-based group signatures with verifier-local revocation

Nisansala, M., Perera, S. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 795-802 8 p. 7920989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Physical implementation of oblivious transfer using optical correlated randomness

Ito, T., Koizumi, H., Suzuki, N., Kakesu, I., Iwakawa, K., Uchida, A., Koshiba, T., Muramatsu, J., Yoshimura, K., Inubushi, M. & Davis, P., 2017 Dec 1, In : Scientific reports. 7, 1, 8444.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Private conjunctive query over encrypted data

Saha, T. K. & Koshiba, T., 2017, Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Springer Verlag, Vol. 10239 LNCS. p. 149-164 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10239 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Private Equality Test Using Ring-LWE Somewhat Homomorphic Encryption

Saha, T. K. & Koshiba, T., 2017 Jun 6, Proceedings - Asia-Pacific World Congress on Computer Science and Engineering 2016 and Asia-Pacific World Congress on Engineering 2016, APWC on CSE/APWCE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. 7941933

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Secure deduplication in a multiple group signature setting

Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure SMS transmission based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2016

Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes

Yasuda, M., Shimoyama, T., Abe, N., Yamada, S., Shinzaki, T. & Koshiba, T., 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Springer Verlag, Vol. 9482. p. 117-133 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9482).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2015

New packing method in somewhat homomorphic encryption and its applications

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015 Sep 10, In : Security and Communication Networks. 8, 13, p. 2194-2213 20 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption

Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure statistical analysis using RLWE-based homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Springer Verlag, Vol. 9144. p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)
2014

On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2014 Sep 1, In : Journal of Mathematical Cryptology. 8, 3, p. 305-329 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Practical packing method in somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, Vol. 8247 LNCS. p. 34-50 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014 Jan 1, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Proceedings. Springer Verlag, p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8544 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)
2013

Ancilla-driven universal blind quantum computation

Sueki, T., Koshiba, T. & Morimae, T., 2013 Jun 6, In : Physical Review A - Atomic, Molecular, and Optical Physics. 87, 6, 060301.

Research output: Contribution to journalArticle

38 Citations (Scopus)

Packed homomorphic encryption based on ideal lattices and its application to biometrics

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013 Dec 1, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Proceedings. p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Secure pattern matching using somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013 Dec 9, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Citations (Scopus)
2012

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2012 Jul 1, In : Journal of Cryptology. 25, 3, p. 528-555 28 p.

Research output: Contribution to journalArticle

10 Citations (Scopus)

Quantum cryptography

Koshiba, T., 2012 Jan 1, Handbook of Natural Computing. Springer Berlin Heidelberg, Vol. 3-4. p. 1521-1543 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2011

Public discussion must be back and forth in secure message transmission

Koshiba, T. & Sawada, S., 2011 Sep 20, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. p. 325-337 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Reducing complexity assumptions for oblivious transfer

Cheong, K. Y. & Koshiba, T., 2009 Dec 1, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 110-124 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Special section on frontier of quantum computing

Inaba, M., Koshiba, T., Ogawa, T., Yamashita, S. & Tani, S., 2009 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, 1 p.

Research output: Contribution to journalEditorial

Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function

Koshiba, T. & Odaira, T., 2009 Dec 1, Theory of Quantum Computation, Communication, and Cryptography - 4th Workshop, TQC 2009, Revised Selected Papers. p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5906 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Strengthening the security of distributed oblivious transfer

Cheong, K. Y., Koshiba, T. & Nishiyama, S., 2009 Nov 9, Information Security and Privacy - 14th Australasian Conference, ACISP 2009, Proceedings. p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5594 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2008

A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions

Kurosawa, K., Kishimoto, W. & Koshiba, T., 2008 Jun 1, In : IEEE Transactions on Information Theory. 54, 6, p. 2566-2571 6 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

Kurosawa, K. & Koshiba, T., 2008 Oct 27, Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings. p. 199-209 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5155 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution