• 462 Citations
  • 12 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

1993

Text classification and keyword extraction by learning decision trees

Sakakibara, Y., Misue, K. & Koshiba, T., 1993 Jan 1, Proceedings of the Conference on Artificial Intelligence Applications. Publ by IEEE, 1 p. (Proceedings of the Conference on Artificial Intelligence Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)
1995

Learning strongly deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1995, Algorithmic Learning Theory - 6th International Workshop, ALT 1995, Proceedings. Springer Verlag, Vol. 997. p. 41-54 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 997).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Typed pattern languages and their learnability

Koshiba, T., 1995 Jan 1, Computational Learning Theory - 2nd European Conference, EuroCOLT 1995, Proceedings. Vitanyi, P. (ed.). Springer Verlag, p. 367-379 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)
1996

A Machine Learning Approach to Knowledge Acquisitions from Text Databases

Sakakibara, Y., Misue, K. & Koshiba, T., 1996, In : Plastics, Rubber and Composites Processing and Applications. 8, 3, p. 309-324 16 p.

Research output: Contribution to journalArticle

Decision tree learning system with switching evaluator

Koshiba, T., 1996, Advances in Artificial Intelligence - 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 1996, Proceedings. Springer Verlag, Vol. 1081. p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1081).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1997

Learning deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1997 Oct 10, In : Theoretical Computer Science. 185, 1, p. 63-79 17 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

On a hierarchy of slender languages based on control sets

Koshiba, T., 1997 Jul, In : Fundamenta Informaticae. 31, 1, p. 41-47 7 p.

Research output: Contribution to journalArticle

1998

Enhancing D-ABDUCTOR towards a diagrammatic user interface platform

Misue, K., Nitta, K., Sugiyama, K., Koshiba, T. & Inder, R., 1998 Dec 1, p. 359-368. 10 p.

Research output: Contribution to conferencePaper

12 Citations (Scopus)
1999

Inferring pure context-free languages from positive data

Koshiba, T., Mäkinen, E. & Takada, Y., 1999 Jan 1, In : Acta Cybernetica. 14, 3, p. 469-477 9 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)
2000

A technique for boosting the security of cryptographic systems with one-way hash functions

Koshiba, T., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Springer Verlag, Vol. 1787. p. 76-81 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)
2001

A new aspect for security notions: Secure randomness in public-key encryption schemes

Koshiba, T., 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Springer Verlag, Vol. 1992. p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Polynomial-time algorithms for the equivalence for one-way quantum finite automata

Koshiba, T., 2001 Dec 1, Algorithms and Computation - 12th International Symposium, ISAAC 2001, Proceedings. p. 268-278 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2223 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

The decision diffie-hellman assumption and the quadratic residuosity assumption

Saito, T., Koshiba, T. & Yamamura, A., 2001 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E84-A, 1, p. 165-171 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)
2002

Multiple linear cryptanalysis of a reduced round RC6

Shimoyama, T., Takenaka, M. & Koshiba, T., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Springer Verlag, Vol. 2365. p. 76-88 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

On sufficient randomness for secure public-key cryptosystems

Koshiba, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 34-47 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)
2003

Theoretical analysis of η2 attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2727 LNCS, p. 142-153 12 p.

Research output: Contribution to journalConference article

2 Citations (Scopus)
2004

Short exponent diffie-hellman problems

Koshiba, T. & Kurosawa, K., 2004 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 173-186 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
13 Citations (Scopus)

Theoretical Analysis of χ2 Attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2004 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 28-36 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2004 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3153, p. 839-850 12 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2005

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2005, In : LECTURE NOTES IN COMPUTER SCIENCE. 3494, p. 268-284 17 p.

Research output: Contribution to journalConference article

Open Access
29 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2005 Nov 22, In : Theoretical Computer Science. 345, 2-3, p. 370-385 16 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2006

Progress in quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006 Aug 11, In : Journal of Universal Computer Science. 12, 6, p. 691-709 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006 Jun 10, Quantum Computation and Information: From Theory to Experiment. Imai, H. & Hayashi, M. (eds.). p. 167-184 18 p. (Topics in Applied Physics; vol. 102).

Research output: Chapter in Book/Report/Conference proceedingChapter

2007

Low-density attack revisited

Izu, T., Kogure, J., Koshiba, T. & Shimoyama, T., 2007 Apr 1, In : Designs, Codes, and Cryptography. 43, 1, p. 47-59 13 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

More on security of public-key cryptosystems based on chebyshev polynomials

Cheong, K. Y. & Koshiba, T., 2007 Sep, In : IEEE Transactions on Circuits and Systems II: Express Briefs. 54, 9, p. 795-799 5 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)
2008

A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions

Kurosawa, K., Kishimoto, W. & Koshiba, T., 2008 Jun 1, In : IEEE Transactions on Information Theory. 54, 6, p. 2566-2571 6 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

Kurosawa, K. & Koshiba, T., 2008 Oct 27, Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings. p. 199-209 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5155 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2009

Reducing complexity assumptions for oblivious transfer

Cheong, K. Y. & Koshiba, T., 2009 Dec 1, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 110-124 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Special section on frontier of quantum computing

Inaba, M., Koshiba, T., Ogawa, T., Yamashita, S. & Tani, S., 2009 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E92-A, 5, 1 p.

Research output: Contribution to journalEditorial

Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function

Koshiba, T. & Odaira, T., 2009 Dec 1, Theory of Quantum Computation, Communication, and Cryptography - 4th Workshop, TQC 2009, Revised Selected Papers. p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5906 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Strengthening the security of distributed oblivious transfer

Cheong, K. Y., Koshiba, T. & Nishiyama, S., 2009 Nov 9, Information Security and Privacy - 14th Australasian Conference, ACISP 2009, Proceedings. p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5594 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)
2011

Public discussion must be back and forth in secure message transmission

Koshiba, T. & Sawada, S., 2011 Sep 20, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. p. 325-337 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2012

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2012 Jul 1, In : Journal of Cryptology. 25, 3, p. 528-555 28 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Quantum cryptography

Koshiba, T., 2012 Jan 1, Handbook of Natural Computing. Springer Berlin Heidelberg, Vol. 3-4. p. 1521-1543 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)
2013

Ancilla-driven universal blind quantum computation

Sueki, T., Koshiba, T. & Morimae, T., 2013 Jun 6, In : Physical Review A - Atomic, Molecular, and Optical Physics. 87, 6, 060301.

Research output: Contribution to journalArticle

39 Citations (Scopus)

Packed homomorphic encryption based on ideal lattices and its application to biometrics

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Proceedings. p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Secure pattern matching using somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013 Dec 9, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Citations (Scopus)
2014

On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2014 Sep 1, In : Journal of Mathematical Cryptology. 8, 3, p. 305-329 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Practical packing method in somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, Vol. 8247 LNCS. p. 34-50 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014 Jan 1, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Proceedings. Springer Verlag, p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8544 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)
2015

New packing method in somewhat homomorphic encryption and its applications

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015 Sep 10, In : Security and Communication Networks. 8, 13, p. 2194-2213 20 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption

Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure statistical analysis using RLWE-based homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Springer Verlag, Vol. 9144. p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)
2016

Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes

Yasuda, M., Shimoyama, T., Abe, N., Yamada, S., Shinzaki, T. & Koshiba, T., 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Springer Verlag, Vol. 9482. p. 117-133 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9482).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)
2017

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2017 Mar 1, In : Journal of Mathematical Cryptology. 11, 1, p. 1-24 24 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

An enhancement of privacy-preserving wildcards pattern matching

Saha, T. K. & Koshiba, T., 2017, Foundations and Practice of Security - 9th International Symposium, FPS 2016, Revised Selected Papers. Springer Verlag, Vol. 10128 LNCS. p. 145-160 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Big data cloud deduplication based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 8, Proceedings - 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7944949

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Efficient protocols for private database queries

Saha, T. K., Mayank & Koshiba, T., 2017 Jan 1, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Fully secure lattice-based group signatures with verifier-local revocation

Nisansala, M., Perera, S. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 795-802 8 p. 7920989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)