• 462 Citations
  • 12 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Article

A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions

Kurosawa, K., Kishimoto, W. & Koshiba, T., 2008 Jun 1, In : IEEE Transactions on Information Theory. 54, 6, p. 2566-2571 6 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

A Machine Learning Approach to Knowledge Acquisitions from Text Databases

Sakakibara, Y., Misue, K. & Koshiba, T., 1996, In : Plastics, Rubber and Composites Processing and Applications. 8, 3, p. 309-324 16 p.

Research output: Contribution to journalArticle

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2017 Mar 1, In : Journal of Mathematical Cryptology. 11, 1, p. 1-24 24 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Ancilla-driven universal blind quantum computation

Sueki, T., Koshiba, T. & Morimae, T., 2013 Jun 6, In : Physical Review A - Atomic, Molecular, and Optical Physics. 87, 6, 060301.

Research output: Contribution to journalArticle

39 Citations (Scopus)

Arbitrable blind quantum computation

Sato, G., Koshiba, T. & Morimae, T., 2019 Dec 1, In : Quantum Information Processing. 18, 12, 370.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Blind audio watermarking based on parametric slant-hadamard transform and hessenberg decomposition

Dhar, P. K., Chowdhury, A. H. & Koshiba, T., 2020 Mar 1, In : Symmetry. 12, 3, 333.

Research output: Contribution to journalArticle

Open Access

Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling

Chowdhury, F. S., Dhar, P. K., Deb, K. & Koshiba, T., 2020 Feb 1, In : Symmetry. 12, 2, 266.

Research output: Contribution to journalArticle

Open Access

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2012 Jul 1, In : Journal of Cryptology. 25, 3, p. 528-555 28 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Content Delivery Networks: State of the Art, Trends, and Future Roadmap

Zolfaghari, B., Srivastava, G., Roy, S., Nemati, H. R., Afghah, F., Koshiba, T., Razi, A., Bibak, K., Mitra, P. & Rai, B. K., 2020 Jun, In : ACM Computing Surveys. 53, 2, 3380613.

Research output: Contribution to journalArticle

Efficient private database queries using ring-LWE somewhat homomorphic encryption

Saha, T. K., Rathee, M. & Koshiba, T., 2019 Dec, In : Journal of Information Security and Applications. 49, 102406.

Research output: Contribution to journalArticle

GeneralizedMm,r-Network: A Case for Fixed Message Dimensions

Singh, V., Zolfaghari, B., Kumar, C. V. D., Rai, B. K., Bibak, K., Srivastava, G., Roy, S. & Koshiba, T., 2020 Jan, In : IEEE Communications Letters. 24, 1, p. 38-42 5 p., 8886606.

Research output: Contribution to journalArticle

Impossibility of perfectly-secure one-round delegated quantum computing for classical client

Morimae, T. & Koshiba, T., 2019 Mar 1, In : Quantum Information and Computation. 19, 3-4, p. 214-221 8 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Inferring pure context-free languages from positive data

Koshiba, T., Mäkinen, E. & Takada, Y., 1999 Jan 1, In : Acta Cybernetica. 14, 3, p. 469-477 9 p.

Research output: Contribution to journalArticle

14 Citations (Scopus)

Learning deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1997 Oct 10, In : Theoretical Computer Science. 185, 1, p. 63-79 17 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

Low-density attack revisited

Izu, T., Kogure, J., Koshiba, T. & Shimoyama, T., 2007 Apr 1, In : Designs, Codes, and Cryptography. 43, 1, p. 47-59 13 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

More on security of public-key cryptosystems based on chebyshev polynomials

Cheong, K. Y. & Koshiba, T., 2007 Sep, In : IEEE Transactions on Circuits and Systems II: Express Briefs. 54, 9, p. 795-799 5 p.

Research output: Contribution to journalArticle

17 Citations (Scopus)

New packing method in somewhat homomorphic encryption and its applications

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015 Sep 10, In : Security and Communication Networks. 8, 13, p. 2194-2213 20 p.

Research output: Contribution to journalArticle

19 Citations (Scopus)

On a hierarchy of slender languages based on control sets

Koshiba, T., 1997 Jul, In : Fundamenta Informaticae. 31, 1, p. 41-47 7 p.

Research output: Contribution to journalArticle

On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2014 Sep 1, In : Journal of Mathematical Cryptology. 8, 3, p. 305-329 25 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Outsourcing private equality tests to the cloud

Saha, T. K. & Koshiba, T., 2018 Dec, In : Journal of Information Security and Applications. 43, p. 83-98 16 p.

Research output: Contribution to journalArticle

Physical implementation of oblivious transfer using optical correlated randomness

Ito, T., Koizumi, H., Suzuki, N., Kakesu, I., Iwakawa, K., Uchida, A., Koshiba, T., Muramatsu, J., Yoshimura, K., Inubushi, M. & Davis, P., 2017 Dec 1, In : Scientific reports. 7, 1, 8444.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Progress in quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006 Aug 11, In : Journal of Universal Computer Science. 12, 6, p. 691-709 19 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

The decision diffie-hellman assumption and the quadratic residuosity assumption

Saito, T., Koshiba, T. & Yamamura, A., 2001 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E84-A, 1, p. 165-171 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Theoretical Analysis of χ2 Attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2004 Jan, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 28-36 9 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2004 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3153, p. 839-850 12 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2005 Nov 22, In : Theoretical Computer Science. 345, 2-3, p. 370-385 16 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
Chapter

Fourier-based function secret sharing with general access structure

Koshiba, T., 2018 Jan 1, Springer Proceedings in Mathematics and Statistics. Springer New York LLC, Vol. 253. p. 417-428 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Fully dynamic group signature scheme with member registration and verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Springer Proceedings in Mathematics and Statistics. Springer New York LLC, Vol. 253. p. 399-415 17 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

6 Citations (Scopus)

Quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006 Jun 10, Quantum Computation and Information: From Theory to Experiment. Imai, H. & Hayashi, M. (eds.). p. 167-184 18 p. (Topics in Applied Physics; vol. 102).

Research output: Chapter in Book/Report/Conference proceedingChapter

Quantum cryptography

Koshiba, T., 2012 Jan 1, Handbook of Natural Computing. Springer Berlin Heidelberg, Vol. 3-4. p. 1521-1543 23 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

1 Citation (Scopus)

Short exponent diffie-hellman problems

Koshiba, T. & Kurosawa, K., 2004 Jan 1, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Bao, F., Deng, R. & Zhou, J. (eds.). Springer Verlag, p. 173-186 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2947).

Research output: Chapter in Book/Report/Conference proceedingChapter

Open Access
13 Citations (Scopus)

Zero-Knowledge Proof for Lattice-Based Group Signature Schemes with Verifier-Local Revocation

Perera, M. N. S. & Koshiba, T., 2019, Lecture Notes on Data Engineering and Communications Technologies. Springer, p. 772-782 11 p. (Lecture Notes on Data Engineering and Communications Technologies; vol. 22).

Research output: Chapter in Book/Report/Conference proceedingChapter

4 Citations (Scopus)
Conference article

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2005, In : LECTURE NOTES IN COMPUTER SCIENCE. 3494, p. 268-284 17 p.

Research output: Contribution to journalConference article

Open Access
29 Citations (Scopus)

Theoretical analysis of η2 attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2003 Dec 1, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2727 LNCS, p. 142-153 12 p.

Research output: Contribution to journalConference article

2 Citations (Scopus)
Conference contribution

Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer-Verlag, p. 229-247 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Achieving full security for lattice-based group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S. & Samarati, P. (eds.). Springer-Verlag, p. 287-302 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11149 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Security and Trust Management - 14th International Workshop, STM 2018, Proceedings. Alcaraz, C., Katsikas, S. K. & Katsikas, S. K. (eds.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11091 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Proceedings. Guerrieri, A., Jung, J. J., Fortino, G., Sun, J. & Xiang, Y. (eds.). Springer-Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11226 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

An enhancement of privacy-preserving wildcards pattern matching

Saha, T. K. & Koshiba, T., 2017, Foundations and Practice of Security - 9th International Symposium, FPS 2016, Revised Selected Papers. Springer Verlag, Vol. 10128 LNCS. p. 145-160 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

A new aspect for security notions: Secure randomness in public-key encryption schemes

Koshiba, T., 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Springer Verlag, Vol. 1992. p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A technique for boosting the security of cryptographic systems with one-way hash functions

Koshiba, T., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Springer Verlag, Vol. 1787. p. 76-81 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Big data cloud deduplication based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 8, Proceedings - 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7944949

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Decision tree learning system with switching evaluator

Koshiba, T., 1996, Advances in Artificial Intelligence - 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 1996, Proceedings. Springer Verlag, Vol. 1081. p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1081).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient protocols for private database queries

Saha, T. K., Mayank & Koshiba, T., 2017 Jan 1, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Fully secure lattice-based group signatures with verifier-local revocation

Nisansala, M., Perera, S. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 795-802 8 p. 7920989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Learning strongly deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1995, Algorithmic Learning Theory - 6th International Workshop, ALT 1995, Proceedings. Springer Verlag, Vol. 997. p. 41-54 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 997).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Multiple linear cryptanalysis of a reduced round RC6

Shimoyama, T., Takenaka, M. & Koshiba, T., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Springer Verlag, Vol. 2365. p. 76-88 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

New assumptions on isogenous pairing groups with applications to attribute-based encryption

Koshiba, T. & Takashima, K., 2019 Jan 1, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

On sufficient randomness for secure public-key cryptosystems

Koshiba, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 34-47 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)