• 407 Citations
  • 12 h-Index
1993 …2019
If you made any changes in Pure these will be visible here soon.

Research Output 1993 2019

  • 407 Citations
  • 12 h-Index
  • 38 Conference contribution
  • 26 Article
  • 4 Chapter
  • 2 Editorial
Filter
Conference contribution
2019

New assumptions on isogenous pairing groups with applications to attribute-based encryption

Koshiba, T. & Takashima, K., 2019 Jan 1, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pairing
Encryption
Cryptography
Attribute
Isogenies
2018
3 Citations (Scopus)

Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer-Verlag, p. 229-247 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Revocation
Group Scheme
Signature Scheme
Registration

Achieving full security for lattice-based group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S. & Samarati, P. (eds.). Springer-Verlag, p. 287-302 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11149 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Revocation
Anonymity
Traceability
Protein Kinase C
1 Citation (Scopus)

Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Security and Trust Management - 14th International Workshop, STM 2018, Proceedings. Alcaraz, C., Katsikas, S. K. & Katsikas, S. K. (eds.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11091 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Revocation
Lattice vibrations
Joining
Group Scheme
1 Citation (Scopus)

Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Proceedings. Guerrieri, A., Jung, J. J., Fortino, G., Sun, J. & Xiang, Y. (eds.). Springer-Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11226 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Group Signature
Revocation
Costs
Group Scheme
Signature Scheme

Perfectly secure message transmission against rational timid adversaries

Fujita, M., Yasunaga, K. & Koshiba, T., 2018 Jan 1, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer-Verlag, p. 127-144 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptographic Protocols
Game
Security Model
Violate
Receiver
1 Citation (Scopus)

Privacy-preserving equality test towards big data

Saha, T. K. & Koshiba, T., 2018 Jan 1, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Springer-Verlag, p. 95-110 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Privacy Preserving
Equality
Cryptography
Batch
Homomorphic Encryption
1 Citation (Scopus)

Private comparison protocol and its application to range queries

Saha, T. K., Mayank, Deevashwer & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 10th International Conference, IDCS 2017, Proceedings. Springer-Verlag, p. 128-141 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10794 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Range Query
Cryptography
Homomorphic Encryption
Ring
Integer

Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication

Hayashi, M. & Koshiba, T., 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 2614-2618 5 p. 8437751

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Message Authentication
Secret Sharing
Authentication
Secret Sharing Scheme
Galois field
2017
6 Citations (Scopus)

An enhancement of privacy-preserving wildcards pattern matching

Saha, T. K. & Koshiba, T., 2017, Foundations and Practice of Security - 9th International Symposium, FPS 2016, Revised Selected Papers. Springer Verlag, Vol. 10128 LNCS. p. 145-160 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pattern matching
Privacy Preserving
Pattern Matching
Enhancement
Cryptography
3 Citations (Scopus)

Big data cloud deduplication based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 8, Proceedings - 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7944949

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Servers
Information management
Explosions
Big data
3 Citations (Scopus)

Efficient protocols for private database queries

Saha, T. K., Mayank & Koshiba, T., 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Springer Verlag, Vol. 10359 LNCS. p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Query Processing
Query
Networks (circuits)
Equality
1 Citation (Scopus)

Fully secure lattice-based group signatures with verifier-local revocation

Nisansala, M., Perera, S. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 795-802 8 p. 7920989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Private conjunctive query over encrypted data

Saha, T. K. & Koshiba, T., 2017, Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Springer Verlag, Vol. 10239 LNCS. p. 149-164 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10239 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Query processing
Cryptography
Query
Homomorphic Encryption
Query Processing
5 Citations (Scopus)

Private Equality Test Using Ring-LWE Somewhat Homomorphic Encryption

Saha, T. K. & Koshiba, T., 2017 Jun 6, Proceedings - Asia-Pacific World Congress on Computer Science and Engineering 2016 and Asia-Pacific World Congress on Engineering 2016, APWC on CSE/APWCE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. 7941933

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Experiments

Secure deduplication in a multiple group signature setting

Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servers
Cryptography
Managers
Network protocols
1 Citation (Scopus)

Secure SMS transmission based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile computing
Cryptography
Broadband networks
Communication
Short message service
2016

Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes

Yasuda, M., Shimoyama, T., Abe, N., Yamada, S., Shinzaki, T. & Koshiba, T., 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Springer Verlag, Vol. 9482. p. 117-133 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9482).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Error-correcting Codes
Privacy Preserving
Biometrics
Template
Privacy
2015

Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption

Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Networks (circuits)
12 Citations (Scopus)

Secure statistical analysis using RLWE-based homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Springer Verlag, Vol. 9144. p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Cryptography
Statistical Analysis
Statistical methods
Integer
2014
27 Citations (Scopus)

Practical packing method in somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, Vol. 8247 LNCS. p. 34-50 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Packing
Cryptography
Hamming distance
Hamming Distance
8 Citations (Scopus)

Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Proceedings. Springer Verlag, Vol. 8544 LNCS. p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8544 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Pattern matching
Privacy Preserving
Pattern Matching
Cryptography
2013
29 Citations (Scopus)

Packed homomorphic encryption based on ideal lattices and its application to biometrics

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Proceedings. Vol. 8128 LNCS. p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Lattice Ideal
Homomorphic Encryption
Hamming Distance
Biometrics
Hamming distance
46 Citations (Scopus)

Secure pattern matching using somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pattern matching
Cryptography
Hamming distance
Biometrics
Authentication
2011

Public discussion must be back and forth in secure message transmission

Koshiba, T. & Sawada, S., 2011, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. Vol. 6829 LNCS. p. 325-337 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Receiver
Optimality
Disjoint
Resources
Necessary
2009

Reducing complexity assumptions for oblivious transfer

Cheong, K. Y. & Koshiba, T., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. Vol. 5824 LNCS. p. 110-124 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oblivious Transfer
Defects
Permutation
Cryptography
Enhancement
1 Citation (Scopus)

Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function

Koshiba, T. & Odaira, T., 2009, Theory of Quantum Computation, Communication, and Cryptography - 4th Workshop, TQC 2009, Revised Selected Papers. Vol. 5906 LNCS. p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5906 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

One-way Function
Constructible
Commitment
Permutation
4 Citations (Scopus)

Strengthening the security of distributed oblivious transfer

Cheong, K. Y., Koshiba, T. & Nishiyama, S., 2009, Information Security and Privacy - 14th Australasian Conference, ACISP 2009, Proceedings. Vol. 5594 LNCS. p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5594 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Oblivious Transfer
Security of data
Strengthening
Interpolation
Polynomials
2008

Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

Kurosawa, K. & Koshiba, T., 2008, Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings. Vol. 5155 LNCS. p. 199-209 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5155 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Amplification
Privacy
Strings
Randomness Extractors
Hash functions
2002
9 Citations (Scopus)

Multiple linear cryptanalysis of a reduced round RC6

Shimoyama, T., Takenaka, M. & Koshiba, T., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Springer Verlag, Vol. 2365. p. 76-88 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear Cryptanalysis
Block Cipher
Attack
3 Citations (Scopus)

On sufficient randomness for secure public-key cryptosystems

Koshiba, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 34-47 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Randomness
Cryptography
Sufficient
Public Key Encryption
2001
2 Citations (Scopus)

A new aspect for security notions: Secure randomness in public-key encryption schemes

Koshiba, T., 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Springer Verlag, Vol. 1992. p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Randomness
Cryptography
Semantics
Equivalence
6 Citations (Scopus)

Polynomial-time algorithms for the equivalence for one-way quantum finite automata

Koshiba, T., 2001, Algorithms and Computation - 12th International Symposium, ISAAC 2001, Proceedings. Vol. 2223 LNCS. p. 268-278 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2223 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Finite Automata
Finite automata
Polynomial-time Algorithm
Equivalence
Polynomials
2000

A technique for boosting the security of cryptographic systems with one-way hash functions

Koshiba, T., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Springer Verlag, Vol. 1787. p. 76-81 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

One-way Hash Function
Hash functions
Hash Function
Boosting
One-way Function
1996

Decision tree learning system with switching evaluator

Koshiba, T., 1996, Advances in Artificial Intelligence - 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 1996, Proceedings. Springer Verlag, Vol. 1081. p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1081).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning Systems
Decision trees
Decision tree
Learning systems
Local Algorithms
1995
4 Citations (Scopus)

Learning strongly deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1995, Algorithmic Learning Theory - 6th International Workshop, ALT 1995, Proceedings. Springer Verlag, Vol. 997. p. 41-54 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 997).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Grammar
Learning Algorithm
Updating
Linear Time
9 Citations (Scopus)

Typed pattern languages and their learnability

Koshiba, T., 1995, Computational Learning Theory - 2nd European Conference, EuroCOLT 1995, Proceedings. Springer Verlag, Vol. 904. p. 367-379 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pattern Language
Learnability
Formal languages
Elasticity
Finite Elasticity
1993
8 Citations (Scopus)

Text classification and keyword extraction by learning decision trees

Sakakibara, Y., Misue, K. & Koshiba, T., 1993, Proceedings of the Conference on Artificial Intelligence Applications. Publ by IEEE, 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decision trees
Learning algorithms
Learning systems
Processing