Takeshi Koshiba

教授

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
1993 …2021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    A Guests Managing System with Lattice-Based Verifier-Local Revocation Group Signature Scheme with Time-Bound Keys

    Perera, M. N. S. & Koshiba, T., 2021, Proceedings of the Fifth International Conference on Mathematics and Computing - ICMC 2019. Giri, D., Ho, A. T. S., Ponnusamy, S. & Lo, N-W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 81-96 16 p. (Advances in Intelligent Systems and Computing; vol. 1170).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhanced Secure Comparison Schemes Using Homomorphic Encryption

    Wang, L., Saha, T. K., Aono, Y., Koshiba, T. & Moriai, S., 2021, Advances in Networked-Based Information Systems - The 23rd International Conference on Network-Based Information Systems, NBiS 2020. Barolli, L., Li, K. F., Enokido, T. & Takizawa, M. (eds.). Springer, p. 211-224 14 p. (Advances in Intelligent Systems and Computing; vol. 1264 AISC).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2020

    Fourier-based Verifiable Function Secret Sharing

    Koshiba, T., 2020 Oct 24, Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020. Institute of Electrical and Electronics Engineers Inc., p. 442-446 5 p. 9366176. (Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    New assumptions on isogenous pairing groups with applications to attribute-based encryption

    Koshiba, T. & Takashima, K., 2019, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Perfectly Secure Message Transmission Against Independent Rational Adversaries

    Yasunaga, K. & Koshiba, T., 2019, Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Proceedings. Alpcan, T., Vorobeychik, Y., Baras, J. S. & Dán, G. (eds.). Springer, p. 563-582 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11836 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2018

    Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation

    Perera, M. N. S. & Koshiba, T., 2018, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer Verlag, p. 229-247 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Achieving full security for lattice-based group signatures with verifier-local revocation

    Perera, M. N. S. & Koshiba, T., 2018, Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S. & Samarati, P. (eds.). Springer Verlag, p. 287-302 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11149 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions

    Perera, M. N. S. & Koshiba, T., 2018, Security and Trust Management - 14th International Workshop, STM 2018, Proceedings. Alcaraz, C., Katsikas, S. K. & Katsikas, S. K. (eds.). Springer Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11091 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys

    Perera, M. N. S. & Koshiba, T., 2018, Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Proceedings. Guerrieri, A., Jung, J. J., Fortino, G., Sun, J. & Xiang, Y. (eds.). Springer Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11226 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Perfectly secure message transmission against rational timid adversaries

    Fujita, M., Yasunaga, K. & Koshiba, T., 2018, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer Verlag, p. 127-144 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Privacy-preserving equality test towards big data

    Saha, T. K. & Koshiba, T., 2018, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Imine, A., Fernandez, J. M., Logrippo, L., Marion, J-Y. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 95-110 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Private comparison protocol and its application to range queries

    Saha, T. K., Mayank, Deevashwer & Koshiba, T., 2018, Internet and Distributed Computing Systems - 10th International Conference, IDCS 2017, Proceedings. Di Fatta, G., Guerrieri, A., Pathan, M., Fortino, G. & Ali, A. B. (eds.). Springer Verlag, p. 128-141 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10794 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication

    Hayashi, M. & Koshiba, T., 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., p. 2614-2618 5 p. 8437751. (IEEE International Symposium on Information Theory - Proceedings; vol. 2018-June).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2017

    An enhancement of privacy-preserving wildcards pattern matching

    Saha, T. K. & Koshiba, T., 2017, Foundations and Practice of Security - 9th International Symposium, FPS 2016, Revised Selected Papers. Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Wang, L. & Tawbi, N. (eds.). Springer Verlag, p. 145-160 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10128 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • Big data cloud deduplication based on verifiable hash convergent group signcryption

    Cho, E. M. & Koshiba, T., 2017 Jun 8, Proceedings - 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7944949

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Efficient protocols for private database queries

    Saha, T. K., Mayank & Koshiba, T., 2017, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Fully secure lattice-based group signatures with verifier-local revocation

    Nisansala, M., Perera, S. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 795-802 8 p. 7920989

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Private conjunctive query over encrypted data

    Saha, T. K. & Koshiba, T., 2017, Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Joye, M. (eds.). Springer Verlag, p. 149-164 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10239 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Private Equality Test Using Ring-LWE Somewhat Homomorphic Encryption

    Saha, T. K. & Koshiba, T., 2017 Jun 6, Proceedings - Asia-Pacific World Congress on Computer Science and Engineering 2016 and Asia-Pacific World Congress on Engineering 2016, APWC on CSE/APWCE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. 7941933

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • Secure deduplication in a multiple group signature setting

    Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure SMS transmission based on verifiable hash convergent group signcryption

    Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472. (Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2016

    Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes

    Yasuda, M., Shimoyama, T., Abe, N., Yamada, S., Shinzaki, T. & Koshiba, T., 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Garcia-Alfaro, J., Bonfante, G. & Kranakis, E. (eds.). Springer Verlag, p. 117-133 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9482).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2015

    Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption

    Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p. (SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure statistical analysis using RLWE-based homomorphic encryption

    Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Springer Verlag, p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • 2014

    Practical packing method in somewhat homomorphic encryption

    Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, p. 34-50 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    30 Citations (Scopus)
  • Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption

    Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Proceedings. Springer Verlag, p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8544 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • 2013

    Packed homomorphic encryption based on ideal lattices and its application to biometrics

    Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Proceedings. p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8128 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    35 Citations (Scopus)
  • Secure pattern matching using somewhat homomorphic encryption

    Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    63 Citations (Scopus)
  • 2011

    Public discussion must be back and forth in secure message transmission

    Koshiba, T. & Sawada, S., 2011 Sep 20, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. p. 325-337 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2009

    Reducing complexity assumptions for oblivious transfer

    Cheong, K. Y. & Koshiba, T., 2009 Dec 1, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 110-124 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function

    Koshiba, T. & Odaira, T., 2009 Dec 1, Theory of Quantum Computation, Communication, and Cryptography - 4th Workshop, TQC 2009, Revised Selected Papers. p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5906 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Strengthening the security of distributed oblivious transfer

    Cheong, K. Y., Koshiba, T. & Nishiyama, S., 2009 Nov 9, Information Security and Privacy - 14th Australasian Conference, ACISP 2009, Proceedings. p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5594 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • 2008

    Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

    Kurosawa, K. & Koshiba, T., 2008 Oct 27, Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings. p. 199-209 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5155 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2002

    Multiple linear cryptanalysis of a reduced round RC6

    Shimoyama, T., Takenaka, M. & Koshiba, T., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Springer Verlag, Vol. 2365. p. 76-88 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • On sufficient randomness for secure public-key cryptosystems

    Koshiba, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 34-47 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2001

    A new aspect for security notions: Secure randomness in public-key encryption schemes

    Koshiba, T., 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Springer Verlag, Vol. 1992. p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Polynomial-time algorithms for the equivalence for one-way quantum finite automata

    Koshiba, T., 2001 Dec 1, Algorithms and Computation - 12th International Symposium, ISAAC 2001, Proceedings. p. 268-278 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2000

    A technique for boosting the security of cryptographic systems with one-way hash functions

    Koshiba, T., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Springer Verlag, Vol. 1787. p. 76-81 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1996

    Decision tree learning system with switching evaluator

    Koshiba, T., 1996, Advances in Artificial Intelligence - 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 1996, Proceedings. Springer Verlag, Vol. 1081. p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1081).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1995

    Learning strongly deterministic even linear languages from positive examples

    Koshiba, T., Mäkinen, E. & Takada, Y., 1995, Algorithmic Learning Theory - 6th International Workshop, ALT 1995, Proceedings. Springer Verlag, Vol. 997. p. 41-54 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 997).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Typed pattern languages and their learnability

    Koshiba, T., 1995 Jan 1, Computational Learning Theory - 2nd European Conference, EuroCOLT 1995, Proceedings. Vitanyi, P. (ed.). Springer Verlag, p. 367-379 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 904).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 1993

    Text classification and keyword extraction by learning decision trees

    Sakakibara, Y., Misue, K. & Koshiba, T., 1993, Proceedings of the Conference on Artificial Intelligence Applications. Publ by IEEE, p. 466 1 p. (Proceedings of the Conference on Artificial Intelligence Applications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)