• 462 Citations
  • 12 h-Index
1993 …2020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution

Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Proceedings. Kikuchi, H. & Su, C. (eds.). Springer-Verlag, p. 229-247 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11125 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Achieving full security for lattice-based group signatures with verifier-local revocation

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Information and Communications Security - 20th International Conference, ICICS 2018, Proceedings. Blanc, G., Qing, S., Lu, R., Zhang, Z., Meddahi, A., Naccache, D., Xu, S. & Samarati, P. (eds.). Springer-Verlag, p. 287-302 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11149 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Achieving Strong Security and Verifier-Local Revocation for Dynamic Group Signatures from Lattice Assumptions

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Security and Trust Management - 14th International Workshop, STM 2018, Proceedings. Alcaraz, C., Katsikas, S. K. & Katsikas, S. K. (eds.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11091 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Almost-Fully Secured Fully Dynamic Group Signatures with Efficient Verifier-Local Revocation and Time-Bound Keys

Perera, M. N. S. & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 11th International Conference, IDCS 2018, Proceedings. Guerrieri, A., Jung, J. J., Fortino, G., Sun, J. & Xiang, Y. (eds.). Springer-Verlag, p. 134-147 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11226 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

An enhancement of privacy-preserving wildcards pattern matching

Saha, T. K. & Koshiba, T., 2017, Foundations and Practice of Security - 9th International Symposium, FPS 2016, Revised Selected Papers. Springer Verlag, Vol. 10128 LNCS. p. 145-160 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

A new aspect for security notions: Secure randomness in public-key encryption schemes

Koshiba, T., 2001, Public Key Cryptography - 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Proceedings. Springer Verlag, Vol. 1992. p. 87-103 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1992).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

A technique for boosting the security of cryptographic systems with one-way hash functions

Koshiba, T., 2000, Information Security and Cryptology - ICISC 1999 - 2nd International Conference, Proceedings. Springer Verlag, Vol. 1787. p. 76-81 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1787).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Big data cloud deduplication based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 8, Proceedings - 3rd IEEE International Conference on Big Data Computing Service and Applications, BigDataService 2017. Institute of Electrical and Electronics Engineers Inc., p. 265-270 6 p. 7944949

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Decision tree learning system with switching evaluator

Koshiba, T., 1996, Advances in Artificial Intelligence - 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI 1996, Proceedings. Springer Verlag, Vol. 1081. p. 349-361 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 1081).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Efficient protocols for private database queries

Saha, T. K., Mayank & Koshiba, T., 2017 Jan 1, Data and Applications Security and Privacy XXXI - 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Proceedings. Zhu, S. & Livraga, G. (eds.). Springer Verlag, p. 337-348 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10359 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Citations (Scopus)

Fully secure lattice-based group signatures with verifier-local revocation

Nisansala, M., Perera, S. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 795-802 8 p. 7920989

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Learning strongly deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1995, Algorithmic Learning Theory - 6th International Workshop, ALT 1995, Proceedings. Springer Verlag, Vol. 997. p. 41-54 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 997).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Multiple linear cryptanalysis of a reduced round RC6

Shimoyama, T., Takenaka, M. & Koshiba, T., 2002, Fast Software Encryption - 9th International Workshop, FSE 2002, Revised Papers. Springer Verlag, Vol. 2365. p. 76-88 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2365).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

New assumptions on isogenous pairing groups with applications to attribute-based encryption

Koshiba, T. & Takashima, K., 2019 Jan 1, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer-Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

On sufficient randomness for secure public-key cryptosystems

Koshiba, T., 2002, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, Vol. 2274. p. 34-47 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2274).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Packed homomorphic encryption based on ideal lattices and its application to biometrics

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013, Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Proceedings. p. 55-74 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8128 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

32 Citations (Scopus)

Perfectly Secure Message Transmission Against Independent Rational Adversaries

Yasunaga, K. & Koshiba, T., 2019, Decision and Game Theory for Security - 10th International Conference, GameSec 2019, Proceedings. Alpcan, T., Vorobeychik, Y., Baras, J. S. & Dán, G. (eds.). Springer, p. 563-582 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11836 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Perfectly secure message transmission against rational timid adversaries

Fujita, M., Yasunaga, K. & Koshiba, T., 2018 Jan 1, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer-Verlag, p. 127-144 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Polynomial-time algorithms for the equivalence for one-way quantum finite automata

Koshiba, T., 2001 Dec 1, Algorithms and Computation - 12th International Symposium, ISAAC 2001, Proceedings. p. 268-278 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2223 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Practical packing method in somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014, Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Revised Selected Papers. Springer Verlag, Vol. 8247 LNCS. p. 34-50 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8247 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

28 Citations (Scopus)

Privacy-preserving equality test towards big data

Saha, T. K. & Koshiba, T., 2018 Jan 1, Foundations and Practice of Security - 10th International Symposium, FPS 2017, Revised Selected Papers. Springer-Verlag, p. 95-110 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10723 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes

Yasuda, M., Shimoyama, T., Abe, N., Yamada, S., Shinzaki, T. & Koshiba, T., 2016, Foundations and Practice of Security - 8th International Symposium, FPS 2015, Revised Selected Papers. Springer Verlag, Vol. 9482. p. 117-133 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9482).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2014 Jan 1, Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Proceedings. Springer Verlag, p. 338-353 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8544 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

15 Citations (Scopus)

Private comparison protocol and its application to range queries

Saha, T. K., Mayank, Deevashwer & Koshiba, T., 2018 Jan 1, Internet and Distributed Computing Systems - 10th International Conference, IDCS 2017, Proceedings. Springer-Verlag, p. 128-141 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10794 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Private conjunctive query over encrypted data

Saha, T. K. & Koshiba, T., 2017, Progress in Cryptology - AFRICACRYPT 2017 - 9th International Conference on Cryptology in Africa, Proceedings. Springer Verlag, Vol. 10239 LNCS. p. 149-164 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10239 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Private Equality Test Using Ring-LWE Somewhat Homomorphic Encryption

Saha, T. K. & Koshiba, T., 2017 Jun 6, Proceedings - Asia-Pacific World Congress on Computer Science and Engineering 2016 and Asia-Pacific World Congress on Engineering 2016, APWC on CSE/APWCE 2016. Institute of Electrical and Electronics Engineers Inc., p. 1-5 5 p. 7941933

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)

Public discussion must be back and forth in secure message transmission

Koshiba, T. & Sawada, S., 2011 Sep 20, Information Security and Cryptology, ICISC 2010 - 13th International Conference, Revised Selected Papers. p. 325-337 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6829 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reducing complexity assumptions for oblivious transfer

Cheong, K. Y. & Koshiba, T., 2009 Dec 1, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 110-124 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption

Yasuda, M., Koshiba, T., Shimoyama, T., Kogure, J. & Yokoyama, K., 2015 Apr 14, SCC 2015 - Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, part of ASIACCS 2015. Association for Computing Machinery, Inc, p. 53-61 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure deduplication in a multiple group signature setting

Cho, E. M. & Koshiba, T., 2017 May 5, Proceedings - 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017. Institute of Electrical and Electronics Engineers Inc., p. 811-818 8 p. 7920991

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Secure pattern matching using somewhat homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2013 Dec 9, CCSW 2013 - Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013. p. 65-76 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

52 Citations (Scopus)

Secure SMS transmission based on verifiable hash convergent group signcryption

Cho, E. M. & Koshiba, T., 2017 Jun 29, Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017. Institute of Electrical and Electronics Engineers Inc., p. 332-335 4 p. 7962472

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Secure statistical analysis using RLWE-based homomorphic encryption

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015, Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Proceedings. Springer Verlag, Vol. 9144. p. 471-487 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

12 Citations (Scopus)

Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy amplification

Kurosawa, K. & Koshiba, T., 2008 Oct 27, Information Theoretic Security - Third International Conference, ICITS 2008, Proceedings. p. 199-209 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5155 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistically-hiding quantum bit commitment from approximable-preimage-size quantum one-way function

Koshiba, T. & Odaira, T., 2009 Dec 1, Theory of Quantum Computation, Communication, and Cryptography - 4th Workshop, TQC 2009, Revised Selected Papers. p. 33-46 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5906 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

Strengthening the security of distributed oblivious transfer

Cheong, K. Y., Koshiba, T. & Nishiyama, S., 2009 Nov 9, Information Security and Privacy - 14th Australasian Conference, ACISP 2009, Proceedings. p. 377-388 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5594 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Text classification and keyword extraction by learning decision trees

Sakakibara, Y., Misue, K. & Koshiba, T., 1993 Jan 1, Proceedings of the Conference on Artificial Intelligence Applications. Publ by IEEE, 1 p. (Proceedings of the Conference on Artificial Intelligence Applications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Typed pattern languages and their learnability

Koshiba, T., 1995 Jan 1, Computational Learning Theory - 2nd European Conference, EuroCOLT 1995, Proceedings. Vitanyi, P. (ed.). Springer Verlag, p. 367-379 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 904).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

9 Citations (Scopus)

Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication

Hayashi, M. & Koshiba, T., 2018 Aug 15, 2018 IEEE International Symposium on Information Theory, ISIT 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-June. p. 2614-2618 5 p. 8437751

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)