• 396 Citations
  • 12 h-Index
1993 …2019
If you made any changes in Pure these will be visible here soon.

Research Output 1993 2019

  • 396 Citations
  • 12 h-Index
  • 38 Conference contribution
  • 25 Article
  • 4 Chapter
  • 2 Editorial
Filter
Article
2019
1 Citation (Scopus)

Impossibility of perfectly-secure one-round delegated quantum computing for classical client

Morimae, T. & Koshiba, T., 2019 Mar 1, In : Quantum Information and Computation. 19, 3-4, p. 214-221 8 p.

Research output: Contribution to journalArticle

Quantum Computing
quantum computation
Servers
Network protocols
privacy
2018

Outsourcing private equality tests to the cloud

Saha, T. K. & Koshiba, T., 2018 Dec 1, In : Journal of Information Security and Applications. 43, p. 83-98 16 p.

Research output: Contribution to journalArticle

Outsourcing
Cryptography
Networks (circuits)
Query processing
Data mining
2017
3 Citations (Scopus)

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2017 Mar 1, In : Journal of Mathematical Cryptology. 11, 1, p. 1-24 24 p.

Research output: Contribution to journalArticle

Vector Lattice
Random Sampling
Decrease
Strictly
Sampling
2 Citations (Scopus)

Physical implementation of oblivious transfer using optical correlated randomness

Ito, T., Koizumi, H., Suzuki, N., Kakesu, I., Iwakawa, K., Uchida, A., Koshiba, T., Muramatsu, J., Yoshimura, K., Inubushi, M. & Davis, P., 2017 Dec 1, In : Scientific Reports. 7, 1, 8444.

Research output: Contribution to journalArticle

voting
privacy
preserving
optical fibers
semiconductor lasers
2015
13 Citations (Scopus)

New packing method in somewhat homomorphic encryption and its applications

Yasuda, M., Shimoyama, T., Kogure, J., Yokoyama, K. & Koshiba, T., 2015 Sep 10, In : Security and Communication Networks. 8, 13, p. 2194-2213 20 p.

Research output: Contribution to journalArticle

Cryptography
Hamming distance
Pattern matching
Biometrics
Cloud computing
2014
1 Citation (Scopus)

On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 2014 Sep 1, In : Journal of Mathematical Cryptology. 8, 3, p. 305-329 25 p.

Research output: Contribution to journalArticle

Homomorphic Encryption
Cryptography
Range of data
Evaluation
Lattice Ideal
2013
35 Citations (Scopus)

Ancilla-driven universal blind quantum computation

Sueki, T., Koshiba, T. & Morimae, T., 2013 Jun 6, In : Physical Review A - Atomic, Molecular, and Optical Physics. 87, 6, 060301.

Research output: Contribution to journalArticle

quantum computation
output
2012
8 Citations (Scopus)

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2012 Jul, In : Journal of Cryptology. 25, 3, p. 528-555 28 p.

Research output: Contribution to journalArticle

Quantum State
Cryptography
Hardness
Polynomials
Probability distributions
2008
4 Citations (Scopus)

A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions

Kurosawa, K., Kishimoto, W. & Koshiba, T., 2008 Jun, In : IEEE Transactions on Information Theory. 54, 6, p. 2566-2571 6 p.

Research output: Contribution to journalArticle

functionality
Entropy
entropy
scenario
2007
11 Citations (Scopus)

Low-density attack revisited

Izu, T., Kogure, J., Koshiba, T. & Shimoyama, T., 2007 Apr, In : Designs, Codes, and Cryptography. 43, 1, p. 47-59 13 p.

Research output: Contribution to journalArticle

Cryptography
Attack
Subset Sum Problem
Cryptosystem
Set theory
16 Citations (Scopus)

More on security of public-key cryptosystems based on chebyshev polynomials

Cheong, K. Y. & Koshiba, T., 2007, In : IEEE Transactions on Circuits and Systems II: Express Briefs. 54, 9, p. 795-799 5 p.

Research output: Contribution to journalArticle

Cryptography
Polynomials
2006
1 Citation (Scopus)

Progress in quantum computational cryptography

Kawachi, A. & Koshiba, T., 2006, In : Journal of Universal Computer Science. 12, 6, p. 691-709 19 p.

Research output: Contribution to journalArticle

Quantum computers
Cryptography
Quantum Computation
Public key cryptography
Quantum cryptography
2005
28 Citations (Scopus)

Computational indistinguishability between quantum states and its cryptographic application

Kawachi, A., Koshiba, T., Nishimura, H. & Yamakami, T., 2005, In : Lecture Notes in Computer Science. 3494, p. 268-284 17 p.

Research output: Contribution to journalArticle

Quantum State
Cryptography
Hardness
Factorization
Probability distributions
9 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2005 Nov 22, In : Theoretical Computer Science. 345, 2-3, p. 370-385 16 p.

Research output: Contribution to journalArticle

Permutation
Pseudorandom Generator
Quantum computers
Sufficient Conditions
Similar Tests
2004
12 Citations (Scopus)
Diffie-Hellman
Exponent
Discrete Logarithm Problem
Imply
Zero
3 Citations (Scopus)

Theoretical Analysis of χ2 Attack on RC6

Takenaka, M., Shimoyama, T. & Koshiba, T., 2004, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E87-A, 1, p. 28-36 9 p.

Research output: Contribution to journalArticle

Theoretical Analysis
Attack
Evaluation
Experiments
Block Cipher
2 Citations (Scopus)

Universal test for quantum one-way permutations

Kawachi, A., Kobayashi, H., Koshiba, T. & Putra, R. H., 2004, In : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3153, p. 839-850 12 p.

Research output: Contribution to journalArticle

Permutation
Pseudorandom Generator
Quantum computers
Similar Tests
One-way Function
2003
2 Citations (Scopus)
Theoretical Analysis
Attack
Evaluation
Experiments
Block Cipher
2001
3 Citations (Scopus)
Diffie-Hellman
Cryptographic Protocols
2000
2 Citations (Scopus)
Pseudorandom Generator
Public-key Cryptosystem
Cryptosystem
Randomness
Cryptography
1999
14 Citations (Scopus)

Inferring pure context-free languages from positive data

Koshiba, T., Mäkinen, E. & Takada, Y., 1999, In : Acta Cybernetica. 14, 3, p. 469-477 9 p.

Research output: Contribution to journalArticle

Context free languages
Context-free Languages
Grammar
Restriction
Language
1998
12 Citations (Scopus)

Enhancing D-ABDUCTOR towards a diagrammatic user interface platform

Misue, K., Nitta, K., Sugiyama, K., Koshiba, T. & Inder, R., 1998, In : International Conference on Knowledge-Based Intelligent Electronic Systems, Proceedings, KES. 1, p. 359-368 10 p.

Research output: Contribution to journalArticle

User interfaces
Visualization
1997
19 Citations (Scopus)

Learning deterministic even linear languages from positive examples

Koshiba, T., Mäkinen, E. & Takada, Y., 1997 Oct 10, In : Theoretical Computer Science. 185, 1, p. 63-79 17 p.

Research output: Contribution to journalArticle

Learning algorithms
Learning Algorithm
Grammar
Updating
Linear Time

On a hierarchy of slender languages based on control sets

Koshiba, T., 1997, In : Fundamenta Informaticae. 31, 1, p. 41-47 7 p.

Research output: Contribution to journalArticle

Context sensitive languages
Control Sets
Context free languages
Formal languages
Context-free Languages
1996

A Machine Learning Approach to Knowledge Acquisitions from Text Databases

Sakakibara, Y., Misue, K. & Koshiba, T., 1996, In : Plastics, Rubber and Composites Processing and Applications. 8, 3, p. 309-324 16 p.

Research output: Contribution to journalArticle

Knowledge acquisition
Learning systems
Decision trees
Learning algorithms
Processing