Publications

Papers(Peer reviewd)

  1. Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai and Junji Shikata, “Claimable Designated Verifier Signature”, Vol. E107-A, No.3, IEICE, March 2024. (To appear)
  2. Hyungrok Jo and Junji Shikata, “Revisiting the Algorithms for the Quaternion l-isogeny Path Problems”, MobiSec2023, December 2023. (To appear)
  3. Yohei Watanabe, Toi Tomita, Junji Shikata, “Lattice-based Multi-Entity Identification Protocols”, MobiSec2023, December 2023. (To appear)
  4. Toshiki Matsumine, Hideki Ochiai, Junji Shikata, “A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation from Wireless Channels”, IEEE Communications Letters, 2023. (To appear)
  5. Yoshinori Aono and Junji Shikata, “Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE”, Cryptology and Network Security, The 22nd International Conference on Cryptology and Network Security (CANS 2023), LNCS 14342, pp.28-50, Springer, 2023. DOI: 10.1007/978-981-99-7563-1_2
  6. Yohei Watanabe, Naoto Yanai,Junji Shikata, “IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures”, Information Security Practice and Experience, The 18th International Conference on Information Security Practice and Experience (ISPEC 2023), LNCS 14341, pp. 105-122, Springer, November 2023. DOI: 10.1007/978-981-99-7032-2_7
  7. Sohto Chiku, Keisuke Hara and Junji Shikata, “Chosen Ciphertext Security for Blind Identity-based Encryption with Certified Identities”, Information Security Practice and Experience, The 18th International Conference on Information Security Practice and Experience (ISPEC 2023), LNCS 14341, pp. 299-314, Springer, November 2023. DOI: 10.1007/978-981-99-7032-2_18
  8. Sohto Chiku, Keisuke Hara and Junji Shikata, “Identity-based Matchmaking Encryption Secure against Key Generation Center”, Provable and Practical Security, The 17th International Conference on Provable and Practical Security (ProvSec 2023), LNCS 14217, pp. 251-273, October 2023. DOI: 10.1007/978-3-031-45513-1_14
  9. Hyungrok Jo and Junji Shikata, “Bloomier Filters on 3-hypergraphs”, Proc. of The 24th World Conference on Information Security Applications (WISA 2023), August 2023.
  10. Jiawei Chen, Hyungrok Jo, Shingo Sato, Junji Shikata, “A Tightly Secure Identity-based Signature Scheme from Isogenies”, Post-Quantum Cryptography, The 14th International Conference on Post-Quantum Cryptography (PQCrypto 2023), LNCS 14154, pp. 141-163, Springer, August 2023. DOI: 10.1007/978-3-031-40003-2_6
  11. Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai and Junji Shikata, “Claimable Designated Verifier Signature”, Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop (APKC 2023), pp. 21-32, ACM, July 2023. DOI: 10.1145/3591866.3593071
  12. Kazuhiko Minematsu, Junji Shikata, Yohei Watanabe, Naoto Yanai, “Anonymous Broadcast Authentication with One-to-Many Transmission to Control IoT Devices,” IEEE Access, vol. 11, pp. 62955-62969, 2023. DOI: 10.1109/ACCESS.2023.3288337
  13. Shoichi Hirose and Junji Shikata, “Aggregate Entity Authentication Identifying Invalid Entities with Group Testing”, MDPI Electronics 2023, Volume 12, Issue 11, 2023. DOI: 10.3390/electronics12112479
  14. Hirokazu Kobayashi, Youhei Watanabe, Kazuhiko Minematsu, Junji Shikata, “Tight Lower Bounds and Optimal Constructions of Anonymous Broadcast Encryption and Authentication”, Designs, Codes, and Cryptography (DCC), April 2023. DOI: 10.1007/s10623-023-01211-x
  15. Shoichi Hirose and Junji Shikata, “Group-Testing Aggregate Entity Authentication”, 2023 IEEE Information Theory Workshop (ITW), Saint-Malo, France, April 2023, pp. 227-231, IEEE Xplore. DOI: 10.1109/ITW55543.2023.10160240
  16. Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata, “Authenticated Encryption for Very Short Inputs”, Topics in Cryptology – CT-RSA 2023, Lecture Notes in Computer Science, vol 13871, pp.553-572, Springer, The Cryptographers' Track at RSA Conference (CT-RSA 2023), April 2023. DOI: 10.1007/978-3-031-30872-7_21
  17. Yexuan Liu, Yohei Watanabe, Junji Shikata, “Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency”, 2023 57th Annual Conference on Information Sciences and Systems (CISS), March 2023. (To appear)
  18. Rodrigo Matos Carnier, Li Yue, Yasutaka Fujimoto, Junji Shikata, “Exact Markov Chain for Random Propagation of IoT Malware and Novel Mitigation System”, IEEE Internet of Things Journal, 2023. (To appear)
  19. Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata, “Authenticated Encryption for Very Short Inputs”, The Cryptographers' Track at RSA Conference (CT-RSA 2023), Springer, 2023. (To appear)
  20. Yohei Watanabe, Takenobu Seito, Junji Shikata, “Multi-Designated Receiver Authentication Codes: Models and Constructions”, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E106-A, No.3, pp.394-405, March 2023.
  21. Yuto Hama, Kazuaki Hanazawa, Hideki Ochiai, and Junji Shikata, "Performance Analysis for Coded Wireless Steganography System with OFDM Signaling", IEEE Radio & Wireless Week (IEEE RWW2023), Las Vegas, Nevada, USA, January 2023.
  22. Shingo Sato, Junji Shikata, “Identity-based Interactive Aggregate Signatures from Lattices”, Proc. of ICISC2022, Springer, 2022.
  23. Shingo Sato, Junji Shikata, Tsutomu Matsumoto, “Group Testing Aggregate Signatures with Soundness”, ICISC2022, Springer, 2022.
  24. Toshiki Matsumine, Hideki Ochiai, Junji Shikata, “Security Gap Improvement of BICM Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel”, IEEE Access, May 2022.
  25. Shingo Sato, Junji Shikata, “Quantum-Secure Aggregate One-time Signature with Detecting Functionality”, The 36-th International Conference on Advanced Information Networking and Applications (AINA2022), April 2022.
  26. Takenobu Seito, Junji Shikata, Yohei Watanabe, “Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security”, Proc. of the 56th Annual Conference on Information Sciences and Systems (CISS2022), March 9-11, 2022. IEEE Xplore. DOI: 10.1109/CISS53076.2022.9751164
  27. Yuto Hama, Hideki Ochiai, Junji Shikata, “Performance Analysis of Wireless Steganography based on OFDM and DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels,” Proc. of The 24th International Symposium On Wireless Personal Multimedia Communications (WPMC2021), December 14-16, 2021, IEEE Xplore. DOI: 10.1109/WPMC52694.2021.9700466
  28. Hirokazu Kobayashi, Yohei Watanabe, Junji Shikata, “Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication”, Proc. of 18th IMA International Conference (IMACC2021), Cryptography and Coding, LNCS 13129, pp. 105-128, Springer, December 2021. DOI: 10.1007/978-3-030-92641-0_6
  29. Masahiro Ebina, Jumpei Mita, Junji Shikata, Yohei Watanabe, “Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption”, Proc. of The 8th ACM on ASIA Public-Key Cryptography Workshop (APKC 2021), pp.23-32, ACM, May 2021. DOI: 10.1145/3457338.3458296
  30. Yohei. Watanabe, Naoto Yanai, Junji Shikata, “Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices”, The 35th International Conference on Advanced Information Networking and Applications (AINA2021), pp.679-690, April, 2021. DOI: 10.1007/978-3-030-75075-6_56
  31. Rodrigo Matos Carnier, Yue Li, Junji Shikata, Yasutaka Fujimoto, “Modeling of Malware Propagation in IoT Network and Mitigation in Area based on Local Routing Depth”, IEEJ International Workshop on Sensing, Actuation, Motion Control, and Optimization (SAMCON 2021), The Institute of Electrical Engineers of Japan (IEEJ), Online, March 2021.
  32. M. Ebina, J. Mita, J. Shikata and Y. Watanabe, “Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption”, The 8th ACM ASIA Public-Key Cryptography Workshop (APKC 2021), June 2021. (To appear)
  33. Y. Watanabe, N. Yanai, J. Shikata, “Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices”, The 35-th International Conference on Advanced Information Networking and Applications (AINA2021), May 2021.(To appear)
  34. S. Hirose and J. Shikata, “Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing”, IEEE Access, Volume 8, pp. 216116-216126, December 2020. The paper is also available here.
  35. J. Ida, J. Shikata and Y. Watanabe, “On the Power of Interaction in Signcryption”, ISITA2020, IEEE, 2020.
  36. Y. Ogawa, S. Sato, J. Shikata and H. Imai, “Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes”, Proc. of 2020 IEEE International Symposium on Information Theory (ISIT 2020), June 2020. The paper is also available here.
  37. R. Yamaguchi, H. Ochiai and J. Shikata, “Physical-Layer Security Based on Wireless Steganography Through OFDM and DFT-Precoded OFDM Signals”, Proc. of The 2020 IEEE 91st Vehicular Technology Conference (VTC2020-Spring), May 25-28, Antwerp, Belgium. IEEE Xplore. The paper is also available here.
  38. S. Sato, S. Hirose and J. Shikata, “Sequential Aggregate MACs with Detecting Functionality Revisited”, Network and System Security (NSS 2019), Lecture Notes in Computer Science, vol. 11928, Springer, pp. 387-407, December 2019.
  39. S. Hirose and J. Shikata, “Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme”, 2019 Seventh International Symposium on Computing and Networking Workshops (CANDARW), Volume 1, pp. 327-332, IEEE Computer Society, November 2019.
  40. S. Sato and J. Shikata, “SO-CCA secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model”, Cryptography and Coding (IMACC 2019), Lecture Notes in Computer Science, vol.11929, pp. 317-341, Springer, November 2019.
  41. S. Sato and J. Shikata, “Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes”, Cryptography and Coding (IMACC 2019), Lecture Notes in Computer Science, vol.11929, pp. 295-316, Springer, November 2019.
  42. S. Hirose and J. Shikata, “History-Free Sequential Aggregate MAC Revisited”, Provable Security (ProvSec 2019), Lecture Notes in Computer Science, vol. 11821, pp. 77-93, Springer, September 2019.
  43. J. Shikata and Y. Watanabe, “Identity-based Encryption with Hierarchical Key-insulation in the Standard Model”, Designs, Codes and Cryptography, Volume 87, Issue 5, pp 1005–1033, Springer, May 2019.
  44. S. Sato, S. Hirose, and J. Shikata, “Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality”, Journal of Internet Services and Information Security (JISIS), Volume 9, Issue 1, pp. 2-23, February 2019.
  45. S. Sato, and J. Shikata, “Interactive Aggregate Message Authentication Scheme with Detecting Functionality”, The 33-rd International Conference on Advanced Information Networking and Applications (AINA-2019), pp. 1316-1328, Springer, March 27-29, 2019.
  46. A. Prasitsupparote, Y. Watanabe, J. Sakamoto, J. Shikata, and T. Matsumoto, “Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices”, International Journal of Digital Information and Wireless Communications (IJDIWC), Volume 8, Issue 4, pp. 288-303, 2019.
  47. A. Prasitsupparote, Y. Watanabe, and J. Shikata, “Implementation and Analysis of Fully Homomorphic Encryption in Wearable Devices”, The Fourth International Conference on Information Security and Digital Forensics (ISDF 2018), The Society of Digital Information and Wireless Communications, pp. 1-14, 2018.
  48. A. Prasitsupparote, N. Konno and J. Shikata, “Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences”, Entropy 2018, 20 (10), 729, September 2018.
  49. S. Hirose and J. Shikata, “Non-adaptive Group-Testing Aggregate MAC Schemes”, The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), LNCS 11125, pp. 357-372, Springer, September 2018.
  50. S. Sato, S. Hirose, and J. Shikata, “Generic Construction of Sequential Aggregate MACs from Any MACs”, The 12th International Conference on Provable Security (ProvSec 2018), LNCS 11192, Springer, pp. 295-312, October 2018.
  51. S. Sato and J. Shikata, “Signcryption with Quantum Random Oracles”, The 12th International Conference on Provable Security (ProvSec 2018), LNCS 11192, Springer, pp. 406-414, October 2018.
  52. Y. Aono, P. Q. Nguyen, T. Seito, and J. Shikata, “Lower Bounds on Lattice Enumeration with Extreme Pruning”, Advances in Cryptology ? CRYPTO 2018, LNCS 10992, pp. 608-637, Springer, August 2018.
  53. S. Sato and J. Shikata, “Lattice-based Signcryption without Random Oracles”, International Conference on Post-Quantum Cryptography (PQCrypto 2018), Post-Quantum Cryptography, Fort Lauderdale, FL, USA, April 9-11, 2018. LNCS 10786, pp.331-351, Springer, April 2018.
  54. M. Iwamoto, K. Ohta, and J. Shikata, “Security Formalizations and Their Relationships for Encryption and Key Agreement in Information Theoretic Cryptography”, IEEE Transactions on Information Theory, Vol. 64, No. 1, pp. 654-685, January 2018.
  55. Y. Watanabe and J. Shikata, “Timed-Release Computational Secret Sharing Scheme and Threshold Encryption”, Designs, Codes and Cryptography, Volume 86, Number 1, pp. 17-54, January 2018.
  56. J. Shikata, “Tighter Bounds on Entropy of Secret Keys in Authentication Codes”, Proc. of 2017 IEEE Information Theory Workshop (ITW2017), November 2017, Taiwan, pp.259-263, IEEE Xplore.
  57. Y. Ishida, J. Shikata, and Y. Watanabe, “CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance”, International Journal on Applied Cryptography (IJACT), vol.3, no.3, pp.288-311, 2017.
  58. A. Prasitsupparote, N. Konno, and J. Shikata, “Numerical Analysis of Elias's and Peres's Deterministic Extractors”, Proc. of 2017 Annual Conference on Information Science and Systems (CISS), Baltimore, Maryland, March 2017, IEEE Xplore.
  59. T. Yoshizawa, Y. Watanabe, and J. Shikata, “Unconditionally Secure Searchable Encryption”, Proc. of 2017 Annual Conference on Information Science and Systems (CISS), Baltimore, Maryland, USA, March 2017, pp.1-6, IEEE Xplore.
  60. Y. Watanabe, G. Hanaoka, J. Shikata, “Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness,” Information Theoretic Security (ICITS 2016), LNCS 10015, pp.213-237, Springer, November 2016.
  61. Y. Watanabe and J. Shikata, “Information-Theoretically Secure Timed-Release Secret Sharing Schemes,” Journal of Information Processing, Vol.24, No.4, pp.680-689, July 2016.
  62. Y. Watanabe and J. Shikata, “Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Strage,” Special Section on Discrete Mathematics and Its Applications, IEICE Transactions, vol.99-A, no.6, pp.1097-1106, June 2016.
  63. J. Su, K. Yoshioka, J. Shikata, T. Matsumoto, “An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis”, Proc. of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), pp.3-11, ACM, May 2016.
  64. S. Tomita, Y. Watanabe and J. Shikata, “Sequential Aggregate Authentication Codes with Information Theoretic Security,” 50th Annual Conference on Information Sciences and Systems (CISS 2016), Princeton, USA, March 16th-18th, 2016.
  65. Y. Watanabe and J. Shikata, “Identity-based Hierarchical Key-insulated Encryption without Random Oracles,” Proc. of 19th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2016), Taipei, Taiwan, March 6th-9th, 2016. The paper is also available here.
  66. S. Goto and J. Shikata, “A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer,” Proc. of the 15th IMA International Conference on Cryptography and Coding (IMACC 2015), LNCS 9496, Springer, Oxford, UK, December 15th-17th, 2015. The full version is here.
  67. J. Su, K. Yoshioka, J. Shikata and T. Matsumoto, “Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection,” Proc. of the The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), LNCS, Springer, Seoul, Korea, November 25th-27th, 2015.
  68. Y. Watanabe and J. Shikata, “Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage,” Proc. of the 9th International Conference on Provable Security (ProvSec 2015), LNCS 9451, pp.489-502, Springer, Kanazawa, Japan, November 24th-26th, 2015. (short paper)
  69. K. Emura, L. T. Phong, and Y. Watanabe, “Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability, ” Proc. of the 14th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015), Helsinki, Finland, August 20-22, 2015.
  70. Y. Ishida, Y. Watanabe, and J. Shikata, “Constructions of CCA-secure Revocable Identity-based Encryption, ” Proc. of the 20th Australasian Conference in Information Security and Privacy (ACISP 2015), LNCS 9144, pp.174-191, Brisbane, Australia, June 29-July 1, 2015.
  71. M. Iwamoto and J. Shikata, “Construction of symmetric-key encryption with guessing secrecy,” Proc. of IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong, June, 2015.
  72. N. Takei, Y. Watanabe and J. Shikata, “Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys,” Proc. of Annual Workshop on Statisitcal Science and Related Topics, Josai Mathematical Monograph 8, pp.115-133, Tokyo, Japan, December 7th, 2014.
  73. Y. Watanabe and J. Shikata, “Timed-Release Secret Sharing Schemes with Information Theoretic Security,” Proc. of the 1st International Conference on Cryptography and Information Security in Balkans (BalkanCryptSec2014), LNCS 9024, pp.219-236, Istanbul, Turkey, October 16th-17th, 2014. The paper is also available here.
  74. Y. Watanabe and J. Shikata, “Timed-Release Computational Secret Sharing Scheme and Its Applications,” Proc. of the 8th International Conference on Provable Security (ProvSec2014), LNCS 8782, pp.326-333, Springer, Hong Kong, October 9th-10th, 2014. (short paper)
  75. M. Iwamoto and J. Shikata, “Secret Sharing Schemes Based on Min-Entropies,” Proc. of IEEE International Symposium on Information Theory (ISIT 2014), Honolulu, HI, USA, June 29-July 4, 2014.
  76. T. Seito, Y. Watanabe, K. Kinose, and J. Shikata, “Information-Theoretically Secure Anonymous Group Authentication with Arbitration: Formal Definition and Construction,” Proc. of Annual Workshop on Mathematical and Computer Science, Josai Mathematical Monograph 7, pp.85-110, Tokyo, Japan, March 25th, 2014.
  77. R. Nakano and J. Shikata, “Constructions of Signcryption in the Multi-user Setting from Identity-based Encryption,”Proc. of The 14th IMA International Conference on Cryptography and Coding (IMACC2013), LNCS 8308, pp.324-343, Oxford, UK, December 17th-19th, 2013.
  78. M. Iwamoto and J. Shikata, “Information theoretic security for encryption based on conditional Renyi entropies,” Proc. of The 7th International Conference on Information Theoretic Security (ICITS 2013), LNCS 8317, pp.103-121, Singapore, November 28th-30th, 2013.
  79. S. Hajime, Y. Watanabe and J. Shikata, “Information-Theoretically Secure Entity Authentication in the Multi-user Setting,” Proc. of the 16th Annual International Conference on Information Security and Cryptology (ICISC2013), LNCS 8565, pp.400-417, Seoul, Korea, November 27th-29th, 2013.
  80. N. Takei, Y. Watanabe, and J. Shikata, “Unconditionally Secure Blind Authentication Codes in the Manual Channel Model,” Proc. of The 3rd International Symposium on Engineering, Energy and Environment (3rd ISEEE), pp.297-302, Bangkok, Thailand, November 17th-20th, 2013.
  81. T. Seito, Y. Watanabe, K. Kinose, and J. Shikata, “Unconditionally Secure Anonymous Group Authentication with an Arbiter,” Proc. of The 3rd International Symposium on Engineering, Energy and Environment (3rd ISEEE), pp.291-296, Bangkok, Thailand, November 17th-20th, 2013.
  82. A. Kubai, J. Shikata, and Y. Watanabe, “Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions,” Proc. of CD-ARES 2013 Workshops, LNCS 8128, pp.16-28, IFIP, Regensburg, Germany, September 2nd-6th, 2013.
  83. J. Shikata, “Formalization of Information-Theoretic Security for Key-Agreement, Revisited,” Proc. of IEEE International Symposium on Information Theory (ISIT 2013), Istanbul, Turkey, July 7-12, 2013.
  84. Y. Watanabe, T. Seito and J. Shikata, “Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes,” Proc. of The 6th International Conference on Information Theoretic Security (ICITS 2012), LNCS 7412, pp. 167?186, Springer,? August 2012.?
  85. Takayoshi Fujii, Katsunari Yoshioka, Junji Shikata, and Tsutomu Matsumoto, “An Efficient Dynamic Detection Method for Various x86 Shellcodes ,” The 3rd Workshop on Network Technologies for Security, Administration and Protection? (NETSAP 2012), IEEE Computer Society Press, July 2012.?
  86. Y. Shibuya and J. Shikata, “Constructing Secure Hybrid Encryption from KEM with Authenticity,” 13th IMA International Conference, Cryptography and Coding (IMACC 2011), LNCS 7089, pp.210-229, Springer, 2011.
  87. J. Shikata and D. Yamanaka, “Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction’’, 13th IMA International Conference, Cryptography and Coding (IMACC 2011), LNCS 7089, pp.112-131, Springer, 2011.?
  88. T. Seito and J. Shikata, “Information-theoretically Secure Key-Insulated Key Agreement ,” Proc. of 2011 IEEE Information Theory Workshop (ITW2011), Brazil, Oct. 2011, pp. 287 ? 291.
  89. H. C. Kim, T. Orii, K. Yoshioka, D. Inoue, J. Song, M. Eto, J. Shikata, T. Matsumoto, and K. Nakao, “An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation,” IEICE TRANSACTIONS on Information and Systems? Vol.E94-D? No.9? pp.1778-1791, September 2011.
  90. D. Muramatsu, M. Inuma, J. Shikata, and A. Otsuka, ``Fusion Strategies for Boosting Cancelable Online Signature Verification’’, Proc. of SPIE, Vol.7708, 770809, 2010.
  91. D. Muramatsu, M. Inuma, J. Shikata, and A. Otsuka, ``Enhanced Cancelable Biometrics for Online Signature Verification’’, IEICE Trans. Fundamentals., Vol.E93-A, No.6, pp.1254-1259, 2010.
  92. T. Seito, T. Aikawa, J. Shikata, and T. Matsumoto, “Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes,” AFRICACRYPT 2010, LNCS 6055, pp.148-165, Springer, May 2010.
  93. Y. Hara, T. Seito, J. Shikata, and T. Matsumoto, ``Unconditionally Secure Blind Signatures’’, Information Theoretic Security, ICITS 2007 ? Selected Papers, LNCS 4883, pp.23-43, Springer, December 2009.
  94. T. Seito, Y. Hara, J. Shikata, and T. Matsumoto, ``Unconditionally Secure Group Signatures’’, IEICE Fundamentals. Vol.E92-A, No.8, pp.2067-2085, August 2009.?
  95. Y. Hara, T. Ishiwata, J. Shikata, and T. Matsumoto, ``Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment’’, Formal to Practical Security, LNCS 5458, pp.116-137, Springer, May 2009.?
  96. Junji Shikata and Tsutomu Matsumoto, “Unconditionally Secure Steganography Against Active Attacks,” IEEE Transactions on Information Theory 54(6), pp.2690-2705, June 2008.
  97. Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, and Ekaterina Gerling, “On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems,” T. Data Hiding and Multimedia Security 3, Springer, pp.23-32, Jan. 2008.
  98. 遠山毅, 鈴木雅貴, 四方順司, 松本勉, ``編集ソフトウェアの特徴を利用した攻撃への耐性を有するSMFステガノグラフィ’’, 情報処理学会論文誌, Vol.48, No.9, pp.3014-3026, 2007年9月.?
  99. T. Ishihara, H. Aono, T. Hongo, and J. Shikata, ``Construction of Threshold (Hybrid) Encryption in the Random Oracle: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM’’, Information Security and Privacy: 12th Australasian Conference on Information Security and Privacy (ACISP 2007), LNCS 4586, pp. 259-273, Springer-Verlag, July 2007.
  100. K. Hiwatashi, H. Ochiai, J. Shikata, “A New Secret Key Agreement Scheme Based on Eigenvalues of Channel Matrices in Phase-Controlled MIMO Systems,” ISITA2006, Korea, October, 2006.
  101. G. Hanaoka, J. Shikata, Y. Hanaoka and H. Imai, “Unconditionally Secure Anonymous Encryption and Group Authentication,” The Computer Journal, Vol. 49, pp.310-321, May 2006.
  102. Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, “Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application,” Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science 3788, pp.495-514, Springer-Verlag, December 2005.
  103. K. Yoshioka, J. Shikata and T. Matsumoto, “On Collusion Security of Random Codes,” IEICE Transactions on Fundamentals., Vol.E88-A, No.1, 296-304, Jan. 2005.
  104. Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, ``Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions’’, IEICE Transactions on Fundamentals. , Vol.E87-A, No.10, 2521-2532, October 2004.
  105. J. Shikata, G. Hanaoka, Y. Zheng, T. Matsumoto and H. Imai, “Unconditionally Secure Authenticated Encryption,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1119-1131, May 2004.
  106. G. Hanaoka, J. Shikata, Y. Hanaoka, and H. Imai, “The Role of Arbiters for Unconditionally Secure Authentication,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1132-1140, May 2004.
  107. K. Yoshioka, J. Shikata and T. Matsumoto, “Collusion Secure Codes: Systematic Security Definitions and Their Relations,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1162-1171, May 2004.
  108. S. Yonezawa, G. Hanaoka, J. Shikata and H. Imai, “Traceability Schemes against Illegal Distribution of Signed Documents,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1172-1182, May 2004.
  109. R. Zhang, G. Hanaoka, J. Shikata and H. Imai, “On the Security of Multiple Encryption or CCA-security + CCA-security = CCA-security? “, PKC 2004, Lecture Notes in Computer Science 2947, Springer-Verlag, pp. 360-374, 2004.
  110. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “Efficient Unconditionally Secure Digital Signatures,” IEICE Transactions on Fundamentals., Vol.E87-A, No.1, pp.120-130, January 2004.
  111. M. Kim, J. Shikata, H. Muratani and H. Imai, “Constructing c-Secure CRT Codes Using Polynomials over Finite Fields,” IEICE Transactions on Fundamentals., Vol.E86-A, No.12, pp.3259-3266, December 2003.
  112. G. Hanaoka, J. Shikata, Y. Hanaoka, and H. Imai, “The Role of Arbiters in Asymmetric Authentication Schemes,” ISC 2003, Lecture Notes in Computer Science 2851, pp. 428-441, Springer-Verlag, 2003
  113. K. Yoshioka, J. Shikata and T. Matsumoto, “Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations,” ISC 2003, LNCS 2851, pp. 408-421, Springer-Verlag, 2003.?
  114. Y. Watanabe, J. Shikata and H. Imai, “Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks,” Public Key Cryptography , PKC 2003, Lecture Notes in Computer Science 2567, pp. 71-84, Springer-Verlag, 2003.
  115. Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, “Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions,” ICICS 2002, Lecture Notes in Computer Science 2513, pp. 85-96, Springer-Verlag, 2002.?
  116. S. Yonezawa, G. Hanaoka, J. Shikata and H. Imai, “Traceability Schemes for Signed Documents,” ISC 2002, Lecture Notes in Computer Science 2433, pp. 257-271, Springer-Verlag, 2002.
  117. G. Hanaoka, J. Shikata, Y. Hanaoka and H. Imai, “Unconditionally Secure Asymmetric Encryption and Group Authentication for Anonymous Communication,” Advances in Cryptology - ASIACRYPT 2002, Lecture Notes in Computer Science 2501, pp.81-99, Springer-Verlag, 2002.
  118. J. Shikata, G. Hanaoka, Y. Zheng and H. Imai, ``Security Notions for Unconditionally Secure Signature Schemes,” Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science 2332, pp.434-449, Springer-Verlag, 2002.
  119. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “Highly Efficient and Unconditionally Secure Digital Signatures and a Security Analysis on a Multireceiver Authentication Code,” PKC 2002, Lecture Notes in Computer Science 2274, pp. 64-79, Springer-Verlag, 2002.
  120. A. Otsuka, G. Hanaoka, J. Shikata and H. Imai, “An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability,” IEICE Transactions on Fundamentals., Vol.E85-A, No.1, pp.140-148, January 2002.
  121. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “A Traitor Traceable Conference System with Dynamic Sender,” IEICE Transactions on Fundamentals., Vol.E85-A, No.1, pp.167-174, January 2002.
  122. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, ``Unconditionally Secure Digital Signature Schemes Admitting Transferability,” Advances in Cryptology ? ASIACRYPT 2000, Lecture Notes in Computer Science 1976, Springer-Verlag, pp.130-142, 2000.
  123. J. Shikata, Y. Zheng, J. Suzuki and H. Imai, “Realizing the Menezes-Okamoto-Vanstone (MOV) Algorithm Efficiently for Ordinary Elliptic Curves,” IEICE Transactions on Fundamentals., Vol.E83-A, No.4, pp.756-763, April 2000.
  124. J. Shikata, Y. Zheng, J. Suzuki and H. Imai, “Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-Supersingular Elliptic Curves,” Advances in Cryptology ? ASIACRYPT’99, Lecture Notes in Computer Science 1716, Springer-Verlag, pp.86-102, 1999.
  125. 原澤隆一, 四方順司, 鈴木譲, 今井秀樹, “楕円曲線暗号におけるMOV帰着とFR帰着の比較について,” 電子情報通信学会論文誌A, Vol.J82-A, No.8, August, 1999, pp.1278-1290.
  126. R. Harasawa, J. Shikata, J. Suzuki and H. Imai, “Comparing the MOV and FR Reductions in Elliptic Curve Cryptography,” Advances in Cryptology ? EUROCRYPT ’99, Lecture Notes in Computer Science 1592, Springer-Verlag, pp.190-205, 1999.