研究業績

研究論文(査読有)

  1. Y. Watanabe and J. Shikata, “Timed-Release Computational Secret Sharing Scheme and Threshold Encryption”, Designs, Codes and Cryptography, 2017. (To appear) First Online: January 20th, 2017.
  2. A. Prasitsupparote, N. Konno, and J. Shikata, “Numerical Analysis of Elias's and Peres's Deterministic Extractors”, Proc. of the 51st Annual Conference on Information Systems and Sciences (CISS 2017), March 2017. (To appear)
  3. T. Yoshizawa, Y. Watanabe, and J. Shikata, “Unconditionally Secure Searchable Encryption”, Proc. of the 51st Annual Conference on Information Systems and Sciences (CISS 2017), March 2017. (To appear)
  4. Y. Watanabe, G. Hanaoka, J. Shikata, “Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness,” Information Theoretic Security (ICITS 2016), LNCS 10015, pp.213-237, Springer, November 2016.
  5. Y. Watanabe and J. Shikata, “Information-Theoretically Secure Timed-Release Secret Sharing Schemes,” Journal of Information Processing, Vol.24, No.4, pp.680-689, July 2016.
  6. Y. Watanabe and J. Shikata, “Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Strage,” Special Section on Discrete Mathematics and Its Applications, IEICE Transactions, vol.99-A, no.6, pp.1097-1106, June 2016.
  7. J. Su, K. Yoshioka, J. Shikata, T. Matsumoto, “An efficient method for detecting obfuscated suspicious JavaScript based on text pattern analysis”, Proc. of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), pp.3-11, ACM, May 2016.
  8. S. Tomita, Y. Watanabe and J. Shikata, “Sequential Aggregate Authentication Codes with Information Theoretic Security,” 50th Annual Conference on Information Sciences and Systems (CISS 2016), Princeton, USA, March 16th-18th, 2016.
  9. Y. Watanabe and J. Shikata, “Identity-based Hierarchical Key-insulated Encryption without Random Oracles,” Proc. of 19th International Conference on the Theory and Practice of Public-Key Cryptography (PKC 2016), Taipei, Taiwan, March 6th-9th, 2016. The paper is also available here.
  10. S. Goto and J. Shikata, “A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer,” Proc. of the 15th IMA International Conference on Cryptography and Coding (IMACC 2015), LNCS 9496, Springer, Oxford, UK, December 15th-17th, 2015. The full version is here.
  11. J. Su, K. Yoshioka, J. Shikata and T. Matsumoto, “Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection,” Proc. of the The 18th Annual International Conference on Information Security and Cryptology (ICISC 2015), LNCS, Springer, Seoul, Korea, November 25th-27th, 2015.
  12. Y. Watanabe and J. Shikata, “Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage,” Proc. of the 9th International Conference on Provable Security (ProvSec 2015), LNCS 9451, pp.489-502, Springer, Kanazawa, Japan, November 24th-26th, 2015. (short paper)
  13. K. Emura, L. T. Phong, and Y. Watanabe, “Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability, ” Proc. of the 14th International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2015), Helsinki, Finland, August 20-22, 2015.
  14. Y. Ishida, Y. Watanabe, and J. Shikata, “Constructions of CCA-secure Revocable Identity-based Encryption, ” Proc. of the 20th Australasian Conference in Information Security and Privacy (ACISP 2015), LNCS 9144, pp.174-191, Brisbane, Australia, June 29-July 1, 2015.
  15. M. Iwamoto and J. Shikata, “Construction of symmetric-key encryption with guessing secrecy,” Proc. of IEEE International Symposium on Information Theory (ISIT 2015), Hong Kong, June, 2015.
  16. N. Takei, Y. Watanabe and J. Shikata, “Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys,” Proc. of Annual Workshop on Statisitcal Science and Related Topics, Josai Mathematical Monograph 8, pp.115-133, Tokyo, Japan, December 7th, 2014.
  17. Y. Watanabe and J. Shikata, “Timed-Release Secret Sharing Schemes with Information Theoretic Security,” Proc. of the 1st International Conference on Cryptography and Information Security in Balkans (BalkanCryptSec2014), LNCS 9024, pp.219-236, Istanbul, Turkey, October 16th-17th, 2014. The paper is also available here.
  18. Y. Watanabe and J. Shikata, “Timed-Release Computational Secret Sharing Scheme and Its Applications,” Proc. of the 8th International Conference on Provable Security (ProvSec2014), LNCS 8782, pp.326-333, Springer, Hong Kong, October 9th-10th, 2014. (short paper)
  19. M. Iwamoto and J. Shikata, “Secret Sharing Schemes Based on Min-Entropies,” Proc. of IEEE International Symposium on Information Theory (ISIT 2014), Honolulu, HI, USA, June 29-July 4, 2014.
  20. T. Seito, Y. Watanabe, K. Kinose, and J. Shikata, “Information-Theoretically Secure Anonymous Group Authentication with Arbitration: Formal Definition and Construction,” Proc. of Annual Workshop on Mathematical and Computer Science, Josai Mathematical Monograph 7, pp.85-110, Tokyo, Japan, March 25th, 2014.
  21. R. Nakano and J. Shikata, “Constructions of Signcryption in the Multi-user Setting from Identity-based Encryption,”Proc. of The 14th IMA International Conference on Cryptography and Coding (IMACC2013), LNCS 8308, pp.324-343, Oxford, UK, December 17th-19th, 2013.
  22. M. Iwamoto and J. Shikata, “Information theoretic security for encryption based on conditional Renyi entropies,” Proc. of The 7th International Conference on Information Theoretic Security (ICITS 2013), LNCS 8317, pp.103-121, Singapore, November 28th-30th, 2013.
  23. S. Hajime, Y. Watanabe and J. Shikata, “Information-Theoretically Secure Entity Authentication in the Multi-user Setting,” Proc. of the 16th Annual International Conference on Information Security and Cryptology (ICISC2013), LNCS 8565, pp.400-417, Seoul, Korea, November 27th-29th, 2013.
  24. N. Takei, Y. Watanabe, and J. Shikata, “Unconditionally Secure Blind Authentication Codes in the Manual Channel Model,” Proc. of The 3rd International Symposium on Engineering, Energy and Environment (3rd ISEEE), pp.297-302, Bangkok, Thailand, November 17th-20th, 2013.
  25. T. Seito, Y. Watanabe, K. Kinose, and J. Shikata, “Unconditionally Secure Anonymous Group Authentication with an Arbiter,” Proc. of The 3rd International Symposium on Engineering, Energy and Environment (3rd ISEEE), pp.291-296, Bangkok, Thailand, November 17th-20th, 2013.
  26. A. Kubai, J. Shikata, and Y. Watanabe, “Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions,” Proc. of CD-ARES 2013 Workshops, LNCS 8128, pp.16-28, IFIP, Regensburg, Germany, September 2nd-6th, 2013.
  27. J. Shikata, “Formalization of Information-Theoretic Security for Key-Agreement, Revisited,” Proc. of IEEE International Symposium on Information Theory (ISIT 2013), Istanbul, Turkey, July 7-12, 2013.
  28. Y. Watanabe, T. Seito and J. Shikata, “Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes,” Proc. of The 6th International Conference on Information Theoretic Security (ICITS 2012), LNCS 7412, pp. 167–186, Springer,  August 2012. 
  29. Takayoshi Fujii, Katsunari Yoshioka, Junji Shikata, and Tsutomu Matsumoto, “An Efficient Dynamic Detection Method for Various x86 Shellcodes ,” The 3rd Workshop on Network Technologies for Security, Administration and Protection  (NETSAP 2012), IEEE Computer Society Press, July 2012. 
  30. Y. Shibuya and J. Shikata, “Constructing Secure Hybrid Encryption from KEM with Authenticity,” 13th IMA International Conference, Cryptography and Coding (IMACC 2011), LNCS 7089, pp.210-229, Springer, 2011.
  31. J. Shikata and D. Yamanaka, “Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction’’, 13th IMA International Conference, Cryptography and Coding (IMACC 2011), LNCS 7089, pp.112-131, Springer, 2011. 
  32. T. Seito and J. Shikata, “Information-theoretically Secure Key-Insulated Key Agreement ,” Proc. of 2011 IEEE Information Theory Workshop (ITW2011), Brazil, Oct. 2011, pp. 287 – 291.
  33. H. C. Kim, T. Orii, K. Yoshioka, D. Inoue, J. Song, M. Eto, J. Shikata, T. Matsumoto, and K. Nakao, “An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation,” IEICE TRANSACTIONS on Information and Systems  Vol.E94-D  No.9  pp.1778-1791, September 2011.
  34. D. Muramatsu, M. Inuma, J. Shikata, and A. Otsuka, ``Fusion Strategies for Boosting Cancelable Online Signature Verification’’, Proc. of SPIE, Vol.7708, 770809, 2010.
  35. D. Muramatsu, M. Inuma, J. Shikata, and A. Otsuka, ``Enhanced Cancelable Biometrics for Online Signature Verification’’, IEICE Trans. Fundamentals., Vol.E93-A, No.6, pp.1254-1259, 2010.
  36. T. Seito, T. Aikawa, J. Shikata, and T. Matsumoto, “Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes,” AFRICACRYPT 2010, LNCS 6055, pp.148-165, Springer, May 2010.
  37. Y. Hara, T. Seito, J. Shikata, and T. Matsumoto, ``Unconditionally Secure Blind Signatures’’, Information Theoretic Security, ICITS 2007 – Selected Papers, LNCS 4883, pp.23-43, Springer, December 2009.
  38. T. Seito, Y. Hara, J. Shikata, and T. Matsumoto, ``Unconditionally Secure Group Signatures’’, IEICE Fundamentals. Vol.E92-A, No.8, pp.2067-2085, August 2009. 
  39. Y. Hara, T. Ishiwata, J. Shikata, and T. Matsumoto, ``Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment’’, Formal to Practical Security, LNCS 5458, pp.116-137, Springer, May 2009. 
  40. Junji Shikata and Tsutomu Matsumoto, “Unconditionally Secure Steganography Against Active Attacks,” IEEE Transactions on Information Theory 54(6), pp.2690-2705, June 2008.
  41. Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, and Ekaterina Gerling, “On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems,” T. Data Hiding and Multimedia Security 3, Springer, pp.23-32, Jan. 2008.
  42. 遠山毅, 鈴木雅貴, 四方順司, 松本勉, ``編集ソフトウェアの特徴を利用した攻撃への耐性を有するSMFステガノグラフィ’’, 情報処理学会論文誌, Vol.48, No.9, pp.3014-3026, 2007年9月. 
  43. T. Ishihara, H. Aono, T. Hongo, and J. Shikata, ``Construction of Threshold (Hybrid) Encryption in the Random Oracle: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM’’, Information Security and Privacy: 12th Australasian Conference on Information Security and Privacy (ACISP 2007), LNCS 4586, pp. 259-273, Springer-Verlag, July 2007.
  44. K. Hiwatashi, H. Ochiai, J. Shikata, “A New Secret Key Agreement Scheme Based on Eigenvalues of Channel Matrices in Phase-Controlled MIMO Systems,” ISITA2006, Korea, October, 2006.
  45. G. Hanaoka, J. Shikata, Y. Hanaoka and H. Imai, “Unconditionally Secure Anonymous Encryption and Group Authentication,” The Computer Journal, Vol. 49, pp.310-321, May 2006.
  46. Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, “Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application,” Advances in Cryptology - ASIACRYPT 2005, Lecture Notes in Computer Science 3788, pp.495-514, Springer-Verlag, December 2005.
  47. K. Yoshioka, J. Shikata and T. Matsumoto, “On Collusion Security of Random Codes,” IEICE Transactions on Fundamentals., Vol.E88-A, No.1, 296-304, Jan. 2005.
  48. Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, ``Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions’’, IEICE Transactions on Fundamentals. , Vol.E87-A, No.10, 2521-2532, October 2004.
  49. J. Shikata, G. Hanaoka, Y. Zheng, T. Matsumoto and H. Imai, “Unconditionally Secure Authenticated Encryption,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1119-1131, May 2004.
  50. G. Hanaoka, J. Shikata, Y. Hanaoka, and H. Imai, “The Role of Arbiters for Unconditionally Secure Authentication,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1132-1140, May 2004.
  51. K. Yoshioka, J. Shikata and T. Matsumoto, “Collusion Secure Codes: Systematic Security Definitions and Their Relations,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1162-1171, May 2004.
  52. S. Yonezawa, G. Hanaoka, J. Shikata and H. Imai, “Traceability Schemes against Illegal Distribution of Signed Documents,” IEICE Transactions on Fundamentals., Vol.E87-A, No.5, pp.1172-1182, May 2004.
  53. R. Zhang, G. Hanaoka, J. Shikata and H. Imai, “On the Security of Multiple Encryption or CCA-security + CCA-security = CCA-security? “, PKC 2004, Lecture Notes in Computer Science 2947, Springer-Verlag, pp. 360-374, 2004.
  54. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “Efficient Unconditionally Secure Digital Signatures,” IEICE Transactions on Fundamentals., Vol.E87-A, No.1, pp.120-130, January 2004.
  55. M. Kim, J. Shikata, H. Muratani and H. Imai, “Constructing c-Secure CRT Codes Using Polynomials over Finite Fields,” IEICE Transactions on Fundamentals., Vol.E86-A, No.12, pp.3259-3266, December 2003.
  56. G. Hanaoka, J. Shikata, Y. Hanaoka, and H. Imai, “The Role of Arbiters in Asymmetric Authentication Schemes,” ISC 2003, Lecture Notes in Computer Science 2851, pp. 428-441, Springer-Verlag, 2003
  57. K. Yoshioka, J. Shikata and T. Matsumoto, “Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations,” ISC 2003, LNCS 2851, pp. 408-421, Springer-Verlag, 2003. 
  58. Y. Watanabe, J. Shikata and H. Imai, “Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks,” Public Key Cryptography , PKC 2003, Lecture Notes in Computer Science 2567, pp. 71-84, Springer-Verlag, 2003.
  59. Y. Hanaoka, G. Hanaoka, J. Shikata and H. Imai, “Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions,” ICICS 2002, Lecture Notes in Computer Science 2513, pp. 85-96, Springer-Verlag, 2002. 
  60. S. Yonezawa, G. Hanaoka, J. Shikata and H. Imai, “Traceability Schemes for Signed Documents,” ISC 2002, Lecture Notes in Computer Science 2433, pp. 257-271, Springer-Verlag, 2002.
  61. G. Hanaoka, J. Shikata, Y. Hanaoka and H. Imai, “Unconditionally Secure Asymmetric Encryption and Group Authentication for Anonymous Communication,” Advances in Cryptology - ASIACRYPT 2002, Lecture Notes in Computer Science 2501, pp.81-99, Springer-Verlag, 2002.
  62. J. Shikata, G. Hanaoka, Y. Zheng and H. Imai, ``Security Notions for Unconditionally Secure Signature Schemes,” Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science 2332, pp.434-449, Springer-Verlag, 2002.
  63. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “Highly Efficient and Unconditionally Secure Digital Signatures and a Security Analysis on a Multireceiver Authentication Code,” PKC 2002, Lecture Notes in Computer Science 2274, pp. 64-79, Springer-Verlag, 2002.
  64. A. Otsuka, G. Hanaoka, J. Shikata and H. Imai, “An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability,” IEICE Transactions on Fundamentals., Vol.E85-A, No.1, pp.140-148, January 2002.
  65. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, “A Traitor Traceable Conference System with Dynamic Sender,” IEICE Transactions on Fundamentals., Vol.E85-A, No.1, pp.167-174, January 2002.
  66. G. Hanaoka, J. Shikata, Y. Zheng and H. Imai, ``Unconditionally Secure Digital Signature Schemes Admitting Transferability,” Advances in Cryptology – ASIACRYPT 2000, Lecture Notes in Computer Science 1976, Springer-Verlag, pp.130-142, 2000.
  67. J. Shikata, Y. Zheng, J. Suzuki and H. Imai, “Realizing the Menezes-Okamoto-Vanstone (MOV) Algorithm Efficiently for Ordinary Elliptic Curves,” IEICE Transactions on Fundamentals., Vol.E83-A, No.4, pp.756-763, April 2000.
  68. J. Shikata, Y. Zheng, J. Suzuki and H. Imai, “Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-Supersingular Elliptic Curves,” Advances in Cryptology – ASIACRYPT’99, Lecture Notes in Computer Science 1716, Springer-Verlag, pp.86-102, 1999.
  69. 原澤隆一, 四方順司, 鈴木譲, 今井秀樹, “楕円曲線暗号におけるMOV帰着とFR帰着の比較について,” 電子情報通信学会論文誌A, Vol.J82-A, No.8, August, 1999, pp.1278-1290.
  70. R. Harasawa, J. Shikata, J. Suzuki and H. Imai, “Comparing the MOV and FR Reductions in Elliptic Curve Cryptography,” Advances in Cryptology – EUROCRYPT ’99, Lecture Notes in Computer Science 1592, Springer-Verlag, pp.190-205, 1999.