Junji Shikata

According to our database1, Junji Shikata authored at least 75 papers between 1999 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality.
J. Internet Serv. Inf. Secur., 2019

Identity-based encryption with hierarchical key-insulation in the standard model.
Des. Codes Cryptogr., 2019

History-Free Sequential Aggregate MAC Revisited.
Proceedings of the Provable Security, 2019

Sequential Aggregate MACs with Detecting Functionality Revisited.
Proceedings of the Network and System Security - 13th International Conference, 2019

SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Interactive Aggregate Message Authentication Scheme with Detecting Functionality.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.
IEEE Trans. Information Theory, 2018

Non-adaptive Group-Testing Aggregate MAC Scheme.
IACR Cryptology ePrint Archive, 2018

Lower Bounds on Lattice Enumeration with Extreme Pruning.
IACR Cryptology ePrint Archive, 2018

Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences.
Entropy, 2018

Timed-release computational secret sharing and threshold encryption.
Des. Codes Cryptogr., 2018

Signcryption with Quantum Random Oracles.
Proceedings of the Provable Security, 2018

Generic Construction of Sequential Aggregate MACs from Any MACs.
Proceedings of the Provable Security, 2018

Lattice-Based Signcryption Without Random Oracles.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance.
IJACT, 2017

Tighter bounds on entropy of secret keys in authentication codes.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Unconditionally secure searchable encryption.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Numerical analysis of Elias's and Peres's deterministic extractors.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Information-theoretically Secure Timed-release Secret Sharing Schemes.
JIP, 2016

Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage.
IEICE Transactions, 2016

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptology ePrint Archive, 2016

Sequential aggregate authentication codes with information theoretic security.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Trends and Development of Information-Theoretic Cryptography.
IEICE Transactions, 2015

Identity-based Hierarchical Key-insulated Encryption without Random Oracles.
IACR Cryptology ePrint Archive, 2015

Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys.
IACR Cryptology ePrint Archive, 2015

A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer.
IACR Cryptology ePrint Archive, 2015

Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Proceedings of the Provable Security, 2015

Constructions of symmetric-key encryption with guessing secrecy.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Constructions of CCA-Secure Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Timed-Release Secret Sharing Scheme with Information Theoretic Security.
CoRR, 2014

Timed-Release Computational Secret Sharing Scheme and Its Applications.
Proceedings of the Provable Security - 8th International Conference, 2014

Secret sharing schemes based on min-entropies.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Timed-Release Secret Sharing Schemes with Information Theoretic Security.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies.
IACR Cryptology ePrint Archive, 2013

Formalization of information-theoretic security for key agreement, revisited.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Information-Theoretically Secure Entity Authentication in the Multi-user Setting.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
IACR Cryptology ePrint Archive, 2012

Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited.
IACR Cryptology ePrint Archive, 2012

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Transactions, 2011

Information-theoretically secure key-insulated key-agreement.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
Enhanced Cancelable Biometrics for Online Signature Verification.
IEICE Transactions, 2010

Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.
Proceedings of the Progress in Cryptology, 2010

2009
Unconditionally Secure Group Signatures.
IEICE Transactions, 2009

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Proceedings of the Formal to Practical Security, 2009

2008
Unconditionally Secure Steganography Against Active Attacks.
IEEE Trans. Information Theory, 2008

On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding and Multimedia Security, 2008

2007
Construction Methodology of Unconditionally Secure Signature Schemes.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Unconditionally Secure Blind Signatures.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J., 2006

2005
On Collusion Security of Random Codes.
IEICE Transactions, 2005

Authenticated encryption and steganography in unconditional security setting.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions, 2004

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
IACR Cryptology ePrint Archive, 2004

2003
Relation among simulator-based and comparison-based definitions of semantic security.
IACR Cryptology ePrint Archive, 2003

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
IACR Cryptology ePrint Archive, 2003

Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003

The Role of Arbiters in Asymmetric Authentication Schemes.
Proceedings of the Information Security, 6th International Conference, 2003

2002
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks.
IACR Cryptology ePrint Archive, 2002

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002

Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Traceability Schemes for Signed Documents.
Proceedings of the Information Security, 5th International Conference, 2002

Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Security Notions for Unconditionally Secure Signature Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2000
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Proceedings of the Advances in Cryptology, 2000

1999
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
Proceedings of the Advances in Cryptology, 1999

Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1999


  Loading...