Junji Shikata

Orcid: 0000-0003-2861-359X

According to our database1, Junji Shikata authored at least 115 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Designated Verifier Signature with Claimability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2023
A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation From Wireless Channels.
IEEE Commun. Lett., December, 2023

Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023

Multi-Designated Receiver Authentication Codes: Models and Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Exact Markov Chain of Random Propagation of Malware With Network-Level Mitigation.
IEEE Internet Things J., 2023

Compact Signature Aggregation from Module-Lattices.
IACR Cryptol. ePrint Arch., 2023

Compact Bounded-Collusion Identity-based Encryption via Group Testing.
IACR Cryptol. ePrint Arch., 2023

A Tightly Secure Identity-based Signature Scheme from Isogenies.
IACR Cryptol. ePrint Arch., 2023

Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2023

Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE.
IACR Cryptol. ePrint Arch., 2023

Authenticated Encryption for Very Short Inputs.
IACR Cryptol. ePrint Arch., 2023

Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.
Des. Codes Cryptogr., 2023

Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023

Bloomier Filters on 3-Hypergraphs.
Proceedings of the Information Security Applications - 24th International Conference, 2023

Performance Analysis for Coded Wireless Steganography System with OFDM Signaling.
Proceedings of the IEEE Radio and Wireless Symposium, 2023

Identity-Based Matchmaking Encryption Secure Against Key Generation Center.
Proceedings of the Provable and Practical Security, 2023

A Tightly Secure Identity-Based Signature Scheme from Isogenies.
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023

Group-Testing Aggregate Entity Authentication.
Proceedings of the IEEE Information Theory Workshop, 2023

IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Proceedings of the Information Security Practice and Experience, 2023

Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities.
Proceedings of the Information Security Practice and Experience, 2023

Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.
IACR Cryptol. ePrint Arch., 2022

Quantum-Secure Aggregate One-time Signatures with Detecting Functionality.
IACR Cryptol. ePrint Arch., 2022

Security Gap Improvement of BICM Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel.
IEEE Access, 2022

Group Testing Aggregate Signatures with Soundness.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Identity-based Interactive Aggregate Signatures from Lattices.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security.
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022

2021
Performance Analysis of Wireless Steganography based on OFDM and DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels.
Proceedings of the 24th International Symposium on Wireless Personal Multimedia Communications, 2021

Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021

Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Aggregate Signature with Detecting Functionality from Group Testing.
IACR Cryptol. ePrint Arch., 2020

Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing.
IACR Cryptol. ePrint Arch., 2020

Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing.
IEEE Access, 2020

A Physical-Layer Security Based on Wireless Steganography Through OFDM and DFT-Precoded OFDM Signals.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020

On the Power of Interaction in Signcryption.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2020

2019
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality.
J. Internet Serv. Inf. Secur., 2019

Identity-based encryption with hierarchical key-insulation in the standard model.
Des. Codes Cryptogr., 2019

History-Free Sequential Aggregate MAC Revisited.
Proceedings of the Provable Security, 2019

Sequential Aggregate MACs with Detecting Functionality Revisited.
Proceedings of the Network and System Security - 13th International Conference, 2019

Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes.
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019

Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Interactive Aggregate Message Authentication Scheme with Detecting Functionality.
Proceedings of the Advanced Information Networking and Applications, 2019

2018
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.
IEEE Trans. Inf. Theory, 2018

Non-adaptive Group-Testing Aggregate MAC Scheme.
IACR Cryptol. ePrint Arch., 2018

Lower Bounds on Lattice Enumeration with Extreme Pruning.
IACR Cryptol. ePrint Arch., 2018

Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences.
Entropy, 2018

Timed-release computational secret sharing and threshold encryption.
Des. Codes Cryptogr., 2018

Signcryption with Quantum Random Oracles.
Proceedings of the Provable Security, 2018

Generic Construction of Sequential Aggregate MACs from Any MACs.
Proceedings of the Provable Security, 2018

Lattice-Based Signcryption Without Random Oracles.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

2017
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance.
Int. J. Appl. Cryptogr., 2017

Tighter bounds on entropy of secret keys in authentication codes.
Proceedings of the 2017 IEEE Information Theory Workshop, 2017

Unconditionally secure searchable encryption.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

Numerical analysis of Elias's and Peres's deterministic extractors.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Information-theoretically Secure Timed-release Secret Sharing Schemes.
J. Inf. Process., 2016

Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptol. ePrint Arch., 2016

Sequential aggregate authentication codes with information theoretic security.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Trends and Development of Information-Theoretic Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Identity-based Hierarchical Key-insulated Encryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2015

Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys.
IACR Cryptol. ePrint Arch., 2015

A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Proceedings of the Provable Security, 2015

Constructions of symmetric-key encryption with guessing secrecy.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Constructions of CCA-Secure Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Timed-Release Secret Sharing Scheme with Information Theoretic Security.
CoRR, 2014

Timed-Release Computational Secret Sharing Scheme and Its Applications.
Proceedings of the Provable Security - 8th International Conference, 2014

Secret sharing schemes based on min-entropies.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Timed-Release Secret Sharing Schemes with Information Theoretic Security.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies.
IACR Cryptol. ePrint Arch., 2013

Formalization of information-theoretic security for key agreement, revisited.
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013

Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013

Information-Theoretically Secure Entity Authentication in the Multi-user Setting.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
IACR Cryptol. ePrint Arch., 2012

Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2012

An Efficient Dynamic Detection Method for Various x86 Shellcodes.
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012

2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011

Information-theoretically secure key-insulated key-agreement.
Proceedings of the 2011 IEEE Information Theory Workshop, 2011

Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
Enhanced Cancelable Biometrics for Online Signature Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.
Proceedings of the Progress in Cryptology, 2010

2009
Unconditionally Secure Group Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Proceedings of the Formal to Practical Security, 2009

2008
Unconditionally Secure Steganography Against Active Attacks.
IEEE Trans. Inf. Theory, 2008

On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008

2007
Construction Methodology of Unconditionally Secure Signature Schemes.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Unconditionally Secure Blind Signatures.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J., 2006

2005
On Collusion Security of Random Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Authenticated encryption and steganography in unconditional security setting.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
Efficient Unconditionally Secure Digital Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
IACR Cryptol. ePrint Arch., 2004

2003
Constructing <i>c</i>-Secure CRT Codes Using Polynomials over Finite Fields.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Relation among simulator-based and comparison-based definitions of semantic security.
IACR Cryptol. ePrint Arch., 2003

On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
IACR Cryptol. ePrint Arch., 2003

Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003

The Role of Arbiters in Asymmetric Authentication Schemes.
Proceedings of the Information Security, 6th International Conference, 2003

2002
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Traitor Traceable Conference System with Dynamic Sender.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

Equivalence between semantic security and indistinguishability against chosen ciphertext attacks.
IACR Cryptol. ePrint Arch., 2002

Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002

Cryptography with information theoretic security.
Proceedings of the 2002 IEEE Information Theory Workshop, 2002

Traceability Schemes for Signed Documents.
Proceedings of the Information Security, 5th International Conference, 2002

Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

Security Notions for Unconditionally Secure Signature Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002

2000
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Proceedings of the Advances in Cryptology, 2000

1999
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
Proceedings of the Advances in Cryptology, 1999

Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1999


  Loading...