Kanta Matsuura

Orcid: 0009-0005-0348-026X

According to our database1, Kanta Matsuura authored at least 93 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
On private information retrieval supporting range queries.
Int. J. Inf. Sec., February, 2024

2023
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.
IACR Cryptol. ePrint Arch., 2023

Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials.
IACR Cryptol. ePrint Arch., 2023

Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
IACR Cryptol. ePrint Arch., 2023

A Realtime IoT Malware Classification System Based on Pending Samples.
Proceedings of the IEEE International Conference on Communications, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022

Coin Transfer Unlinkability Under the Counterparty Adversary Model.
Ledger, June, 2022

Script Tainting Was Doomed From The Start (By Type Conversion): Converting Script Engines into Dynamic Taint Analysis Frameworks.
Proceedings of the 25th International Symposium on Research in Attacks, 2022

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
ROPminer: Learning-Based Static Detection of ROP Chain Considering Linkability of ROP Gadgets.
IEICE Trans. Inf. Syst., 2020

Simple Black-Box Adversarial Examples Generation with Very Few Queries.
IEICE Trans. Inf. Syst., 2020

Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Privacy Analysis and Evaluation Policy of Blockchain-based Anonymous Cryptocurrencies.
CoRR, 2020

2019
Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Token Model and Interpretation Function for Blockchain-Based FinTech Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

My script engines know what you did in the dark: converting engines into script API tracers.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2018
More Constructions of Re-Splittable Threshold Public Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018

Provably Secure Password Reset Protocol: Model, Definition, and Construction.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions.
Proceedings of the Information Security - 21st International Conference, 2018

Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2016
Proxy re-encryption via indistinguishability obfuscation.
Secur. Commun. Networks, 2016

Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction.
IACR Cryptol. ePrint Arch., 2016

ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

2015
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models.
J. Inf. Process., 2015

Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015

Light-weight secrecy system using channels with insertion errors: Cryptographic implications.
Proceedings of the 2015 IEEE Information Theory Workshop, 2015

2014
Toward Optimal Fusion Algorithms With Security Against Wolves and Lambs in Biometrics.
IEEE Trans. Inf. Forensics Secur., 2014

Guest Editorial: Cloud Security.
IEEE Trans. Cloud Comput., 2014

A General Framework and Algorithms for Score Level Indexing and Fusion in Biometric Identification.
IEICE Trans. Inf. Syst., 2014

Security of a Privacy-Preserving Biometric Authentication Protocol Revisited.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Construction of even-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Sci. China Inf. Sci., 2013

Improving security and efficiency of time-bound access to outsourced data.
Proceedings of the 6th ACM India Computing Convention, 2013

Sectoral and Regional Interdependency of Japanese Firms Under the Influence of Information Security Risks.
Proceedings of the Economics of Information Security and Privacy, 2013

2012
Construction of highly nonlinear resilient S-boxes with given degree.
Des. Codes Cryptogr., 2012

Sectoral and Regional Interdependency of Japanese Firms under the Influence of Information Security Risks.
Proceedings of the 11th Annual Workshop on the Economics of Information Security, 2012

Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Towards optimal countermeasures against wolves and lambs in biometrics.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
Analysis of Awareness Gap between Security Managers and Workers in an Organization with Regard to the Effectiveness of the Information Security Measures.
J. Inf. Process., 2011

Efficient Convertible Undeniable Signatures with Delegatable Verification.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Balanced 2p-variable rotation symmetric Boolean functions with maximum algebraic immunity.
Appl. Math. Lett., 2011

On Black-Box Separations among Injective One-Way Functions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Efficient Generic Constructions of Signcryption with Insider Security in the Multi-user Setting.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Enumeration of balanced symmetric functions over GF(p).
Inf. Process. Lett., 2010

Evaluation of the Common Dataset Used in Anti-Malware Engineering Workshop 2009.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability.
Proceedings of the Pairing-Based Cryptography - Pairing 2010, 2010

2009
An Efficient Convertible Undeniable Signature Scheme with Delegatable Verification.
IACR Cryptol. ePrint Arch., 2009

On-line Non-transferable Signatures Revisited.
IACR Cryptol. ePrint Arch., 2009

A Generic Construction of Timed-Release Encryption with Pre-open Capability.
Proceedings of the Advances in Information and Computer Security, 2009

Generic Construction of Stateful Identity Based Encryption.
Proceedings of the Information Security, 12th International Conference, 2009

Efficient Constructions of Signcryption Schemes and Signcryption Composability.
Proceedings of the Progress in Cryptology, 2009

Fingerprinting Attack on the Tor Anonymity System.
Proceedings of the Information and Communications Security, 11th International Conference, 2009

An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.
Proceedings of the Topics in Cryptology, 2009

Construction of Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model.
Proceedings of the Managing Information Risk and the Economics of Security, 2009

2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way.
IEICE Trans. Inf. Syst., 2008

Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model.
Proceedings of the 7th Annual Workshop on the Economics of Information Security, 2008

Proxy Signatures Secure Against Proxy Key Exposure.
Proceedings of the Public Key Cryptography, 2008

Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.
Proceedings of the Information Security and Cryptology, 2008

2007
Location Privacy in Wireless LAN.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007

Lightweight Asymmetric Privacy-Preserving Authentication Protocols Secure against Active Attack.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications, 2007

Anonymous Pay-TV System with Secure Revenue Sharing.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

A Practical Provider Authentication System for Bidirectional Broadcast Service.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Unconditionally Secure Chaffing-and-Winnowing for Multiple Use.
Proceedings of the Information Theoretic Security - Second International Conference, 2007

2006
A Novel Algorithm for Solving the LPN Problem and its Application to Security Evaluation of the HB Protocol for RFID Authentication.
IACR Cryptol. ePrint Arch., 2006

An Empirical Analysis of Security Investment in Countermeasures Based on an Enterprise Survey in Japan.
Proceedings of the 5th Annual Workshop on the Economics of Information Security, 2006

Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
Proceedings of the Progressin Cryptology, 2006

Silent Cascade: Enhancing Location Privacy Without Communication QoS Degradation.
Proceedings of the Security in Pervasive Computing, Third International Conference, 2006

Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.
Proceedings of the Progress in Cryptology, 2006

Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

Applying Fujisaki-Okamoto to Identity-Based Encryption.
Proceedings of the Applied Algebra, 2006

2005
Relations Among Notions of Security for Identity Based Encryption Schemes.
IACR Cryptol. ePrint Arch., 2005

Enhancing wireless location privacy using silent period.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Towards Modeling Wireless Location Privacy.
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005

Detection of Unknown DoS Attacks by Kolmogorov-Complexity Fluctuation.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
The Challenge of Providing a Voter Registration System for Millions of Filipinos Living Overseas.
Proceedings of the Electronic Government: Third International Conference, 2004

An Analysis of Detailed Electronic Time-Stamping Using Digital TV.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

Robustness of Entrusted Data-Analysis in e-Science Research Collaboration.
Proceedings of the 2004 IEEE International Conference on e-Technology, 2004

2003
An Architecture of a Secure Database for Networked Collaborative Activities.
Proceedings of the ICEIS 2003, 2003

2002
Digital Timestamps for Dispute Settlement in Electronic Commerce: Generation, Verification, and Renewal.
Proceedings of the ICEIS 2002, 2002

2001
A Derivative of Digital Objects and Estimation of Default Risks in Electronic Commerce.
Proceedings of the Information and Communications Security, Third International Conference, 2001

1999
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack.
Proceedings of the Information and Communication Security, Second International Conference, 1999

1998
Compact and Flexible Resolution of CBT Multicast Key-Distribution.
Proceedings of the Worldwide Computing and Its Applications, International Conference, 1998


  Loading...