Toru Nakanishi

Orcid: 0000-0001-8796-9508

Affiliations:
  • Hiroshima University, Japan


According to our database1, Toru Nakanishi authored at least 98 papers between 1999 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Short DL-Based Blacklistable Ring Signatures from DualRing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

A Distributed Anonymous Reputation System for V2X Communication.
Proceedings of the IEEE International Conference on Consumer Electronics, 2024

2023
A Strongly Unlinkable Group Signature Scheme with Matching-Based Verifier-Local Revocation for Privacy-Enhancing Crowdsensing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2023

Zero-Knowledge Proofs of Connectivity for Labeled Directed Graphs Using Bilinear-Map Accumulator.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

A Serverless Signaling Scheme for WebRTC Using Bluetooth LE.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023

Issuer-Revocable Issuer-Hiding Attribute-Based Credentials Using an Accumulator.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

2022
An Efficient Anonymous Reputation System for Crowdsensing.
J. Inf. Process., 2022

An Efficient Revocable Delegatable Anonymous Credential System Using an Accumulator.
J. Inf. Process., 2022

Efficient Zero-Knowledge Proofs of Graph Signature for Connectivity and Isolation Using Bilinear-Map Accumulator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2021
A New Structure of 2-State Number-Conserving Cellular Automata.
IEICE Trans. Inf. Syst., 2021

Reducing Revocation Lists in CS-Based Revocable Group Signature Scheme Using Vector Commitment.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Efficient blacklistable anonymous credential system with reputation using a pairing-based accumulator.
IET Inf. Secur., 2020

An Anonymous Credential System with Constant-Size Attribute Proofs for CNF Formulas with Negations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

An Accumulator-Based Revocation in Delegatable Anonymous Credentials.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
Efficiency Improvement in Group Signature Scheme with Probabilistic Revocation.
J. Inf. Process., 2019

Speeding Up Revocable Group Signature with Compact Revocation List Using Vector Commitments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

An Efficient Blacklistable Anonymous Credentials without TTP of Tracing Authority Using Pairing-Based Accumulator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

An Efficient Anonymous Reputation System for Crowd Sensing.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
An Efficient Blacklistable Anonymous Credential System with Reputation Using Pairing-Based Accumulator.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
A Secure Data Exchange System in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
J. Inf. Process., 2017

Accumulator for Monotone Formulas and its Application to Anonymous Credential System.
J. Inf. Process., 2017

Revocable Group Signatures with Compact Revocation List Using Vector Commitments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Designated-Senders Public-Key Searchable Encryption Secure against Keyword Guessing Attacks.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Implementation of Revocable Group Signatures with Compact Revocation List Using Vector Commitments.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

Hierarchical Motion Representation of 2-State Number Conserving Cellular Automata.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

An Efficient Blacklistable Anonymous Credentials without TTPs Using Pairing-Based Accumulator.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
Reduction of certificates in an anonymous credential system with proofs for monotone formulas on attributes.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016

Implementation of a Revocable Group Signature Scheme with Compact Revocation List Using Accumulator.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

2015
Extensions of Access-Point Aggregation Algorithm for Large-scale Wireless Local Area Networks.
Int. J. Netw. Comput., 2015

Revocable Group Signatures with Compact Revocation List Using Accumulators.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes.
Proceedings of the Advances in Information and Computer Security, 2015

Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

An Implementation of Secure Data Exchange System with Multi-hop Routing in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
An Anonymous Reputation System with Reputation Secrecy for Manager.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

A proposal of routing algorithm under practical conditions for Wireless Internet-Access Mesh NETworks.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2014

An Implementation of Secure Data Exchange in Wireless Delay Tolerant Network Using Attribute-Based Encryption.
Proceedings of the Second International Symposium on Computing and Networking, 2014

Implementation of Anonymous Credential System with Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
A Fixed Backoff-Time Switching Method for CSMA/CA Protocol in Wireless Mesh Networks.
IEICE Trans. Commun., 2013

An Access-Point Aggregation Approach for Energy-Saving Wireless Local Area Networks.
IEICE Trans. Commun., 2013

Efficient Proofs for CNF Formulas on Attributes in Pairing-Based Anonymous Credential System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Optimal Spot-Checking for Delayed Attack on Desktop Grid Systems.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

A modified routing tree algorithm considering link speed change in IEEE 802.11n for wireless mesh network.
Proceedings of the IEEE International Symposium on Consumer Electronics, 2013

An Anonymous Reputation System with Reputation Secrecy for Manager.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

An Extension of Access-Point Aggregation Algorithm to Ensure Minimum Host Throughput for Wireless Local Area Networks.
Proceedings of the First International Symposium on Computing and Networking, 2013

Extensions of cooking guidance function on Android tablet for homemade cooking assistance system.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

An extension of menu planning algorithm for two-phase homemade cooking.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs.
Proceedings of the IEEE 2nd Global Conference on Consumer Electronics, 2013

A Modified Active Access-Point Selection Algorithm Considering Link Speed Change in IEEE 802.11n for Wireless Mesh Networks.
Proceedings of the Seventh International Conference on Complex, 2013

2012
A Pairing-Based Anonymous Credential System with Efficient Attribute Proofs.
J. Inf. Process., 2012

An Extension of Routing Tree Algorithm Considering Link Speed Change in IEEE 802.11n Protocol for Wireless Mesh Network.
Proceedings of the 9th International Conference on Ubiquitous Intelligence and Computing and 9th International Conference on Autonomic and Trusted Computing, 2012

Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations.
Proceedings of the Third International Conference on Networking and Computing, 2012

A Proposal of Access-Point Aggregation Approach for Multiple Wireless Local Area Networks.
Proceedings of the Sixth International Conference on Complex, 2012

An Extension of Wireless Internet-Access Mesh Network Simulator for Use of Smart Antenna.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012

A Proposal of CSMA Fixed Backoff-time Switching Protocol and Its Implementation on QualNet Simulator for Wireless Mesh Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

An Online Fill-in-the-Blank Problem Function for Learning Reserved Words in Java Programming Education.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
An Active Access-Point Selection Approach for Dependable Wireless Mesh Networks.
J. Interconnect. Networks, 2011

Efficient Proofs of Attributes in Pairing-Based Anonymous Credential System.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

A Proposal of an Active Access-Point Selection Algorithm in Wireless Mesh Networks.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011

An Extension of Active Access-Point Selection Algorithm for Throughput Maximization in Wireless Mesh Networks.
Proceedings of the 2011 Third International Conference on Intelligent Networking and Collaborative Systems (INCoS), Fukuoka, Japan, November 30, 2011

A Proposal of a Menu Planning Algorithm for Two-phase Cooking by Busy Persons.
Proceedings of the International Conference on Complex, 2011

2010
Anonymous IEEE802.1X Authentication System Using Group Signatures.
J. Inf. Process., 2010

Forward-Secure Group Signatures from Pairings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Revocable Group Signature Schemes with Constant Costs for Signing and Verifying.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Extensions of the Access Point Allocation Algorithm for Wireless Mesh Networks.
IEICE Trans. Commun., 2010

Software Architecture and Characteristic Functions in Learning Management System "NOBASU".
Proceedings of the Tenth Annual International Symposium on Applications and the Internet, 2010

An Extension of the Web-Page Layout Optimization Method for Multimodal Browsing Sizes.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

2009
A node configuration algorithm with bandwidth bottleneck resolution for WDM ring networks.
Photonic Netw. Commun., 2009

A web-based lecture scene playback system using digital picture-card show with structured learning assistance function.
Int. J. Web Grid Serv., 2009

An Access Point Allocation Algorithm for Indoor Environments in Wireless Mesh Networks.
IEICE Trans. Commun., 2009

A Web-Based Installation Manual Management System for Open Source Software.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2009

A Heuristic Optimization Algorithm for Panoramic Image Generation Problem from Multiple Cameras.
Proceedings of the Emerging Intelligent Computing Technology and Applications, 2009

A Proposal of Structured Learning Assistance Function in Lecture-Scene Playback System Using Digital Picture-Card Show.
Proceedings of the 2009 International Conference on Complex, 2009

2008
Efficient Revocable Group Signature Schemes Using Primes.
J. Inf. Process., 2008

A Proposal of an Installation Manual Generation Method for Open Source Software Using Operation Logs.
Proceedings of the 4th IEEE International Conference on Signal Image Technology and Internet Based Systems, 2008

A minimum-delay routingtree algorithm for access-point communications in Wireless Mesh Networks.
Proceedings of the 2008 IEEE International Conference on Research, 2008

A short anonymously revocable group signature scheme from decision linear assumption.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

A Lecture Scene Playback System Using Digital Picture-Card Show for Distance Learning.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Proposal of a hierarchical heuristic algorithm for node assignment in bidirectional Manhattan street networks.
Syst. Comput. Jpn., 2007

A Short Verifier-Local Revocation Group Signature Scheme with Backward Unlinkability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A Channel Configuration Problem for Access-Point Communications in Wireless Mesh Networks.
Proceedings of the 15th IEEE International Conference on Networks, 2007

2006
Group Signature Schemes with Membership Revocation for Large Groups.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
An Efficient On-Line Electronic Cash with Unlinkable Exact Payments.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

A Group Signature Scheme with Efficient Membership Revocation for Middle-Scale Groups.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

An Optical-Drop Wavelength Assignment Algorithm for Efficient Wavelength Reuse under Heterogeneous Traffic in WDM Ring Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Optical-Drop Wavelength Assignment Problem for Wavelength Reuse in WDM Ring Metropolitan Area Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005

Group Signature Schemes with Membership Revocation for Large Groups.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
An Efficient Online Electronic Cash with Unlinkable Exact Payments.
Proceedings of the Information Security, 7th International Conference, 2004

A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Efficient Anonymous Survey for Attribute Statistics Using a Group Signature Scheme with Attribute Tracing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Sealed-Bid Auctions with Efficient Bids.
Proceedings of the Information Security and Cryptology, 2003

2002
An Efficiency Improvement on an Unlinkable Divisible Electronic Cash System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Quasi-Solution State Evolution Algorithm for Channel Assignment Problems in Cellular Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Proposal of a Quasi-Solution State Evolution Algorithm for Channel Assignment Problems.
Proceedings of the Information Networking, 2002

A Group Signature Scheme Committing the Group.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

2001
Anonymous Statistical Survey of Attributes.
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001

2000
Unlinkable Divisible Electronic Cash.
Proceedings of the Information Security, Third International Workshop, 2000

1999
Unlinkable Electronic Coupon Protocol with Anonymity Control.
Proceedings of the Information Security, Second International Workshop, 1999


  Loading...