Book and thesis
Papers
Secure Grouping Protocol Using a Deck of Cards IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences E101-A (9),pp.1512-1524 (Co-authored) 2018/09/01
Papers
Toward Finite-runtime Card-based Protocol for Generating a Hidden Random Permutation without Fixed Points IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences E101-A (9),pp.1503-1511 (Co-authored) 2018/09/01
Papers
Provably Secure Structured Signature Schemes with Tighter Reductions IEICE Trans. Fundamentals of Electronics, Communications and Computer Sciences E100-A (9),pp.1870-1881 (Co-authored) 2017/09/01
Papers
A License Management System for Content Separate Delivery over P2P Network Intl. J. Digital Information and Wireless Communications (IJDIWC) 4 (2),pp.202-212 (Co-authored) 2014/04/28
Papers
Content Approval Systems with Expansions of a New Pair-connected-structured Aggregate Signature Scheme Intl. J. E-Entrepreneurship and Innovation (IJEEI) 4 (2),pp.15-37 (Co-authored) 2013/10/15
Papers
Proposal and Evaluation of a Method for Secure Division Sum Using the Secret Sharing Scheme by Rounding Off Real Numbers Proc. Intl. Workshop on Information and Communication Security (WICS2022),pp.344-350 (Co-authored) 2022/11/21
Papers
TTP-Aided Secure Computation using Secret Sharing With Only One Computing Server Proc. ACM Asia Conference on Computer and Communications Security (AsiaCCS2022),pp.1243-1245 (Co-authored) 2022/05/31
Papers
Fast Secret Computation Using Secret Sharing for n<2k-1 Secure Against Malicious Adversaries Proc. Intl. Conf. Electrical, Computer, Communications and Mechatronics Engineering (ICECCME2021) (Co-authored) 2021/10/08
Papers
Right Guarantee Method of Three-dimensional Structure Created by Partial Polymerization Proc. Intl. Conf. Image Electronics and Visual Computing (IEVC2021) (Co-authored) 2021/09/08
Papers
Implementation of Secondary Available Digital Content Protection Schemes Using Identity-based Signatures Proc. Intl. Conf. Information Systems Security and Privacy (ICISSP2021),pp.485-491 (Co-authored) 2021/02/11
Papers
A Content Protection Method that Allows Commissioning of Editing Control Processing to a Third Party Using a Proxy Signature Proc. Intl. Conf. e-Business (ICE-B2020),pp.90-101 (Co-authored) 2020/07/10
Papers
Proposal and Performance Evaluation of an Order-specified Aggregate Authority-transfer Signature Proc. Intl. Conf. Information Systems Security and Privacy (ICISSP2019) [Revised Selected Papers] CCIS 1221,pp.121-136 (Co-authored) 2020/06/28
Papers
Secure Comparison and Interval Test Protocols Based on Three-party MPC Proc. Intl. Conf. Information Systems Security and Privacy (ICISSP2020),pp.698-704 (Co-authored) 2020/02/26
Papers
Content Protection Method to Control Editing by Billing Proc. Intl. Conf. e-Business (ICE-B2019),pp.202-214 (Co-authored) 2019/07/26
Papers
An Order-Specified Aggregate Authority-Transfer Signature Proc. Intl. Conf. Information Systems Security and Privacy (ICISSP2019),pp.309-318 (Co-authored) 2019/02/23
Papers
Personal Authentication Method Based on Human Preference Prediction Using Machine Learning Proc. Intl. Conf. e-Business (ICE-B2018),pp.131-138 (Co-authored) 2018/07/26
Papers
Improvement and Implementation of Digital Content Protection Scheme Using Identity-based Signature Proc. Intl. Conf. Mobile and Secure Services (MobiSecServ2018),pp.92-96 (Co-authored) 2018/02/24
Papers
Secure Grouping Protocol Using a Deck of Cards Proc. Intl. Conf. Information Theoretic Security (ICITS2017) LNCS 10681,pp.135-152 (Co-authored) 2017/12/02
Papers
Access Control of Webcam on PC with Prevention against Peeping by Attackers Proc. Intl. Workshop on Information and Communication Security (WICS2017),pp.529-532 (Co-authored) 2017/11/22
Papers
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control Proc. Intl. Joint Conf. e-Business and Telecommunications (ICETE2016) [Revised Selected Papers] CCIS 764,pp.124-138 (Co-authored) 2017/10/28
Papers
Deployment of Contents Protection Scheme Using Digital Signature Proc. Intl. Conf. e-Business (ICE-B2017),pp.130-137 (Co-authored) 2017/07/24
Papers
Content Protection Scheme to Realize Edit Control Including Diversion Control and Composition Control Proc. Intl. Conf. e-Business (ICE-B2016),pp.116-123 (Co-authored) 2016/07/26
Papers
Evaluation of Handwriting Characteristic for Two-factor Authentication Interface on Touch-pad Panel Proc. Intl. Conf. e-Business (ICE-B2016),pp.106-111 (Co-authored) 2016/07/26
Papers
Tightly-Secure Identity-Based Structured Aggregate Signature Scheme under the Computational Diffie-Hellman Assumption Proc. Intl. Conf. Advanced Information Networking and Applications (AINA2016),pp.669-676 (Co-authored) 2016/03/24
Papers
Content Control scheme to Realize Right Succession and Edit Control Proc. Intl. Conf. e-Business (ICE-B2015),pp.249-256 (Co-authored) 2015/07/21
Papers
Surveillance Camera System Balancing Privacy Protection and Effective Surveillance Image Use Proc. Intl. Conf. e-Business (ICE-B2015),pp.41-48 (Co-authored) 2015/07/20
Papers
Expansions of CHAP -Modificationless on Its Structures of Packet and Data Exchange Proc. Intl. Conf. Information Systems Security and Privacy (ICISSP2015),pp.213-220 (Sole-authored) 2015/02/11
Papers
Security Evaluation of an Order-Specified Identity-Based Aggregate Signature Scheme Proc. Intl. Conf. Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC2013),pp.51-57 (Co-authored) 2013/12/11
Papers
Content-key Management and Authentication Mechanism for De-centralization in Content Distribution Service Proc. Intl. Conf. Electrical and Electronics Engineering, Clean Energy and Green Computing (EEECEGC2013),pp.40-50 (Co-authored) 2013/12/11
Papers
Digital Signature Scheme Enabling Pre-control of Content Editing for Secondary Use Proc. Intl. Conf. Digital Information Processing and Communications (ICDIPC2013),pp.106-113 (Co-authored) 2013/01/30
Papers
A Structured Aggregate Signature Scheme with Pairing-based Cryptography Proc. Intl. Conf. Digital Information Processing and Communications (ICDIPC2013),pp.64-73 (Co-authored) 2013/01/30
Papers
A New Tree-structure-specified Multisignature Scheme for a Document Circulation System Proc. Intl. Conf. Security and Cryptography (SECRYPT2011),pp.362-369 (Co-authored) 2011/07/18
Papers
Anonymous handover mechanism for service mobility in heterogeneous wireless networks Wireless Communications and Networking Conf. (WCNC2009),pp.2726-2731 (Co-authored) 2009/04/05
Papers
Implementation and Evaluation of New Illegal Copy Protection -Protection Against Making a Illegal Copy of a Copy Proc. Intl. Conf. Security and Cryptography (SECRYPT2007),pp.427-432 (Co-authored) 2007/07/28
Papers
Anonymous Prepaid Content Viewing System with Mobile Terminal Proc. Intl. Conf. Security and Cryptography (SECRYPT2007),pp.281-288 (Co-authored) 2007/07/28
Papers
Flexible License Transfer System Using Mobile Terminal Proc. Intl. Conf. Security and Cryptography (SECRYPT2006),pp.397-404 (Co-authored) 2006/08/07
Papers
Controlled Personal Use of Digital Movie Contents Proc. Intl. Workshop on Advanced Image Technology (IWAIT2006),pp.122-127 (Co-authored) 2006/01/09
Papers
Secure Grouping Protocol Using a Deck of Cards Cryptography and Security (cs.CR) in Computing Research Repository (CoRR), arXiv (Co-authored) 2017/09/22