• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

The security of quantum key distribution using the real system and the foundation of quantum

Research Project

Project/Area Number 14205058
Research Category

Grant-in-Aid for Scientific Research (A)

Allocation TypeSingle-year Grants
Section一般
Research Field 情報通信工学
Research InstitutionThe University of Tokyo

Principal Investigator

IMAI Hideki  The University of Tokyo, Institute of Industrial Science, Professor, 生産技術研究所, 教授 (70017987)

Co-Investigator(Kenkyū-buntansha) MATSUURA Kanda  The University of Tokyo, Institute of Industrial Science, Assistant Professor, 生産技術研究所, 助教授 (00292756)
KOBARA Kazukuni  The University of Tokyo, Institute of Industrial Science, Research Associate, 生産技術研究所, 助手 (70323649)
Project Period (FY) 2002 – 2005
Project Status Completed (Fiscal Year 2005)
Budget Amount *help
¥35,360,000 (Direct Cost: ¥27,200,000、Indirect Cost: ¥8,160,000)
Fiscal Year 2005: ¥8,060,000 (Direct Cost: ¥6,200,000、Indirect Cost: ¥1,860,000)
Fiscal Year 2004: ¥8,580,000 (Direct Cost: ¥6,600,000、Indirect Cost: ¥1,980,000)
Fiscal Year 2003: ¥9,100,000 (Direct Cost: ¥7,000,000、Indirect Cost: ¥2,100,000)
Fiscal Year 2002: ¥9,620,000 (Direct Cost: ¥7,400,000、Indirect Cost: ¥2,220,000)
KeywordsQuantum Key Distribution / Quantum Bit Commitment / Quantum Error Correcting Code / Low-Density Parity-Check Code / Coherent Measurement / Unconditionally Secure / Communication Distance / Quantum Channel / 量子暗号 / CSS符号 / LDPC符号 / 鍵圧縮法 / 情報量的安全性 / 量子一方向性関数 / 量子一方向性置換
Research Abstract

In this research, we prepared two themes as a geotropism which attains the research subject. One is "The security of quantum key distribution using the real system" and the other is "the foundation of quantum information theory".
If it says about the real system, the situation of a quantum information theory will have accomplished the remarkable variation during the research.
In particular, quantum key distribution system arrived at the region of utilization. And related software is remarked on the system.
Therefore we propose two important research results. One is secure QKD protocol under "using week coherent quantum information and quantum erasure-channel". And another is error-correcting system that achieves privacy amplification simultaneously.
On the later-subject, we put other quantum protocols into the research field, and we have guessed how we should consider the theoretical hypothesis to be important at present. In particular, we evaluated and proposed quantum bit commitment protocol, QKD protocol with multi-photon protocols. Though the researches, we conclude that it is important for construction of secure quantum protocols to arrange the assumption of availability of entanglement states, of realization of quantum states, of existence of quantum memory, of quantum channel models.

Report

(5 results)
  • 2005 Annual Research Report   Final Research Report Summary
  • 2004 Annual Research Report
  • 2003 Annual Research Report
  • 2002 Annual Research Report
  • Research Products

    (291 results)

All 2006 2005 2004 2003 2002 2001 Other

All Journal Article (211 results) Book (1 results) Patent(Industrial Property Rights) (2 results) Publications (77 results)

  • [Journal Article] Unconditionally Secure Chaffing-and-Winnowing : A Relationship between Encryption and Authentication2006

    • Author(s)
      G.Hanaoka, Y.Hanaoka, M.Hagiwara, H.Watanabe, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol. 3857

      Pages: 154-162

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security Protocols Protection Based on Anomaly Detection2006

    • Author(s)
      A.Alharby, H.Imai
    • Journal Title

      IEICE Transactions, Special Issue : New Technologies and their Applications of the Internet vol. E89-D, no. 1

      Pages: 189-200

    • NAID

      110003485940

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions2006

    • Author(s)
      M.Abe, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol. E89-A, no. 1

      Pages: 99-105

    • NAID

      110003486111

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Efficient Algorithms for Tate Pairing2006

    • Author(s)
      T.Kobayashi, K.Aoki, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol. E89-A, No. 1

      Pages: 134-143

    • NAID

      110003486115

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Relation between the XL Algorithm and Grobner Basis Algorithms2006

    • Author(s)
      M.Sugita, M.Kawazoe, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol. E89-A, no. 1

      Pages: 11-18

    • NAID

      110003486101

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing2006

    • Author(s)
      T.Matsushita, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol. E89-A, no. 1

      Pages: 1055-1062

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Short Random Fingerprinting Code Against a Small Number of Pirates2006

    • Author(s)
      M.Hagiwara, G.Hanaoka, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vo. 3857

      Pages: 193-202

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally Secure Chaffing-and-Winnowing : A Relationship between Encryption and Authentication2006

    • Author(s)
      G.Hanaoka, Y.Hanaoka, M.Hagiwara, H.Watanabe, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol.2857

      Pages: 154-162

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security Protocols Protection Based on Anomaly Detection2006

    • Author(s)
      A.Alharby, H.Imai
    • Journal Title

      IEICE Transactions, Special Issue : New Technologies and their Applications of the Internet vol.E89-D, no.1

      Pages: 189-200

    • NAID

      110003485940

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions2006

    • Author(s)
      M.Abe, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol.E89-A, no.1

      Pages: 99-105

    • NAID

      110003486111

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] Efficient Algorithms for Tate Pairing2006

    • Author(s)
      T.Kobayashi, K.Aoki, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol.E89-A, no.1

      Pages: 134-143

    • NAID

      110003486115

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] Relation between the XL Algorithm and Grobner Basis Algorithms2006

    • Author(s)
      M.Sugita, M.Kawazoe, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol.E89-A, no.1

      Pages: 11-18

    • NAID

      110003486101

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing2006

    • Author(s)
      T.Matsushita, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol.E89-A, no.1

      Pages: 1055-1062

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Short Random Fingerprinting Code Against a Small Number of Pirates2006

    • Author(s)
      M.Hagiwara, G.Hanaoka, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol.3857

      Pages: 193-202

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] Security Protocols *Protect ion Based on Anomaly Detection2006

    • Author(s)
      A.Alharby, H.Imai
    • Journal Title

      IEICE Transactions, Special Issue : New Technologies and their Applicat ions of the Internet vol.E89-D, no.1

      Pages: 189-200

    • Related Report
      2005 Annual Research Report
  • [Journal Article] A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracin2006

    • Author(s)
      T.Matsushita, H.Imai
    • Journal Title

      IEICE Transactions, Fundamentals vol.E89-A, no.1

      Pages: 1055-1062

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Unconditionally Secure Chaffing-and-Winnowing : A Relationship between Encryption and Authentication2006

    • Author(s)
      G.Hanaoka, Y.Hanaoka, M.Hagiwara, H.Watanabe, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol.3857

      Pages: 154-162

    • Related Report
      2005 Annual Research Report
  • [Journal Article] A traitor traceable conference system with dynamic sender2005

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Zheng, H.Imai
    • Journal Title

      IEICE Trans. vol.E85-A no.1

    • NAID

      110003209089

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing2005

    • Author(s)
      T.Matsushita, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals vol. E88-A, no. 4

      Pages: 1055-1062

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Short Signature and Universal Designated Verifier Signature Without Random Oracles2005

    • Author(s)
      R.Zhang, J.Furukawa, H.Imai
    • Journal Title

      Lecture Notes in Computer Science, Appliced Cryptography and Network Security vol. 3531

      Pages: 483-498

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Key management with minimized secret storage employing an erasure channel approach2005

    • Author(s)
      M.Mihaljevic, M.P.C Fossorier, H.Imai
    • Journal Title

      IEEE Communications Letters vol. 9

      Pages: 741-743

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Reply to Comment on Security of Y-00 and similar quantum cryptographic protocols2005

    • Author(s)
      T.Nishioka, T.Hasegawa, Y.Ishizuka, K.Imafuku, H.Ima
    • Journal Title

      Physics letters A 346, 1

      Pages: 7-16

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] How to Break COT-Based Fingerprinting Schemes and Design New One2005

    • Author(s)
      J.Choi, G.Hanaoka, K.Rhee, H.Imai
    • Journal Title

      IEICE Trans. vol. E88-A, no. 10

      Pages: 2800-2807

    • NAID

      110003213301

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Compact and Efficient Leakage-Resilient Authenticated Key Exchange Protocol2005

    • Author(s)
      S-H Shin, K.Kobara, H.Imai
    • Journal Title

      GESTS International Transactions on Computer Science and Engineering Vol. 19, no. 1

      Pages: 159-17

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Leakage-Resilient Security Architecture for Mobile IPv6 in Wireless Overlay Networks2005

    • Author(s)
      H.Fathi, S-H Shin, K.Kobara, S.Chakraborty, H.Imai, R.Plrasad
    • Journal Title

      IEEE Journal on Selected Areas in Communicaitons (J-SAC) vol. 23, no.11

      Pages: 2182-2193

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks2005

    • Author(s)
      M.Mihaljevic, M.P.C Fossorier, H.Imai
    • Journal Title

      INDOCRYPT2005, Lecture Notes in Comuter Science vol. 3797

      Pages: 155-168

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Improvements on Security Proofs of Some Identity Based Encryption Schemes2005

    • Author(s)
      R.Zhang, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol. 3822

      Pages: 28-41

    • NAID

      10016853273

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2005

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol. 3788

      Pages: 495-514

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Use of Sequential Patterns for Intrusion Detection-Preliminary version2005

    • Author(s)
      Abdulrahman Alharby, Hideki Imai
    • Journal Title

      The 5^<th> International workshop on Information Security Applications, WISA 2005

      Pages: 671-678

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing2005

    • Author(s)
      T.Matsushita, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals vol.E88-A, no.4

      Pages: 1055-1062

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Short Signature and Universal Designated Verifier Signature Without Random Oracles2005

    • Author(s)
      R.Zhang, J.Furukawa, H.Imai
    • Journal Title

      Lecture Notes in Computer Science, Appliced Cryptography and Network Security vol.3531

      Pages: 483-498

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] Key management with minimized secret storage employing an erasure channel approach2005

    • Author(s)
      M.Mihaljevic, M.P.C Fossorier, H.Imai
    • Journal Title

      IEEE Communications Letters vol.9

      Pages: 741-743

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] Reply to Comment on Security of Y-00 and similar quantum cryptographic protocols2005

    • Author(s)
      T.Nishioka, T.Hasegawa, Y.Ishizuka, K.Imafuku, H.Imai
    • Journal Title

      Physics letters A 346,1

      Pages: 7-16

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] How to Break COT-Based Fingerprinting Schemes and Design New One2005

    • Author(s)
      J.Choi, G.Hanaoka, K.Rhee, H.Imai
    • Journal Title

      IEICE Trans. vol.E88-A, no.10

      Pages: 2800-2807

    • NAID

      110003213301

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] 「研究成果報告書概要(欧文)」より2005

    • Author(s)
      S-H Shin, K.Kobara, H.Imai
    • Journal Title

      GESTS International Transactions on Computer Science and Engineering Vol.19,no.1

      Pages: 159-17

    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Leakage-Resilient Security Architecture for Mobile IPv6 in Wireless Overlay Networks2005

    • Author(s)
      H.Fathi, S-H Shin, K.Kobara, S.Chakraborty, H.Imai, R.Plrasad
    • Journal Title

      IEEE Journal on Selected Areas in Communications (J-SAC) vol.23,no.11

      Pages: 2182-2193

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Annual Research Report 2005 Final Research Report Summary
  • [Journal Article] Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks2005

    • Author(s)
      M.Mihaljevic, M.P.C Fossorier, H.Imai
    • Journal Title

      INDOCRYPT2005,Lecture Notes in Computer Science vol.3797

      Pages: 155-168

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Improvements on Security Proofs of Some Identity Based Encryption Schemes2005

    • Author(s)
      R.Zhang, H.Imai
    • Journal Title

      LNCS vol.3822

      Pages: 28-41

    • NAID

      10016853273

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2005

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      LNCS vol.3788

      Pages: 495-514

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing2005

    • Author(s)
      T.Matsushita, H.Imai
    • Journal Title

      IEICE Trans.Fundamentals vol.E88-A, no.4

      Pages: 1055-1062

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Valkyrie:非静的ネットワークに適応可能な匿名通信方式2005

    • Author(s)
      山中晋爾, 古原和邦, 今井秀樹
    • Journal Title

      情報処理学会論文誌 46,8

      Pages: 2025-2035

    • NAID

      110002769791

    • Related Report
      2005 Annual Research Report
  • [Journal Article] 2h(2j+1)準位量子状態に対する非スタビライザ型クリフォード符号構成2005

    • Author(s)
      萩原学, 今井秀樹
    • Journal Title

      電子情報通信学会論文誌 Vol.J88-A, No.8

      Pages: 917-922

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Reply to Comment on ‘Security of Y-00 and similar quantum cryptographic protocols2005

    • Author(s)
      T.Nishioka, T.Hasegawa, Y.Ishizuka, K.Imafuku, H.Ima
    • Journal Title

      Physics letters A 346,1

      Pages: 7-16

    • Related Report
      2005 Annual Research Report
  • [Journal Article] A dynamical bifurcation of distinguishability in thermalization processes, from classical to quantum2005

    • Author(s)
      K.Imafuku, H.Imai
    • Journal Title

      情報処理学会論文誌, 46,10

      Pages: 2465-2470

    • NAID

      130000058401

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Compact and Efficient Leakage-Resilient Authenticated Key Exchange Protocol2005

    • Author(s)
      S-H Shin, K.Kobara, H.Imai
    • Journal Title

      GESTS International Transactions on Computer Science and Engineering Vol.19,no.1

      Pages: 159-17

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks2005

    • Author(s)
      M.Mihaljevic, M.P.C Fossorier, H.Imai
    • Journal Title

      INDOCRYPT2005, Lecture Notes in Computer Science vol.3797

      Pages: 155-168

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Improvements on Security Proofs of Some Identity Based Encryption Schemes2005

    • Author(s)
      R.Zhang, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol.3822

      Pages: 28-41

    • NAID

      10016853273

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2005

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol.3788

      Pages: 495-514

    • Related Report
      2005 Annual Research Report
  • [Journal Article] Use of Sequential Patterns for Intrusion Detection-Preliminary version2005

    • Author(s)
      Abdulrahman Alharby, Hideki Imai
    • Journal Title

      The 5th International workshop on Information Security Applications WISA 2005

      Pages: 671-678

    • Related Report
      2004 Annual Research Report
  • [Journal Article] A Digatal Document Sanitizing Scheme with Disclosure Condition Control2004

    • Author(s)
      Kunihiko Miyazaki, Hideki Imai, et al. (7 authors)
    • Journal Title

      proceedings of the 2004 Symposium on Cryptography and Information Security SCI2004

      Pages: 515-520

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Digiatal Document Sanitizing Scheme with Disclosure Condition Control2004

    • Author(s)
      K.Miyazaki, M.Iwamura, T.Matsumoto, R.Sasaki
    • Journal Title

      proceedings of the 2004 Symposium on Cryptography and Information Security SCIS2004

      Pages: 515-520

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Managing encryption and key publication independently in digital rights management systems2004

    • Author(s)
      G.Hanaoka, H.Imai, et al.(9 authros)
    • Journal Title

      IEICE Trans. Fundamentals. Vol. E87-A. No. 1

      Pages: 160-172

    • NAID

      110003212745

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Bit string commitment reductions with a non-zero rate2004

    • Author(s)
      A.C.A.Nascimento, J.Mueller-Quade, H.Imai
    • Journal Title

      CT-RSA2004. Springer-Verlag. LNCS 2964

      Pages: 179-193

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] President's Column2004

    • Author(s)
      H.Imai
    • Journal Title

      IEEE Information Theory Society Newsletter. Vol. 54 no. 1

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the Suboptimality of Iterative Decoding for Turbo-like and LDPC Codes with Cycles in their Graph Representations2004

    • Author(s)
      Motohiko Isaka, M.P.C.Fossorier, Hideki Imai
    • Journal Title

      IEEE Trans. Commun. Vol. 53. no. 5

      Pages: 845-854

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] How much security does Y-00 protocol provide us?2004

    • Author(s)
      T.Nishioka, T.Hasegawa, H.Ishizuka, K.Imafuku, H.Imai
    • Journal Title

      Physics Letters A. 327

      Pages: 28-32

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally Sedure Authenticated Encryption2004

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, T.Matsumoto, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol. E87-A. no. 5

      Pages: 1119-1131

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] The role of arbiters for unconditionally secure authentication2004

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Hanaoka, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol. E87-A. no. 5

      Pages: 1132-1140

    • NAID

      110003213010

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Traceability schemes against illegal distribution of signed documents2004

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol. E87-A. no. 5

      Pages: 1172-1182

    • NAID

      110003213014

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model2004

    • Author(s)
      A.C.A.Nascimento, H.Imai, et al.(5 authors)
    • Journal Title

      Applied Cryptography and Network Security LNCS 3089

      Pages: 355-368

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Information theoretically secure oblivious polynomial evaluation : Model, bounds, and constructions2004

    • Author(s)
      G.Hanaoka, H.Imai, et al.(6 authors)
    • Journal Title

      Information Security and Privacy LNCS 3108

      Pages: 62-73

    • NAID

      10013957847

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Journal of Korea Institute of Information Security & Cryptology (KIISC) Vol. 14. no. 4

      Pages: 75-90

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Phase-noise effects on turbo trellis-coded modulation over M-ary coherent channels2004

    • Author(s)
      T.Minowa, H.Ochiai, H.Imai
    • Journal Title

      IEEE Trans. Commun. Vol. 52. no. 8

      Pages: 1333-1343

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Secret-public storage trade-off for broadcast encryption key management2004

    • Author(s)
      M.Mihaljevi'c., M.Fossorier, H.Imai
    • Journal Title

      ICICS 2004. Lecture Notes in Computer Science Vol. 3269

      Pages: 375-387

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Information-theoretically secure key insulated encryption : Models, bounds and constructions2004

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol. E87-A. no. 10

      Pages: 2521-2532

    • NAID

      110003212769

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Personal entropy from graphical passwords : Methods for quantification and practical key generation2004

    • Author(s)
      M.Akao, S.Yamanaka, G.Hanaoka, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol. E87-A. no. 10

      Pages: 2543-2554

    • NAID

      110003212771

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Comparison between XL and Grobner basis algorithms2004

    • Author(s)
      G.Ars, J-C Faugere, H.Imai, M.Kawazoe, M.Sugita
    • Journal Title

      Asiacrypt 2004. LNCS 3329

      Pages: 338-353

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the Security of Cryptosystems with All-or-Nothing Transform2004

    • Author(s)
      Rui Zhang, Goichiro Hanaoka, Hideki Imai
    • Journal Title

      Springer-Verlag LNCS 3089

      Pages: 76-90

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Use of Sequential Patterns for Intrusion Detection-Preliminary version2004

    • Author(s)
      Abdulrahman Alharby, Hideki Imai
    • Journal Title

      The 5^th International workshop on Information Security Applications WISA 2005

      Pages: 671-678

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Lightweight Leakage-Resilient Authenticated Key Exchange Protocol for Wireless Security2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Proceedings of the Seventh International Symposium on WIRELESS PERSONAL MULTIMEDIA COMMUNICSTIONS WPMC 2004

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Quantum Key Distribution Protocol with Controlling Announcement States Robust against Photon Number Splitting Attacks2004

    • Author(s)
      Makoto Eguchi, Manabu Hagiwara, Hideki Imai
    • Journal Title

      Proceedings of ERATO Quantum Information Science Conference 2004 EQIS04

      Pages: 96-97

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] The Lower-bound of Complexity in RSA-based Password-Authenticated Key Exchange2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Proceedings of the Computer Security Symposium 2004 (CSS2004). IPSJ Symposium Series Vol. 2004 no. 11. I

      Pages: 295-300

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the Relation of Two Key Generation Paradigms2004

    • Author(s)
      Rui Zhang, Goichiro Hanaoka, Hideki Imai
    • Journal Title

      Proc. Of SITA2004 II

      Pages: 1116-1120

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary 2004 Annual Research Report
  • [Journal Article] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Proceedings of the 27^th Symposium on Information Theory and Its Applications (SITA2004) Vol. IofII

      Pages: 211-214

    • NAID

      10014280492

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Control of decay through Kerr coupling2004

    • Author(s)
      Paulo Facchi, Luigi Accardi, Kentaro Imafuku, Hideki Imai
    • Journal Title

      第11回量子情報技術研究会 QIT11

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary 2004 Annual Research Report
  • [Journal Article] Cooperative agents for Intrusion Detection systems2004

    • Author(s)
      Abdulrahman Alharby, Hideki Imai
    • Journal Title

      The 27^th Symposium on Information Theory and Its Applications SITA2004

      Pages: 319-322

    • NAID

      10014280695

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Privacy Enhanced RFID tags with One-Time-Recordable-Memory2004

    • Author(s)
      Dingzhe Liu, Kazukuni Kobara, Akira Ootsuka, Hideki Imai
    • Journal Title

      第27回情報理論とその応用シンポジウム予稿集 SITA2004, vol. II

      Pages: 423-426

    • NAID

      10014280907

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Digital Document Sanitizing Scheme with Disclosure Condition Control2004

    • Author(s)
      Kunihiko Miyazaki, Hideki Imai, et al.(7 authors)
    • Journal Title

      SCI2004

      Pages: 515-520

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Digital Document Sanitizing Scheme with Disclosure Condition Control2004

    • Author(s)
      K.Miyazaki, M.Iwamura, T.Matsumoto, R.Sasaki
    • Journal Title

      SCIS2004

      Pages: 515-520

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Managing encryption and key publication independently in digital rights management systems2004

    • Author(s)
      G.Hanaoka, H.Imai, et al.(9 authors)
    • Journal Title

      IEICE Trans. Fundamentals. Vol.E87-A, no.1

      Pages: 160-172

    • NAID

      110003212745

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] President's Column2004

    • Author(s)
      H.Imai
    • Journal Title

      IEEE Information Theory Society Newsletter Vol.54 no.1

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the Suboptimality of Iterative Decoding for Turbo-like and LDPC Codes with Cycles in their Graph Representations2004

    • Author(s)
      Motohiko Isaka, M.P.C.Fossorier, Hideki Imai
    • Journal Title

      IEEE Trans.Commun. Vol.53,no.5

      Pages: 845-854

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] How much security does Y-00 protocol provide us?2004

    • Author(s)
      T.Nishioka, T.Hasegawa, H.Ishizuka, K.Imafuku, H.Imai
    • Journal Title

      Physics Letters, A. 327

      Pages: 28-32

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally Secure Authenticated Encryption2004

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, T.Matsumoto, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol.E87-A, no.5

      Pages: 119-1131

    • NAID

      110003213009

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] The role of arbiters for unconditionally secure authentication2004

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Hanaoka, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol.E87-A, no.5

      Pages: 1132-1140

    • NAID

      110003213010

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Traceability schemes against illegal distribution of signed document2004

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol.E87-A, no.5

      Pages: 1172-1182

    • NAID

      110003213014

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Journal of Korea Institute of Information Security & Cryptology (KIISC) Vol.14,no.4

      Pages: 75-90

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Phase-noise effects on turbo trellis-coded modulation over M-ary coherent channels2004

    • Author(s)
      T.Minowa, H.Ochiai, H.Imai
    • Journal Title

      IEEE Trans.Commun. Vol.52,no.8

      Pages: 1333-1343

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Secret-public storage trade-off for broadcast encryption key management2004

    • Author(s)
      M.Mihaljevic, M.Fossorier, H.Imai
    • Journal Title

      ICICS 2004. Lecture Notes in Computer Science Vol.3269

      Pages: 375-387

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Information-theoretically secure key insulated encryption : Models, bounds and constructions2004

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol.E87-A, no.10

      Pages: 2521-2532

    • NAID

      110003212769

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Personal entropy from graphical passwords : Methods for quantification and practical key generation2004

    • Author(s)
      M.Akao, S.Yamanaka, G.Hanaoka, H.Imai
    • Journal Title

      IEICE Trans. Fundamentals. Vol.E87-A, no.10

      Pages: 2543-2554

    • NAID

      110003212771

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A Lightweight Leakage-Resilient Authenticated Key Exchange Protocol for Wireless Security2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Proceedings of the Seventh International Symposium on WIRELESS PERSONAL MULTIMEDIA COMMUNICATIONS. WPMC 2004 V3

      Pages: 483-487

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Quantum Key Distribution Protocol with Controlling Announcement States Robust against Photon Number Splitting Attacks2004

    • Author(s)
      Makoto Eguchi, Manabu Hagiwara, Hideki Imai
    • Journal Title

      Proceedings of ERATO Quantum Information Science Conference 2004, EQIS04

      Pages: 96-97

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] The Lower-bound of Complexity in RSA-based Password-Authenticated Key Exchange2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Proceedings of the Computer Security Symposium 2004 (CSS2004). IPSJ Symposium Series Vol.2004 no.11.I

      Pages: 295-300

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the Relation of Two Key Generation Paradigms2004

    • Author(s)
      Rui Zhang, Goichiro Hanaoka, Hideki Imai
    • Journal Title

      Proc.of SITA2004 II

      Pages: 1116-1120

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Proceedings of the 27th Symposium on Information Theory and Its Applications (SITA2004) Vol.I

      Pages: 211-214

    • NAID

      10014280492

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Control of decay through Kerr coupling2004

    • Author(s)
      Paulo Facchi, Luigi Accardi, Kentaro Imafuku, Hideki Imai
    • Journal Title

      QIT 11

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Cooperative agents for Intrusion Detection systems2004

    • Author(s)
      Abdulrahman Alharby, Hideki Imai
    • Journal Title

      The 27th Symposium On Information Theory and Its Applications, SITA2004

      Pages: 319-322

    • NAID

      10014280695

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Privacy Enhanced RFID tags with One-Time-Recordable-Memory2004

    • Author(s)
      Dingzhe Liu, Kazukuni Kobara, Akira Ootsuka, Hideki Imai
    • Journal Title

      SITA2004 vol.II

      Pages: 423-426

    • NAID

      10014280907

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Theories of Information, Error Correcting Code, and Cryptography2004

    • Author(s)
      H.Imai
    • Journal Title

      Corona corporation

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Managing encryption and key publication independently in digital rights management systems2004

    • Author(s)
      G.Hanaoka, K.Ogawa, I.Murota, G.Ohtake, K.Majima, K.Oyamada, S.Gohshi, S.Namba, H.Imai
    • Journal Title

      IEICE Trans.Fundamentals. vol.E87-A.no.1

      Pages: 160-172

    • NAID

      110003212745

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Bit string commitment reductions with a non-zero rate2004

    • Author(s)
      A.C.A.Nascimento., J.Mueller-Quade, H.Imai
    • Journal Title

      CT-RSA2004. Springer-Verlag. LNCS 2964

      Pages: 179-193

    • Related Report
      2004 Annual Research Report
  • [Journal Article] President's Column2004

    • Author(s)
      H.Imai
    • Journal Title

      IEEE Information Theory Society Newsletter. vol.54.no.1

    • Related Report
      2004 Annual Research Report
  • [Journal Article] On the Suboptimality of Iterative Decoding for Turbo-like and LDPC Codes with Cycles in their Graph Representations2004

    • Author(s)
      Motohiko Isaka., M.P.C.Fossorier., Hideki Imai
    • Journal Title

      IEEE Trans.Commun. vol.53.no.5

      Pages: 845-854

    • Related Report
      2004 Annual Research Report
  • [Journal Article] How much security does Y-00 provide us ?2004

    • Author(s)
      Tsuyoshi Nishioka, Toshio Hasegawa, Hirokazu Ishizuka, Kentaro Imafuku, Hideki Imai
    • Journal Title

      Physics Letters A.327.28—32

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Unconditionally Secure Authenticated Encryption2004

    • Author(s)
      Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai
    • Journal Title

      IEICE Trans.Fundamentals. Vol.E87-A.No.5

      Pages: 1119-1131

    • NAID

      110003213009

    • Related Report
      2004 Annual Research Report
  • [Journal Article] The role of arbiters for unconditionally secure authentication2004

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Hanaoka, H.Imai
    • Journal Title

      IEICE Trans.Fundamentals. vol.E87-A.no.5

      Pages: 1132-1140

    • NAID

      110003213010

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Traceability schemes against illegal distribution of signed documents2004

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans.Fundamentals. vol.E87-A.no.5

      Pages: 1172-1182

    • NAID

      110003213014

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 情報量的安全性に基づく暗号技術2004

    • Author(s)
      今井秀樹, 花岡悟一郎
    • Journal Title

      電子情報通信学会論文誌 vol.J87-A.No.6

      Pages: 721-733

    • NAID

      110003311821

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 解説論文:線形符号の復号問題に基づいた強い意味で安全な公開鍵暗号方式2004

    • Author(s)
      古原 和邦, 今井 秀樹
    • Journal Title

      信学論(A) J87-A,7

      Pages: 870-880

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Unconditionally non-interactive verifiable secret sharing secure against faulty majorities in the commodity based model2004

    • Author(s)
      A.C.A.Nascimento, J.Mueller-Quade, A.Otsuka, G.Hanaoka, H.Imai
    • Journal Title

      Applied Cryptography and Network security. LNCS 3089

      Pages: 355-368

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Information theoretically secure oblivious polynomial evaluations : Model. bounds. and constructions2004

    • Author(s)
      G.Hanaoka, H.Imai, J.Mueller-Quade, A.C.A.Nascimento, A.Otsuka, A.Winter
    • Journal Title

      Information Security and Privacy. LNCS3108

      Pages: 62-73

    • NAID

      10013957847

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Security Proof for a Leakage-Resilient Authenticated Key Establishment Protocol2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      Journal of Korea Institute of Information Security & Cryptology (KIISC). vol.14.No.4

      Pages: 75-90

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Phase-noise effects on turbo trellis-coded modulation over Mary coherent channels2004

    • Author(s)
      T.Minowa, H.Ochiai, H.Imai
    • Journal Title

      IEEE Trans. Commun. vol.52.no.8

      Pages: 1333-1343

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Secret-public storage trade-o&reg ; for broadcast encryption key management2004

    • Author(s)
      M.Mihaljevi'c, M.Fossorier, H.Imai
    • Journal Title

      ICICS 2004. Lecture Notes in Computer Science vol.3269

      Pages: 375-387

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Information-theoretically secure key insulated encryption : Models. bounds and constructions2004

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans.Fundamentals. vol.E87-A.no.10

      Pages: 2521-2532

    • NAID

      110003212769

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Personal entropy from graphical passwords : Methods for quantification and practical key generation2004

    • Author(s)
      M.Akao, S.Yamanaka, G.Hanaoka, H.Imai
    • Journal Title

      IEICE Trans.Fundamentals. vol.E87-A.no.10

      Pages: 2543-2554

    • NAID

      110003212771

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 評価体制と標準化の内外動向2004

    • Author(s)
      神田雅透, 松本勉, 金子敏信, 今井秀樹
    • Journal Title

      情報処理 vol.45.no.11

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Comparison between XL and Gr&ouml ; bner basis algorithms2004

    • Author(s)
      G.Ars, J-C Faugere, H.Imai, M.Kawazoe, M.Sugita
    • Journal Title

      Asiacrypt 2004. LNCS 3329

      Pages: 338-353

    • Related Report
      2004 Annual Research Report
  • [Journal Article] On the Security of Cryptosystems with All-or-Nothing Transform2004

    • Author(s)
      Rui Zhang, Goichiro Hanaoka, Hideki Imai
    • Journal Title

      Springer-Verlag LNCS, volume 3089

      Pages: 76-90

    • Related Report
      2004 Annual Research Report
  • [Journal Article] A Lightweight Leakage-Resilient Authenticated Key Exchange Protocol for Wireless Security2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      In Proceedings of the Seventh International Symposium on WIRELESS PERSONAL MULTIMEDIA COMUNICATIONS WPMC 2004

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Quantum Key Distribution Protocol. with Controlling Annoucement States. Robust against Photon Number Splitting Attacks2004

    • Author(s)
      Makoto Eguchi, Manabu Hagiwara, Hideki Imai
    • Journal Title

      Proceedings of ERATO Quantum Information Science Conference 2004 EQIS04

      Pages: 96-97

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 鍵漏洩耐性を持つ不正者追跡法2004

    • Author(s)
      小川一人, 藤井亜里砂, 大竹剛, 花岡悟一郎, 真島恵吾, 小山田公之, 今井秀樹
    • Journal Title

      信学技報 ISEC2004-35. Vol.104.No.199

      Pages: 151-158

    • NAID

      110003296473

    • Related Report
      2004 Annual Research Report
  • [Journal Article] The Lower-bound of Complexity in RSA-based Password-Authenticated Key Exchange2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      In Proceedings of the Computer Security Symposium 2004 (CSS2004). IPSJ Symposium Series Vol.2004.No.11.volume.I of II

      Pages: 295-300

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Bloomフィルタを用いたパケットマーキング法によるIPトレースバック2004

    • Author(s)
      細井 琢朗, 松浦 幹太, 今井 秀樹
    • Journal Title

      コンピュータセキュリティシンポジウム2004論文集. Vol.I 情報処理学会シンポジウムシリーズVol.2004

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 量子鍵配送プロトコルの光子数分割攻撃に対する頑強性に関する評価2004

    • Author(s)
      江口 誠, 萩原 学, 今井 秀樹
    • Journal Title

      コンピュータセキュリティシンポジウム2004(CSS2004)予稿集 vol.2

      Pages: 541-546

    • Related Report
      2004 Annual Research Report
  • [Journal Article] An Efficient Leakage-Resilient Authenticated Key Exchange Protocol2004

    • Author(s)
      SeongHan Shin, Kazukuni Kobara, Hideki Imai
    • Journal Title

      In Proceedings of the 27th Symposium on Information Theory and Its Applications (SITA2004). Volume I or II

      Pages: 211-214

    • NAID

      10014280492

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Shielding Asymmetric Cryptosystems from Decryption Failures2004

    • Author(s)
      崔洋, 古原和邦, 今井秀樹
    • Journal Title

      Proceeding of SITA 2004. Vol.1

      Pages: 215-218

    • NAID

      10014280502

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Cooperative agents for Intrusion Detection systems2004

    • Author(s)
      Abdulrahman Alharby, Hideki Imai
    • Journal Title

      The 27th Symposium on information Theory and Its Applications SITA2004

      Pages: 319-322

    • NAID

      10014280695

    • Related Report
      2004 Annual Research Report
  • [Journal Article] P2Pにおける匿名流通モデル2004

    • Author(s)
      R.Shigetomi, H.Imai
    • Journal Title

      情報理論とその応用学会シンポジウム SITA2004

      Pages: 607-610

    • NAID

      10014281265

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 光子数分割攻撃に対してより頑強な量子鍵配送プロトコルの提案2004

    • Author(s)
      江口 誠, 萩原 学, 今井秀樹
    • Journal Title

      第11回 量子情報技術研究会 QIT2004-62

      Pages: 70-75

    • Related Report
      2004 Annual Research Report
  • [Journal Article] New short signature scheme without random oracles2004

    • Author(s)
      張鋭, 古川潤, 今井秀樹
    • Journal Title

      第27回情報理論とその応用シンポジウム Vol.II

      Pages: 619-622

    • NAID

      10014281291

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Privacy Enhanced RFID tags with One-Time-Recordable-Memory2004

    • Author(s)
      Dingzhe Liu, Kazukuni Kobara, Akira Ootsuka, Hideki Imai
    • Journal Title

      第27回情報理論とその応用シンポジウム 予稿集 SITA 2004,Vol.II

      Pages: 423-426

    • NAID

      10014280907

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 匿名権利証の無効化・再発行のためのプロトコル2004

    • Author(s)
      吉田雅徳, 江口誠, 繁富利恵, 今井秀樹
    • Journal Title

      第27回情報理論とその応用シンポジウム (SITA2004)Vol.II

      Pages: 611-614

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 電子透かし技術2004

    • Author(s)
      古原和邦, 今井秀樹
    • Journal Title

      東京電気大学出版局(2004-01) 第11章 攻撃とその対策

      Pages: 167-180

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 符号化理論の研究動向2004

    • Author(s)
      萩原学, 今井秀樹
    • Journal Title

      数理科学 11月号

      Pages: 5-12

    • Related Report
      2004 Annual Research Report
  • [Journal Article] 技研に期待すること2004

    • Author(s)
      今井秀樹
    • Journal Title

      NHK放送技術研究所 新技研だより no.65

      Pages: 1-1

    • Related Report
      2004 Annual Research Report
  • [Journal Article] Two alerts for design of certain stream ciphers : Trapped LFSR and weak resilient function over GF(q)2003

    • Author(s)
      P.Camion, M.Mihaljevic, H.Imai
    • Journal Title

      LNCS Vol. 2596

      Pages: 196-212

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Irregular low-density parity-check code design based on Euclidean geometries2003

    • Author(s)
      W.Matsumoto, W.Xu, H.Imai
    • Journal Title

      IEICE Transaction on Fundamentals VOL. E86-A No. 7

      Pages: 1820-1834

    • NAID

      110003212679

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Constructing c-secure CRT codes using polynomials over finite fields2003

    • Author(s)
      M.Kim, J.Shikata, H.Muratani, H.Imai
    • Journal Title

      IEICE Transaction on Fundamentals of Electronics vol. E86-A, no. 12

      Pages: 3259-3266

    • NAID

      110003212612

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the one-wayness against chosen-plaintext attacks on the Loidreau's modified McEliece PKC2003

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      IEEE Trans. on IT vol. 49, Issue 12

      Pages: 3160-3168

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] An improved fast correlation attack based on list decoding2003

    • Author(s)
      M.Mialjevic, M.P.C.Fossorier, H.Imai
    • Journal Title

      Proceedings of IEEE ISIT 2003

      Pages: 165-165

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Irregular Low-Density Parity-Check Code Design Based on Integer Lattices2003

    • Author(s)
      W.Matsumoto, H.Imai
    • Journal Title

      Proceedings of ISIT 2003

      Pages: 3-3

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem2003

    • Author(s)
      R.Zhang, H.Imai
    • Journal Title

      Proceedings of Applied Cryptography and Network Security (ACNS 2003) vol. 2846

      Pages: 96-110

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Compact Conversion Schemes for the Probabilistic OW-PCA Primitives2003

    • Author(s)
      Y.Cui, K.Kobara, H.Imai
    • Journal Title

      Proceedings of 5th International Conference in Information and Communications Security (ICICS2003) LNCS2836

      Pages: 269-279

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] LDPC Coded Hybrid Type II ARQ System2003

    • Author(s)
      W.Matsumoto, H.Imai
    • Journal Title

      Proceedings of WPMC2003 V1

      Pages: 109-112

    • NAID

      10013957369

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Cryptographic approach to information security2003

    • Author(s)
      H.Imai
    • Journal Title

      roceedings of the 31st International Symopsium 2003

      Pages: 37-68

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Broadcast Encryption with Short Keys and Transmissions2003

    • Author(s)
      N.Attrapadung, K.Kobara, H.Imai
    • Journal Title

      Proceedings of ACM Workshop on Digital Right Management ACM

      Pages: 55-66

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes2003

    • Author(s)
      N.Attrapadung, K.Kobara, H.Imai
    • Journal Title

      Proceedings of ASIACRYPT2003 ASIACRYPT2003

      Pages: 374-391

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Leakage-Resilient Authenticated Key Establishment Protocols2003

    • Author(s)
      SeongHan Shin, K. Kobara, H. Imai
    • Journal Title

      Proceedings of ASIACRYPT 2003 LNCS2894

      Pages: 155-172

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Revocable Anonymous Schemes for user's privacy in intrusion detection systems2003

    • Author(s)
      Abdulrahman ALHARBY, Hideki IMAI
    • Journal Title

      proceedings of the 2004 Symposium on Cryptography and Information Security SITA 2003

      Pages: 617-620

    • NAID

      10013958060

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Quantum Bit Commitment without Quantum Memoty2003

    • Author(s)
      M.Nakane, A.C.A.Nascimento, J.Mueller-Quade, H.Imai
    • Journal Title

      QIT2003

      Pages: 85-88

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Quantum Bit Commitment Robust against Noise and Multiple-photons2003

    • Author(s)
      Misa Nakane, Anderson C.A.Nascimento, Hideki Imai
    • Journal Title

      SITA2003

      Pages: 647-650

    • NAID

      10013958123

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Two alerts for design of certain stream ciphers : Trapped LFSR and weak resilient function over GF(q)2003

    • Author(s)
      P.Camion, M.Mihaljevic, H.Imai
    • Journal Title

      LNCS Vol.2596

      Pages: 196-212

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Irregular low-density parity-check code design based on Euclidean geometries2003

    • Author(s)
      W.Matsumoto, W.Xu, H.Imai
    • Journal Title

      IEICE Transaction on Fundamentals VOL.E86-A No.7

      Pages: 1820-1834

    • NAID

      110003212679

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Constructing c-secure CRT codes using polynomials over finite fields2003

    • Author(s)
      M.Kim, J.Shikata, H.Muratani, H.Imai
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics vol.E86-A, no.12

      Pages: 3259-3266

    • NAID

      110003212612

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On the one-wayness against chosen-plaintext attacks on the Loidreau's modified McEliece PKC2003

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      IEEE Trans.on IT vol.49,Issue 12

      Pages: 3160-3168

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem2003

    • Author(s)
      R.Zhang, H.Imai
    • Journal Title

      Proceedings of Applied Cryptography and Network Security (ACNS 2003) vol.2846

      Pages: 96-110

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Compact Conversion Schemes for the Probabilistic OW-PCA Primitives2003

    • Author(s)
      Y.Cui, K.Kobara, H.Imai
    • Journal Title

      Proceedings of 5th International Conference in Information and Communications Security (ICICS2003), LNCS2836

      Pages: 269-279

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] LDPC Coded Hybrid Type II ARQ System2003

    • Author(s)
      W.Matsumoto, H.Imai
    • Journal Title

      Proceedings of WPMC2003 Vol 1

      Pages: 109-112

    • NAID

      10013957369

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Cryptographic approach to information security2003

    • Author(s)
      H.Imai
    • Journal Title

      Proceedings of the 31st International Symposium 2003

      Pages: 37-68

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Leakage-Resilient Authenticated Key Establishment Protocols2003

    • Author(s)
      SeongHan Shin, K.Kobara, H.Imai
    • Journal Title

      Proceedings of ASIACRYPT 2003 LNCS2894

      Pages: 155-172

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Quantum Bit Commitment without Quantum Memory2003

    • Author(s)
      M.Nakane, A.C.A.Nascimento, J.Mueller-Quade, H.Imai
    • Journal Title

      QIT2003

      Pages: 85-88

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security Notions for Unconditionally Secure Signature Schemes2002

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, H.Imai
    • Journal Title

      Advances in Cryptology-EUROCRYPT 2332

      Pages: 434-449

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] An unconditionally secure electronic cash scheme with computational untraceability2002

    • Author(s)
      A.Otsuka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      IEICE Trans. vol.E85-A no.1

    • NAID

      110003209086

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Cryptanalysis of TOYOCRYPT-HS1 stream cipher2002

    • Author(s)
      M.Mihaljevic, H.Imai
    • Journal Title

      IEICE Transactions on Fundamentals. E-85-A

      Pages: 66-73

    • NAID

      110003209078

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A hierarchical noninteractive key-sharing scheme with low memory size and high resistance against collusion attacks2002

    • Author(s)
      G.Hanaoka, T.Nishioka, Y.Zheng, H.Imai
    • Journal Title

      the Computer Journal vol. 45. 3.

      Pages: 293-303

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Fast correlation attack algorithm with the list decoding and an application2002

    • Author(s)
      M.Mihaljevic, M.P.C.Fossorier, H.Imai
    • Journal Title

      FSE2001 Lecture Notes in Computer Science vol. 2355

      Pages: 196-210

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model2002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      IEICE Trans. E85-A. 10.

      Pages: 2229-2237

    • NAID

      110006376551

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] New chosen-plaintext attacks on the one-wayness of the modified McEliece PKC proposed at Asiacrypt 20002002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      Proc. Of PKC '2 LNCS 2274

      Pages: 237-251

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Digital Timestamps for Dispute Settlement in Electronic Commerce : Generation. Verification. and Renewal2002

    • Author(s)
      Kanta Matsuura, Hideki Imai
    • Journal Title

      Proceedings of 4th International Conference on Enterprise Information System (ICEIS 2002). Press. Volume 2.

      Pages: 962-967

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security notions of unconditionally secure signature schemes2002

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol. 2332

      Pages: 434-449

    • NAID

      110003297969

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Efficient and unconditionally secure digital signatures and a security analysis on a multireceiver authentication code2002

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Zheng, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. Springer-Verlag vol. 2274

      Pages: 64-79

    • NAID

      10020375741

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Traceability Schemes for Signed Documents2002

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      Proceedings of Information Security Conference (ISC2002) 2433.

      Pages: 257-271

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometry and Cayled Graph2002

    • Author(s)
      Wataru Matsumoto, HAGIWARA Manabu, Hedeki Imai
    • Journal Title

      International Symposium on Information Theory and Its Applications (ISITA2002) S3-2-2

      Pages: 278-290

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Traceability Schemes for Signed Documents2002

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. Springer-Verlag. Vol. 2433

      Pages: 257-271

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] OAEP++ another very simple way to fix the bug in OAEP2002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      Proc. of 2002 International Symposium on Information Theory and Its Applications S6-4-5

      Pages: 563-566

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally secure key insulated cryptosystem : models bounds and constructions2002

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. Springer-Verlag. vol. 2513

      Pages: 85-96

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally secure anonymous encryption and group authentication2002

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Hanaoka, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. Springer-Verlag. vol. 2501

      Pages: 81-99

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Discussions on Unconditionally Secure VSS Robust against Dishonest Majority2002

    • Author(s)
      Akira Otsuka, Junji Shikata, Hideki Imai
    • Journal Title

      情報セキュリティ研究会(ISEC) Vol. 102 No. 212

      Pages: 81-88

    • NAID

      110003298505

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally Secure Electronic Cash Based on Secure Computation2002

    • Author(s)
      Akira Otsuka, Hideki Imai
    • Journal Title

      第25回情報理論とその応用シンポジウム(SITA2002) Vol. 2

      Pages: 35-38

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Anonymous Refreshability of Tokens2002

    • Author(s)
      Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
    • Journal Title

      第25回情報理論とその応用シンポジウム予稿集. 情報理論とその応用学会 第1分冊

      Pages: 43-46

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security of a Quantum Bit Commitment Protocol Based on a Physical Assumption against a Single Particle Measurement Attack2002

    • Author(s)
      Misa Nakane, Anderson Clayton, A. Nascimento, Hideki Imai
    • Journal Title

      第25回情報理論とその応用シンポジウム予稿集,「情報理論とその応用学会」 Vol. 1

      Pages: 535-538

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On Interactive Key Pre-Distribution Schemes2002

    • Author(s)
      M.G.Rahman, A.C.A.Nascimento, J.Mueller-Quade, H.Imai
    • Journal Title

      Proceedings of the 25^th symposium of Information Theory and its Applications (SITA2002) Vol. 1

      Pages: 347-350

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Evaluation of OAEP Variants with IND-CCA2 Security2002

    • Author(s)
      Yang Cui, Kazukuni Kobara, Hideki Imai
    • Journal Title

      第25回情報理論とその応用シンポジウム(SITA2002)、第25回情報理論とその応用シンポジウム実行委員会、創文社 Vol. 2.

      Pages: 619-622

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Secure blind signature based one-way accumulators2002

    • Author(s)
      Boonying Srivanasont, Akira Otsuka, Hideki Imai
    • Journal Title

      Proceeding of the 25th Symposium on Information Theory and Its Applications Volume 1 of 2

      Pages: 47-50

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] PAKE vs. password-based authentications in wireless standards2002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      Proc. 25th Symp. Inform. Theory and Its Applications (SITA '02) Vol. 1

      Pages: 243-246

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security Notions for Unconditionally Secure Signature Schemes2002

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, H.Imai
    • Journal Title

      Advances in Cryptology-EUROCRYPT. 2332

      Pages: 434-449

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Boolean Expression of Subtree in Secure Broadcasting2002

    • Author(s)
      Jian WANG, Hideki Imai
    • Journal Title

      Proceedings of the 25th Symposium on Information Theory and Its Applications (SITA2002) Vol.1

      Pages: 131-134

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A traitor traceable conference system with dynamic sender2002

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Zheng, H.Imai
    • Journal Title

      IEICE Trans. vol.E85-A no.1

      Pages: 167-174

    • NAID

      110003209089

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] A hierarchical noninteractive key-sharing scheme with low memory size and high resistance against collusion attacks2002

    • Author(s)
      G.Hanaoka, T.Nishioka, Y.Zheng, H.Imai
    • Journal Title

      the Computer Journal Vol.45.3

      Pages: 293-303

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Fast correlation attack algorithm with the list decoding and an application2002

    • Author(s)
      M.Mihaljevic, M.P.C.Fossorier, H.Imai
    • Journal Title

      FSE2001 Lecture Notes in Computer Science vol.2355

      Pages: 196-210

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model2002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      IEICE Trans. E85-A.10

      Pages: 2229-2237

    • NAID

      110006376551

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] New chosen-plaintext attacks on the one-wayness of the modified McEliece PKC proposed at Asiacrypt 20002002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      Proc. of PKC '02. LNCS 2274

      Pages: 237-251

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Digital Timestamps for Dispute Settlement in Electronic Commerce : Generation. Verification. and Renewal2002

    • Author(s)
      Kanta Matsuura, Hideki Imai
    • Journal Title

      Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002). Press. Volume 2

      Pages: 962-967

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security notions of unconditionally secure signature schemes2002

    • Author(s)
      J.Shikata, G.Hanaoka, Y.Zheng, H.Imai
    • Journal Title

      Lecture Notes in Computer Science vol.2332

      Pages: 434-449

    • NAID

      110003297969

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Efficient and unconditionally secure digital signatures and a security analysis on a multireceiver authentication code2002

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Zheng, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. (Springer-Verlag) vol.2274

      Pages: 64-79

    • NAID

      10020375741

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Traceability Schemes for Signed Documents2002

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      Proceedings of Information Security Conference (ISC2002) 2433

      Pages: 257-271

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometry and Cayley Graph2002

    • Author(s)
      Wataru Matsumoto, HAGIWARA Manabu, Hideki Imai
    • Journal Title

      International Symposium on Information Theory and Its Applications (ISITA2002) S3-2-2

      Pages: 278-290

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Traceability schemes for signed documents2002

    • Author(s)
      S.Yonezawa, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. (Springer-Verlag.) Vol.2433

      Pages: 257-271

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally secure key insulated cryptosystems : models bounds and constructions2002

    • Author(s)
      Y.Hanaoka, G.Hanaoka, J.Shikata, H.Imai
    • Journal Title

      LNCS vol.2513

      Pages: 86-96

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally secure anonymous encryption and group authentication2002

    • Author(s)
      G.Hanaoka, J.Shikata, Y.Hanaoka, H.Imai
    • Journal Title

      Lecture Notes in Computer Science. (Springer-Verlag.) vol.2501

      Pages: 81-99

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Discussions on Unconditionally Secure VSS Robust against Dishonest Majority2002

    • Author(s)
      Akira Otsuka, Junji Shikata, Hideki Imai
    • Journal Title

      ISEC Vol.102 No.212

      Pages: 81-88

    • NAID

      110003298505

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Unconditionally Secure Electronic Cash Based on Secure Computation2002

    • Author(s)
      Akira Otsuka, Hideki Imai
    • Journal Title

      SITA2002 Vol.2

      Pages: 35-38

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Anonymous Refreshability of Tokens2002

    • Author(s)
      Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
    • Journal Title

      SITA2002 vol.1

      Pages: 43-46

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Security of a Quantum Bit Commitment Protocol Based on a Physical Assumption against a Single Particle Measurement Attack2002

    • Author(s)
      Misa Nakane, Anderson Clayton, A.Nascimento, Hideki Imai
    • Journal Title

      SITA2002 vol.1

      Pages: 535-538

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] On Interactive Key Pre-Distribution Schemes2002

    • Author(s)
      M.G.Rahman, A.C.A.Nascimento, J.Mueller-Quade, H.Imai
    • Journal Title

      Proceedings of the 25th Symposium of Information Theory and its Applications (SITA2002) Vol.1

      Pages: 347-350

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Evaluation of OAEP Variants with IND-CCA2 Security2002

    • Author(s)
      Yang Cui, Kazukuni Kobara, Hideki Imai
    • Journal Title

      SITS2002 vol.2

      Pages: 619-622

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Secure blind signature based on one-way accumulators2002

    • Author(s)
      Boonying Srivanasont, Akira Otsuka, Hideki Imai
    • Journal Title

      Proceeding of the 25th Symposium on Information Theory and Its Applications Vol.1

      Pages: 47-50

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] PAKE vs. password-based authentications in wireless standards2002

    • Author(s)
      K.Kobara, H.Imai
    • Journal Title

      Proc. 25th Symp.Inform. Theory and Its Applications (SITA '02 vol.1

      Pages: 243-246

    • Description
      「研究成果報告書概要(欧文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Journal Article] Boolean Expression of Subtree in Secure Broadcasting2001

    • Author(s)
      Jian WANG, Hideki Imai
    • Journal Title

      Proceed of the 25^th Symposium on Information Theory and Its Applications (SITA2002) Vol.1

    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Book] 情報・符号・暗号の理論2004

    • Author(s)
      今井秀樹
    • Total Pages
      220
    • Publisher
      コロナ社
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary 2004 Annual Research Report
  • [Patent(Industrial Property Rights)] 量子鍵配送プロトコル

    • Inventor(s)
      江口誠, 萩原学, 今井秀樹
    • Industrial Property Rights Holder
      江口誠, 萩原学, 今井秀樹
    • Industrial Property Number
      2004-253266
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Patent(Industrial Property Rights)] 量子鍵配送プロコトル

    • Inventor(s)
      江口誠, 萩原学, 今井秀樹
    • Industrial Property Rights Holder
      江口誠, 萩原学, 今井秀樹
    • Description
      「研究成果報告書概要(和文)」より
    • Related Report
      2005 Final Research Report Summary
  • [Publications] P.Camion, M.Mihaljevic, H.Imai: "Two alerts for design of certain stream ciphers : Trapped LFSR and weak resilient function over GF(q)"LNCS. Vol.2596. 196-212 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] W.Matsumoto, W.Xu, H.Imai: "Irregular low-density parity-check code design based on Euclidean geometries"IEICE Transaction on Fundamentals. VOL.E86-A No.7. 1820-1834 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] M.Kim, J.Shikata, H.Muratani, H.Imai: "Constructing c-secure CRT codes using polynomials over finite fields"IEICE Transactions on Fundamentals of Electronics. vol.E86-A, no.12. 3259-3266 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] K.Kobara, H.Imai: "On the one-wayness against chosen-plaintext attacks on the Loidreau's modified McEliece PKC"IEEE Trans.on IT. vol.49, Issue 12. 3160-3168 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] M.Mialjevic, M.P.C.Fossorier, H.Imai: "An improved fast correlation attack based on list decoding"Proceedings of IEEE ISIT 2003. 165 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] W.Matsumoto, H.Imai: "Irregular Low-Density Parity-Check Code Design Based on Integer Lattices"Proceedings of ISIT 2003. 3 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] R.Zhang, H.Imai: "Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem"Proceedings of Applied Cryptography and Network Security (ACNS 2003). vol.2846. 96-110 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Y.Cui, K.Kobara, H.Imai: "Compact Conversion Schemes for the Probabilistic OW-PCA Primitives"Proceedings of 5th International Conference in Information and Communications Security (ICICS2003). LNCS2836. 269-279 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] W.Matsumoto, H.Imai: "LDPC Coded Hybrid Type II ARQ System"Proceedings of WPMC2003. V1. 109-112 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] H.Imai: "Cryptographic approach to information security"Proceedings of the 31st International Symposium. 2003. 37-68 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] N.Attrapadung, K.Kobara, H.Imai: "Broadcast Encryption with Short Keys and Transmissions"Proceedings of ACM Workshop on Digital Right Management. ACM. 55-66 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] N.Attrapadung, K.Kobara, H.Imai: "Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes"Proceedings of ASIACRYPT2003. ASIACRYPT2003. 374-391 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] SeongHan Shin, K.Kobara, H.Imai: "Leakage-Resilient Authenticated Key Establishment Protocols"Proceedings of ASIACRYPT 2003. LNCS2894. 155-172 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Abdulrahman ALHARBY, Hideki IMAI: "Revocable Anonymous Schemes for user's privacy in intrusion detection systems"In proceedings of the 2004 Symposium on Cryptography and Information Security. SITA 2003. 617-620 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, Hiroshi Yoshiura, Satoru Tezuka, Hideki Imai: "A Digital Document Sanitizing Scheme with Disclosure Condition Control"In proceedings of the 2004 Symposium on Cryptography and Information Security. SCI2004. 515-520 (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] 今福健太郎, アンダーソン・ナシメント, 今井秀樹: "量子力学的ヒントのあるゲームの利得最適化問題"Proceedings of 26th Symposium on Information Theory and Its Application. SITA2003. 545 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Misa Nakane, Anderson C.A.Nascimento, Joern Mueller-Quade, Hideki Imai: "Quantum Bit Commitment without Quantum Memory"QIT2003. QIT2003. 85-88 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Misa Nakane, Anderson C.A.Nascimento, Hideki Imai: "Quantum Bit Commitment Robust against Noise and Multiple-photons"SITA2003. SITA2003. 647-650 (2003)

    • Related Report
      2003 Annual Research Report
  • [Publications] Kunihiko Miyazaki, Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki: "A Digital Document Sanitizing Scheme with Disclosure Condition Control"In proceedings of the 2004 Symposium on Cryptography and Information Security. SCIS2004. 515-520 (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] 中根美沙, アンダーソン・ナシメント, 今井秀樹: "消失通信路を用いた頑強性のあるピットコミットメント"暗号と情報セキュリティシンポジウム(SCIS). 1057-1066 (2004)

    • Related Report
      2003 Annual Research Report
  • [Publications] Junji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: "Security Notions for Unconditionally Secure Signature Schemes"Advances in Cryptology -EUROCRYPT. 2332. 434-449 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Rui Zhang, Michiharu Kudo, Kanta Matsuura, Hideki Imai: "Instance revocation regarding digital signatures"Proceeding of the 2002 Symposium on Cryptography and Information Security (SCIS). 1143-1148 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Jian WANG, Hideki Imai: "Boolean Expression of Subtree in Secure Broadcasting"Name of journal. volume. number. page. publishing office : Proceedings of the 25th Symposium on Information Theory and Its Applications (SITA2002). IEEE Information Theory Society. Japan Chapter. Vol.1. 131-134 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Rui Zhang, Lein Harn, Hideki Imai: "Decomposable commitment schemes and its applications"Symposium on Information Theory and its Applications (ISTA). 527-530 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: "A traitor traceable conference system with dynamic sender"IEICE Trans.. vol.E85-A no.1. 167-174 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "An unconditionally secure electronic cash scheme with computational untraceability"IEICE Trans.. vol.E85-A no.1. 140-148 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] M.Mihaljevic, H.Imai: "Cryptanalysis of TOYOCRYPT-HS1 stream cipher"IEICE Transactions on Fundamentals. E-85-A. 66-73 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Goichiro Hanaoka, Tsuyoshi Nishioka, Yuliang Zheng, Hideki Imai: "A hierarchical noninteractive key-sharing scheme with low memory size and high resistance against collusion attacks"the Computer Journal. vol.45.3. 293-303 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 松本 渉, 今井 秀樹: "OFDM変調及びMC-CDMA変調方式のハーフシンボル化の検討"電子情報通信学会論文誌.B. Vol.J85-B No.6. 910-921 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 松本 渉, 許 偉剛.今井 秀樹: "ランダム系列のラテン方陣/長方形構造によるターボ符号インタリーバの構成法"電子情報通信学会論文誌.A. Vol.J85-A No.6. 691-703 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] M.Mihaljevic, M.P.C.Fossorier, H.Imai: "Fast correlation attack algorithm with the list decoding and an application". FSE2001"Lecture Notes in Computer Science. vol.2355. 196-210 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "An Anonymous Loan System Based on Group Signature"Springer in Informarion Security Conference 2002. 244-256 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] K.Kobara, H.Imai: "Pretty-simple password-authenticated key-exchange protocol proven to be secure in the standard model"IEICE Trans.. E85-A.10. 2229-2237 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 古原 和邦, 今井秀樹: "電子透かし技術とその周辺 --攻撃とその対策--"画像電子学会誌. 31.6. 1213-1217 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] K.Kobara, H.Imai: "New chosen-plaintext attacks on the one-wayness of the modified McEliece PKC proposed at Asiacrypt 2000"Proc. of PKC '02.. 2274. 237-251 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Kanta Matsuura, Hideki Imai: "Digital Timestamps for Dispute Settlement in Electronic Commerce : Generation. Verification. and Renewal"Proceedings of 4th International Conference on Enterprise Information Systems (ICEIS 2002). Press.. Volume 2. 962-967 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Junji Shikata, Goichiro Hanaoka, Yumiko Zheng, Hideki Imai: "Security notions of unconditionally secure signature schemes"Lecture Notes in Computer Science. vol.2332. 434-449 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: "Efficient and unconditionally secure digital signatures and a security analysis on a multireceiver authentication code"Lecture Notes in Computer Science. Springer-Verlag. vol.2274. 64-79 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Wataru Matsumoto, Hideki Imai: "Irregular extended Euclidean geometry low-density parity-check codes"Proceeding of 3rd International Symposium on Communication System. Networks and Digital Signal Processing (CSNDSP2002). 148-151 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] P.Camion, M.Mihaljevic, H.Imai: "On employment of LFSRs over GF(q) in certain stream ciphers"IEEE Int.Symp.Inform.Theory -ISIT'2002. Lausanne, Switzerland. July 2002. Proceedings. 210 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] P.Camion, M.Mihaljevic, H.Imai: "Two alerts for design of certain stream ciphers : Trapped LFSR and weak resilient function over GF(q)"Selected Areas in Cryptography -SAC2002. St. John's. Newfoundland. Canada. August 2002. Workshop Record. 203-217 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "Traceability Schemes for Signed Documents"Proceedings of Information Security Conference (ISC2002). 2433. 257-271 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "An Anonymous Loan System Using Secret Sharing Scheme"ISITA2002 Xi'an. 227-230 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Wataru Matsumoto, HAGIWARA Manabu, Hideki Imai: "Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometry and Cayley Graph"International Symposium on Information Theory and Its Applications (ISITA2002). S3-2-2. 278-290 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Wataru Matsumoto, Hideki Imai: "Blind Synchronization with Enhanced Sum-Product Algorithm for Low-Density Parity-Check Codes"The Fifth International Symposium on Wireless Personal Multimedia Communications (WPMC'02). 966-970 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Jonas Karlsson, Hideki Imai: "Performance of Combined Serial IC and Normalized Griffiths' Algorithm in Multi-Cell CDMA Systems"The 5th International Symposium on Wireless Personal Multimedia Communications. Honolulu. USA. 1237-1241 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "Traceability schemes for signed documents"Lecture Notes in Computer Science. vo. 2433. 257-271 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Mohammad Ghulam Rahman, Hideki Imai: "Anonymous Authenticated Key Agreement Protocol Integrating End-User Authentication for Mobile Communications"Proceedings of International Symposium on Information Theory and Its Applications (ISITA). 219-222 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] K.Kobara, H.Imai: "OAEP++ another very simple way to fix the bug in OAEP"Proc.of 2002 International Symposium on Information Theory and Its Applications. S6-4-5. 563-566 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] K.Kobara, H.Imai: "PAKE vs.password-based authentications in wireless standards"Proc.of The 3rd International Workshop on ITS Telecommunications. 135-138 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: "Unconditionally secure key insulated cryptosystems : models bounds and constructions"Lecture Notes in Computer Science. vol.2513. 85-96 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: "Unconditionally secure anonymous encryption and group authentication"Lecture Notes in Computer Science. vol.2501. 81-99 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 繁富利恵, 大塚玲, 小川貴英, 今井秀樹: "匿名貸し出しプトロトル"暗号と情報セキュリティシンポジウム.電子情報通信学会情報セキュリティ研究専門委員会. 2巻. 271 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 渡辺 曜大, 松本 渉, 今井秀樹: "低密度パリティ検査行列を用いた量子鍵配送のための誤り訂正技術"2003年暗号と情報セキュリティシンポジウム. Vol.2. 1219-1220 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 米沢祥子, 花岡悟一郎, 今井秀樹: "署名つき文書に対する漏洩者追跡方式"2002年暗号と情報セキュリティシンポジウム(SCIS2002)予稿集. 429-434 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 金 美羅, 四方 順司, 村谷 博文, 今井 秀樹: "c-Secure CRT符号について"2002年暗号と情報セキュリティシンポジウム予稿集 Iy2. 第2号. 1015-1020 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Mohammad Ghulam Rahman, Hideki Imai: "Mutual Authentication with User Anonymity in Mobile Communications"Proceedings of the 2002 Symposium on Cryptography and Information Security (SCIS2002). 445-450 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 山中 晋爾, 松浦 幹太, 今井 秀樹: "侵入検知及び内部攻撃者検知とヒューマンクリプト"2002年暗号と情報セキュリティシンポジウム(SCIS2002)予稿集. 979-984 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 松本 渉, 今井 秀樹: "OFDM変調及びMC-CDMA変調方式のハーフシンボル化の検討"電子情報通信学会論文誌.B. Vol.J85-B No.6. 910-921 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Akira Otsuka, Junji Shikata, Hideki Imai: "Discussions on Unconditionally Secure VSS Robust against Dishonest Majority"情報セキュリティ研究会(ISEC). Vol.102 No.212. 81-88 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 鬼頭大介, 大塚玲, 今井秀樹: "情報量的に安全な地域内公開検証可能秘密分散法"情報セキュリティ研究会(ISEC).発行所:電子情報通信学会. Vol.102 No.212. 89-94 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 松本 渉, 今井 秀樹: "決定論的非正則LDPC符号設計法"2002年電子情報通信学会基礎・境界ソサイエティ大会. A-6-12. 126 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Akira Otsuka, Hideki Imai: "Unconditionally Secure Electronic Cash Based on Secure Computation"第25回情報理論とその応用シンポジウム(SITA2002). Vol.2. 35-38 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 萩原 学, 松本 渉, 今井 秀樹: "量子鍵配送における誤り訂正符号に関する考察"第25回情報理論とその応用シンポジウム予稿集. Vol.2. 431-434 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "Anonymous Refreshability of Tokens"第25回情報理論とその応用シンポジウム予稿集.情報理論とその応用学会. 第1分冊. 43-46 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 田村 仁, 古原 和邦, 今井 秀樹: "個人情報の保護を考慮したトラストメトリックスの提案"Proceedings of the 25th Symposium on Information Theory and Its Applications (SITA2002). Volume I of II. 135-138 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Misa Nakane, Anderson Clayton, A.Nascimento, Hideki Imai: "Security of a Quantum Bit Commitment Protocol Based on a Physical Assumption against a Single Particle Measurement Attack"第25回情報理論とその応用シンポジウム予稿集,「情報理論とその応用学会」. Vol.1. 535-538 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 赤尾 雅人, 今井秀樹: "バイオメトリックスを用いた暗号鍵生成"第25回情報理論とその応用シンポジウム(SITA2002)予稿集. Vol.1. 339-342 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 金 美羅, 古原 和邦, 今井 秀樹: "コンテンツの不正配布を考慮したBroadcast Encryption方式"第25回情報理論とその応用シンポジウム予稿集. 1巻1号. 127-130 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Mohammad Ghulam Rahman, Anderson C.A.Nascimento, Joern Mueller-Quade, Hideki Imai: "On Interactive Key Pre-Distribution Schemes"Proceedings of the 25th Symposium of Information Theory and its Applications (SITA2002). Vol.1. 347-350 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 鬼頭大介, 大塚玲, 古原和邦, 今井秀樹: "Distributed Trusted Initializer in Unconditionally Secure VSS"情報理論とその応用シンポジウム(SITA).第25回.主催:情報理論とその応用学会. Vol.1. 231-234 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 山中 晋爾, 繁富 利恵, 今井 秀樹: "侵入検知技術の内部攻撃者検知技術への応用"第25回情報理論とその応用シンポジウム(SITA2002)予稿集. Vol.1. 247-250 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Yang Cui, Kazukuni Kobara, Hideki Imai: "Evaluation of OAEP Variants with IND-CCA2 Security"第25回情報理論とその応用シンポジウム(SITA2002)、第25回情報理論とその応用シンポジウム実行委員会、創文社. Vol.2. 619-622 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Boonying Srivanasont, Akira Otsuka, Hideki Imai: "Secure blind signature based on one-way accumulators"Proceeding of the 25th Symposium on Information Theory and Its Applications. Volume 1 of 2. 47-50 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] K.Kobara, H.Imai: "PAKE vs.password-based authentications in wireless standards"Proc.25th Symp.Inform.Theory and Its Applications (SITA '02). Vol.1. 243-246 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] 副島 晋, 松浦 幹太, 今井 秀樹: "電子権利流通方式対に関する特性分析"2002年暗号と情報セキュリティシンポジウム予稿集. Vol.1. 223-228 (2002)

    • Related Report
      2002 Annual Research Report
  • [Publications] Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai: "A Note on Anonymous Loan System"情報処理学会.コンピュータセキュリティ研究会(CSEC). 153-160 (2002)

    • Related Report
      2002 Annual Research Report

URL: 

Published: 2002-04-01   Modified: 2016-04-21  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi