• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Research on Coexistence of Computational and Information-Theoretic Security Mechanisms for Long-term Security

Research Project

Project/Area Number 26540056
Research Category

Grant-in-Aid for Challenging Exploratory Research

Allocation TypeMulti-year Fund
Research Field Information security
Research InstitutionYokohama National University

Principal Investigator

SHIKATA JUNJI  横浜国立大学, 大学院環境情報研究院, 教授 (30345483)

Co-Investigator(Renkei-kenkyūsha) MATSUMOTO TSUTOMU  横浜国立大学, 大学院環境情報研究院, 教授 (40183107)
Project Period (FY) 2014-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥3,640,000 (Direct Cost: ¥2,800,000、Indirect Cost: ¥840,000)
Fiscal Year 2016: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2015: ¥1,170,000 (Direct Cost: ¥900,000、Indirect Cost: ¥270,000)
Fiscal Year 2014: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywords暗号理論 / 情報量的安全性 / 高機能暗号 / 長期的安全性 / 暗号・認証等 / 情報理論的安全性 / 暗号 / 認証 / 計算量的安全性
Outline of Final Research Achievements

In this research project, we investigated (im)possibility of coexistence of computational and information-theoretic security for advanced cryptographic systems with long-term security. Our approach is to analyze various computational or information-theoretic advanced functionalities in cryptographic systems by means of several mathematical structures, and such advanced functionalities include timed-release functionality, revocable functionality, and searchable functionality. In addition, the analysis results tell us that, in a cryptographic system in which computational and information-theoretic security coexist, it seems to be difficult to maintain long-term security only by information-theoretic security without any additional assumption if computational security is compromised.

Report

(4 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (61 results)

All 2017 2016 2015 2014

All Journal Article (33 results) (of which Peer Reviewed: 17 results,  Acknowledgement Compliant: 3 results,  Open Access: 1 results) Presentation (28 results) (of which Int'l Joint Research: 7 results,  Invited: 2 results)

  • [Journal Article] Unconditionally Secure Searchable Encryption2017

    • Author(s)
      T. Yoshizawa, Y. Watanabe, and J. Shikata
    • Journal Title

      Proc. of The 51st Annual Conference on Information Systems and Sciences (CISS 2017)

      Volume: 未定

    • NAID

      170000151476

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Threshold Encryption2017

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Designs, Codes and Cryptography

      Volume: 未定

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance2017

    • Author(s)
      Y. Ishida, J. Shikata, and Y. Watanabe
    • Journal Title

      International Journal on Applied Cryptography

      Volume: 未定

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 推測秘匿性に基づく情報理論的に安全な検索可能暗号2017

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)論文集

      Volume: -

    • Related Report
      2016 Annual Research Report
  • [Journal Article] Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness2016

    • Author(s)
      Y. Watanabe, G. Hanaoka, J. Shikata
    • Journal Title

      Information Theoretic Security, Springer

      Volume: LNCS 10015 Pages: 213-237

    • DOI

      10.1007/978-3-319-49175-2_11

    • ISBN
      9783319491745, 9783319491752
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Information-theoretically Secure Timed-release Secret Sharing Schemes2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Journal of Information Processing

      Volume: 24 Issue: 4 Pages: 680-689

    • DOI

      10.2197/ipsjjip.24.680

    • NAID

      130005165245

    • ISSN
      1882-6652
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99.A Issue: 6 Pages: 1097-1106

    • DOI

      10.1587/transfun.E99.A.1097

    • NAID

      130005154232

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] 格子問題に基づくSigncryption構成法の再考2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS2016)論文集

      Volume: -

    • NAID

      170000173664

    • Related Report
      2016 Annual Research Report
  • [Journal Article] 情報理論的に安全な検索可能暗号の構成法について2016

    • Author(s)
      吉澤貴博, 渡邉洋平, 四方順司
    • Journal Title

      2016年コンピュータセキュリティシンポジウム(CSS2016)論文集

      Volume: -

    • NAID

      170000173735

    • Related Report
      2016 Annual Research Report
  • [Journal Article] Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Storage2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      IEICE Trans., Special Section on Discrete Mathematics and Its Applications

      Volume: 未定

    • NAID

      130005154232

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Information-Theoretically Secure Timed-Release Secret Sharing Schemes2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Journal of Information Processing

      Volume: 未定

    • NAID

      130005165245

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Identity-based Hierarchical Key-insulated Encryption without Random Oracles2016

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Public-Key Cryptography (PKC 2016), Springer

      Volume: LNCS 9614 Pages: 255-279

    • DOI

      10.1007/978-3-662-49384-7_10

    • ISBN
      9783662493830, 9783662493847
    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Sequential Aggregate Authentication Codes with Information Theoretic Security2016

    • Author(s)
      S. Tomita, Y. Watanabe, J. Shikata
    • Journal Title

      2016 Annual Conference on Information Sciences and Systems (CISS)

      Volume: - Pages: 192-197

    • DOI

      10.1109/ciss.2016.7460500

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] 格子問題に基づくSigncryptionのスタンダードモデルでの構成2016

    • Author(s)
      佐藤慎悟, 四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Research-status Report
  • [Journal Article] 情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法2016

    • Author(s)
      吉澤貴博,渡邉洋平,四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Research-status Report
  • [Journal Article] スタンダードモデルにおけるID ベース階層型鍵隔離暗号の構成法2016

    • Author(s)
      渡邉洋平,四方順司
    • Journal Title

      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)論文集

      Volume: -

    • Related Report
      2015 Research-status Report
  • [Journal Article] Constructions of CCA-secure Revocable Identity-based Encryption2015

    • Author(s)
      Y. Ishida, Y. Watanabe, J. Shikata
    • Journal Title

      Information Security and Privacy (ACISP 2015), Springer

      Volume: LNCS 9144 Pages: 174-191

    • DOI

      10.1007/978-3-319-19962-7_5

    • ISBN
      9783319199610, 9783319199627
    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      M. Iwamoto, J. Shikata
    • Journal Title

      Proc. of 2015 IEEE International Symposium on Information Theory (ISIT2015)

      Volume: - Pages: 725-729

    • DOI

      10.1109/isit.2015.7282550

    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage2015

    • Author(s)
      Y. Watanabe, J. Shikata
    • Journal Title

      Provable Security (ProvSec 2015), Springer

      Volume: LNCS 9451 Pages: 489-502

    • DOI

      10.1007/978-3-319-26059-4_27

    • ISBN
      9783319260587, 9783319260594
    • Related Report
      2015 Research-status Report
    • Peer Reviewed
  • [Journal Article] 情報理論的に安全な検索可能暗号2015

    • Author(s)
      吉澤貴博,渡邉洋平,四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 1321-1326

    • NAID

      170000151476

    • Related Report
      2015 Research-status Report
  • [Journal Article] 暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法2015

    • Author(s)
      渡邉洋平,四方順司
    • Journal Title

      2015年コンピュータセキュリティシンポジウム (CSS 2015)論文集

      Volume: - Pages: 395-402

    • NAID

      170000151356

    • Related Report
      2015 Research-status Report
  • [Journal Article] Timed-Release Secret Sharing Schemes with Information-Theoretic Security2015

    • Author(s)
      Yohei Watanabe, Junji Shikata
    • Journal Title

      Springer LNCS

      Volume: 未定

    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Journal Article] Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys2015

    • Author(s)
      Noriyasu Takei, Yohei Watanabe, Junji Shikata
    • Journal Title

      Josai Mathematical Monograph

      Volume: 8 Pages: 115-133

    • NAID

      120005575969

    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Open Access
  • [Journal Article] 推測確率に基づいた安全性基準をみたす暗号化方式の構成法2015

    • Author(s)
      岩本貢, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Related Report
      2014 Research-status Report
  • [Journal Article] 推測成功確率に基づいた安全性基準をみたす秘密分散法2015

    • Author(s)
      岩本貢, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Related Report
      2014 Research-status Report
  • [Journal Article] 暗号文の耐改変性と復号権限の変更機能をもつ情報理論的に安全な放送型暗号2015

    • Author(s)
      渡邉洋平, 花岡悟一郎, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Related Report
      2014 Research-status Report
  • [Journal Article] Canetti-Halevi-Katz変換による代理人再暗号化方式の一般的構成法2015

    • Author(s)
      河西真瑠那, 清藤武暢, 渡邉洋平, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Related Report
      2014 Research-status Report
  • [Journal Article] CCA安全かつ暗号文長が短い鍵失効機能付きIDベース暗号の構成法2015

    • Author(s)
      石田優, 渡邉洋平, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Related Report
      2014 Research-status Report
  • [Journal Article] 情報理論的に安全な順序検証型多重認証方式2015

    • Author(s)
      富田信一朗, 渡邉洋平, 四方順司
    • Journal Title

      2015年暗号と情報セキュリティシンポジウム(SCIS2015)論文集

      Volume: --

    • Related Report
      2014 Research-status Report
  • [Journal Article] Timed-Release Computational Secret Sharing Scheme and Its Applications2014

    • Author(s)
      Yohei Watanabe and Junji Shikata
    • Journal Title

      Provable Security

      Volume: 8782 Pages: 115-133

    • DOI

      10.1007/978-3-319-12475-9_24

    • ISBN
      9783319124742, 9783319124759
    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Journal Article] Secret Sharing Schemes Based on Min-Entropies2014

    • Author(s)
      Mitsugu Iwamoto, Junji Shikata
    • Journal Title

      Proc. of IEEE International Symposium on Information Theory (ISIT2014)

      Volume: -- Pages: 401-405

    • DOI

      10.1109/isit.2014.6874863

    • Related Report
      2014 Research-status Report
    • Peer Reviewed
  • [Journal Article] 選択暗号文攻撃に対して安全な鍵失効機能付きIDベース暗号2014

    • Author(s)
      石田優, 渡邉洋平, 四方順司
    • Journal Title

      2014年コンピュータセキュリティシンポジウム(CSS2014)論文集

      Volume: --

    • NAID

      170000087281

    • Related Report
      2014 Research-status Report
  • [Journal Article] 受信者集合を変更可能な情報理論的安全性に基づく放送型暗号2014

    • Author(s)
      渡邉洋平, 四方順司
    • Journal Title

      2014年コンピュータセキュリティシンポジウム(CSS2014)論文集

      Volume: --

    • NAID

      170000087362

    • Related Report
      2014 Research-status Report
  • [Presentation] Unconditionally Secure Searchable Encryption2017

    • Author(s)
      T. Yoshizawa
    • Organizer
      The 51st Annual Conference on Information Systems and Sciences (CISS 2017)
    • Place of Presentation
      Baltimore, Maryland, USA
    • Year and Date
      2017-03-22
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 推測秘匿性に基づく情報理論的に安全な検索可能暗号2017

    • Author(s)
      吉澤貴博
    • Organizer
      2017年暗号と情報セキュリティシンポジウム (SCIS 2017)
    • Place of Presentation
      沖縄, 日本
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] 情報理論的に安全な検索可能暗号の構成法について2016

    • Author(s)
      吉澤貴博
    • Organizer
      2016年コンピュータセキュリティシンポジウム(CSS2016)
    • Place of Presentation
      秋田, 日本
    • Year and Date
      2016-10-11
    • Related Report
      2016 Annual Research Report
  • [Presentation] 格子問題に基づくSigncryption構成法の再考2016

    • Author(s)
      佐藤慎悟
    • Organizer
      2016年コンピュータセキュリティシンポジウム(CSS2016)
    • Place of Presentation
      秋田, 日本
    • Year and Date
      2016-10-11
    • Related Report
      2016 Annual Research Report
  • [Presentation] 横浜国立大学先端科学高等研究院「情報・物理セキュリティ研究ユニット」の活動紹介2016

    • Author(s)
      四方順司
    • Organizer
      IoT Security Forum 2016
    • Place of Presentation
      東京, 日本
    • Year and Date
      2016-09-15
    • Related Report
      2016 Annual Research Report
    • Invited
  • [Presentation] Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness2016

    • Author(s)
      Y. Watanabe
    • Organizer
      The 9th International Conference on Information Theoretic Security (ICITS 2016)
    • Place of Presentation
      Tacoma, Washington, USA
    • Year and Date
      2016-08-09
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] Sequential Aggregate Authentication Codes with Information Theoretic Security2016

    • Author(s)
      S. Tomita
    • Organizer
      2016 Annual Conference on Information Sciences and Systems (CISS)
    • Place of Presentation
      Princeton, USA
    • Year and Date
      2016-03-16
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Identity-based Hierarchical Key-insulated Encryption without Random Oracles2016

    • Author(s)
      Y. Watanabe
    • Organizer
      The 19th IACR International Conference on Practice and Theory in Public-Key Cryptography
    • Place of Presentation
      Taipei, Taiwan
    • Year and Date
      2016-03-06
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] 格子問題に基づくSigncryptionのスタンダードモデルでの構成2016

    • Author(s)
      佐藤慎悟
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] 情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法2016

    • Author(s)
      吉澤貴博
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] スタンダードモデルにおけるID ベース階層型鍵隔離暗号の構成法2016

    • Author(s)
      渡邉洋平
    • Organizer
      2016年暗号と情報セキュリティシンポジウム (SCIS 2016)
    • Place of Presentation
      熊本, 日本
    • Year and Date
      2016-01-19
    • Related Report
      2015 Research-status Report
  • [Presentation] Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage2015

    • Author(s)
      Y. Watanabe
    • Organizer
      The 9th International Conference Provable Security (ProvSec 2015)
    • Place of Presentation
      Kanazawa, Japan
    • Year and Date
      2015-11-24
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] 情報理論的に安全な検索可能暗号2015

    • Author(s)
      吉澤貴博
    • Organizer
      2015年コンピュータセキュリティシンポジウム (CSS 2015)
    • Place of Presentation
      長崎, 日本
    • Year and Date
      2015-10-21
    • Related Report
      2015 Research-status Report
  • [Presentation] 暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法2015

    • Author(s)
      渡邉洋平
    • Organizer
      2015年コンピュータセキュリティシンポジウム (CSS 2015)
    • Place of Presentation
      長崎, 日本
    • Year and Date
      2015-10-21
    • Related Report
      2015 Research-status Report
  • [Presentation] Constructions of CCA-secure Revocable Identity-based Encryption2015

    • Author(s)
      Y. Ishida
    • Organizer
      The 20th Australasian Conference on Information Security and Privacy (ACISP 2015)
    • Place of Presentation
      Brisbane, Australia
    • Year and Date
      2015-06-29
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] Constructions of Symmetric-key Encryption with Guessing Secrecy2015

    • Author(s)
      J. Shikata
    • Organizer
      2015 IEEE International Symposium on Information Theory (ISIT2015)
    • Place of Presentation
      Hong Kong, China
    • Year and Date
      2015-06-14
    • Related Report
      2015 Research-status Report
    • Int'l Joint Research
  • [Presentation] 推測確率に基づいた安全性基準をみたす暗号化方式の構成法2015

    • Author(s)
      四方順司
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 推測成功確率に基づいた安全性基準をみたす秘密分散法2015

    • Author(s)
      岩本貢
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 暗号文の耐改変性と復号権限の変更機能をもつ情報理論的に安全な放送型暗号2015

    • Author(s)
      渡邉洋平
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] Canetti-Halevi-Katz変換による代理人再暗号化方式の一般的構成法2015

    • Author(s)
      清藤武暢
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] CCA安全かつ暗号文長が短い鍵失効機能付きIDベース暗号の構成法2015

    • Author(s)
      石田優
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] 情報理論的に安全な順序検証型多重認証方式2015

    • Author(s)
      富田信一朗
    • Organizer
      2015年暗号と情報セキュリティシンポジウム(SCIS2015)
    • Place of Presentation
      小倉, 日本
    • Year and Date
      2015-01-20 – 2015-01-23
    • Related Report
      2014 Research-status Report
  • [Presentation] Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys2014

    • Author(s)
      Junji Shikata
    • Organizer
      Josai University, Annual Workshop on Statistical Science and Related Topics
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2014-12-07
    • Related Report
      2014 Research-status Report
    • Invited
  • [Presentation] 選択暗号文攻撃に対して安全な鍵失効機能付きIDベース暗号2014

    • Author(s)
      石田優
    • Organizer
      コンピュータセキュリティシンポジウム(CSS2014)
    • Place of Presentation
      札幌, 日本
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] 受信者集合を変更可能な情報理論的安全性に基づく放送型暗号2014

    • Author(s)
      渡邉洋平
    • Organizer
      コンピュータセキュリティシンポジウム(CSS2014)
    • Place of Presentation
      札幌, 日本
    • Year and Date
      2014-10-22 – 2014-10-24
    • Related Report
      2014 Research-status Report
  • [Presentation] Timed-Release Secret Sharing Schemes with Information-Theoretic Security2014

    • Author(s)
      Yohei Watanabe
    • Organizer
      BalkanCryptSec2014
    • Place of Presentation
      Istanbul, Turkey
    • Year and Date
      2014-10-16 – 2014-10-17
    • Related Report
      2014 Research-status Report
  • [Presentation] Timed-Release Computational Secret Sharing Scheme and Its Applications2014

    • Author(s)
      Yohei Watanabe
    • Organizer
      The 8th International Conference on Provable Security (ProvSec2014)
    • Place of Presentation
      Hong Kong, China
    • Year and Date
      2014-10-09 – 2014-10-10
    • Related Report
      2014 Research-status Report
  • [Presentation] Secret Sharing Schemes Based on Min-Entropies2014

    • Author(s)
      Mitsugu Iwamoto
    • Organizer
      IEEE International Symposium on Information Theory (ISIT2014)
    • Place of Presentation
      Honolulu, Hawai, USA
    • Year and Date
      2014-06-29 – 2014-07-04
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2023-03-16  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi