トップページ  >  教員個別情報  >  発表論文
藤﨑 英一郎 (FUJISAKI, Eiichiro)教授, コンピューティング科学研究領域長
情報科学, コンピューティング科学研究領域

発表論文

45件
Improved lattice enumeration algorithms by primal and dual reordering methods
Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki
IET INFORMATION SECURITY, -, 2022
Improving Practical UC-Secure Commitments based on the DDH Assumption
Eiichiro Fujisaki
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E105A, 3, 182-194, 2022
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods.
Kazuki Yamamura, Yuntao Wang 0002, Eiichiro Fujisaki
ICISC, 159-174, 2021
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption.
Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
IEICE Transactions, 103-A, 1, 141-149, 2020
All-But-Many Encryption
Eiichiro Fujisaki
Journal of Cryptology, 31, 1, 226-275, 2018
A Constant-Size Signature Scheme with Tighter Reduction from CDH Assumption
Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10599, 137-154, 2017
Improving Practical UC-Secure Commitments Based on the DDH Assumption
Eiichiro Fujisaki
SECURITY AND CRYPTOGRAPHY FOR NETWORKS, SCN 2016, 9841, 257-272, 2016
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Eiichiro Fujisaki, Keita Xagawa
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 10031, 908-938, 2016
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, Kenji Yasunaga
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E98A, 3, 853-862, 2015
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
Eiichiro Fujisaki, Keita Xagawa
PROGRESS IN CRYPTOLOGY - LATINCRYPT 2015, 9230, 3-20, 2015
Non-malleable Multiple Public-Key Encryption
Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E97A, 6, 1318-1334, 2014
All-But-Many Encryption A New Framework for Fully-Equipped UC Commitments
Eiichiro Fujisaki
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT II, 8874, 426-447, 2014
Secure Integration of Asymmetric and Symmetric Encryption Schemes
Eiichiro Fujisaki, Tatsuaki Okamoto
JOURNAL OF CRYPTOLOGY, 26, 1, 80-101, 2013
A Multi-Trapdoor Commitment Scheme from the RSA Assumption
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 176-184, 2012
An Efficient Non-interactive Universally Composable String-Commitment Scheme
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 167-175, 2012
Sub-Linear Size Traceable Ring Signatures without Random Oracles
Eiichiro Fujisaki
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E95A, 1, 151-166, 2012
New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications
Eiichiro Fujisaki
TOPICS IN CRYPTOLOGY - CT-RSA 2012, 7178, 136-155, 2012
Sub-linear Size Traceable Ring Signatures without Random Oracles
Eiichiro Fujisaki
TOPICS IN CRYPTOLOGY - CT-RSA 2011, 6558, 393-415, 2011
A Multi-trapdoor Commitment Scheme from the RSA Assumption
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
INFORMATION SECURITY AND PRIVACY, 6168, 182-+, 2010
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E92A, 1, 53-66, 2009
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka
PROVABLE SECURITY, PROCEEDINGS, 5848, 118-+, 2009
Efficient Non-interactive Universally Composable String-Commitment Schemes
Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
PROVABLE SECURITY, PROCEEDINGS, 5848, 3-+, 2009
Traceable ring signature
Eiichiro Fujisaki, Koutarou Suzuki
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E91A, 1, 83-93, 2008
Security of ESIGN-PSS
Tetsutaro Kobayashi, Eiichiro Fujisaki
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E90A, 7, 1395-1405, 2007
Formal security treatments for signatures from identity-based encryption
Yang Cui, Eiichiro Fujisaki, Goichiro Hanaoka, Hideki Imai, Rui Zhang
PROVABLE SECURITY, PROCEEDINGS, 4784, 218-+, 2007
Traceable ring signature
Eiichiro Fujisaki, Koutarou Suzuki
PUBLIC KEY CRYPTOGRAPHY - PKC 2007, 4450, 181-+, 2007
Plaintext simulatability
E Fujisaki
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E89A, 1, 55-65, 2006
Forward-secure authenticated-encryption in multi-receiver setting
Kan Yasuda, Kazumaro Aoki, Eiichiro Fujisaki, Atsushi Fujioka
SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 141-+, 2006
RSA-OAEP is secure under the RSA assumption
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
Journal of Cryptology, 17, 2, 81-104, 2004
A simple approach to secretly sharing a factoring witness in a publicly-verifiable manner
E Fujisaki
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E85A, 5, 1041-1049, 2002
A statistically-hiding integer commitment scheme based on groups with hidden order
Damgard, I, E Fujisaki
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2501, 125-142, 2002
A chosen-cipher secure encryption scheme tightly as secure as factoring
E Fujisaki, T Okamoto
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E84A, 1, 179-187, 2001
RSA-OAEP Is Secure under the RSA Assumption.
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern
Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, 2139 LNCS, 260-274, 2001
How to enhance the security of public-key encryption at minimum cost
E Fujisaki, T Okamoto
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E83A, 1, 24-32, 2000
Statistical zero-knowledge protocols to prove modular polynomial relations
E Fujisaki, T Okamoto
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E82A, 1, 81-92, 1999
Provably secure public-key encryption schemes: EPOC and PSEC
Tatsuaki Okamoto, Eiichiro Fujisaki, Shigenori Uchiyama
NTT R and D, 48, 10, 740-749, 1999
How to enhance the security of public-key encryption at minimum cost
E Fujisaki, T Okamoto
PUBLIC KEY CRYPTOGRAPHY, 1560, 53-68, 1999
Secure Integration of Asymmetric and Symmetric Encryption Schemes.
Eiichiro Fujisaki, Tatsuaki Okamoto
Advances in Cryptology - CRYPTO '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, 1666, 537-554, 1999
Practical escrow cash schemes
E Fujisaki, T Okamoto
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, E81A, 1, 11-19, 1998
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
E Fujisaki, T Okamoto
ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1403, 32-46, 1998
Statistical zero knowledge protocols to prove modular polynomial relations
E Fujisaki, T Okamoto
ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1294, 16-30, 1997
Practical Escrow Cash System.
Eiichiro Fujisaki, Tatsuaki Okamoto
Security Protocols, International Workshop, Cambridge, United Kingdom, April 10-12, 1996, Proceedings, 1189, 33-48, 1996
How to Date Blind Signatures.
Masayuki Abe, Eiichiro Fujisaki
Advances in Cryptology - ASIACRYPT '96, International Conference on the Theory and Applications of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996, Proceedings, 1163, 244-251, 1996
ON COMPARISON OF PRACTICAL DIGITAL SIGNATURE SCHEMES
T OKAMOTO, E FUJISAKI
NTT REVIEW, 5, 1, 75-81, 1993
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn.
Tatsuaki Okamoto, Atsushi Fujioka, Eiichiro Fujisaki
Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, 740 LNCS, 54-65, 1992