Publications

See also:
Publication Page on Lab Website
My DBLP
My Researchmap
My CV

[Peer-Reviewed Journal Articles]

Designated Verifier Signature with Claimability
with Kyosuke Yamashita, Keisuke Hara, Naoto Yanai, and Junji Shikata
IEICE Transactions.
Preliminary version in APKC 2023.

Anonymous Broadcast Authentication with One-to-Many Transmission to Control IoT Devices
with Kazuhiko Minematsu, Naoto Yanai, and Junji Shikata
IEEE Access.
Preliminary version in AINA 2021.

Tight Lower Bounds and Optimal Constructions of Anonymous Broadcast Encryption and Authentication
with Hirokazu Kobayashi, Kazuhiko Minematsu, and Junji Shikata
Designs, Codes and Cryptography.
Preliminary version in IMACC 2021.

A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model
with Yoshiki Abe, Takeshi Nakai, Mitsugu Iwamoto, and Kazuo Ohta
IEICE Transactions.

Multi-Designated Receiver Authentication Codes: Models and Constructions
with Takenobu Seito and Junji Shikata
IEICE Transactions.
Preliminary version in CISS 2022.

How to Make a Secure Index for Searchable Symmetric Encryption, Revisited
with Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, and Kazuo Ohta
IEICE Transactions.
[eprint]

Efficient Card-based Majority Voting Protocols
with Yoshiki Abe, Takeshi Nakai, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, and Kazuo Ohta
New Generation Computing.
Preliminary version in ISITA 2018.

Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations
with Keita Emura and Shuichi Katsumata
Theoretical Computer Science.
Preliminary version in ESORICS 2019.
[eprint]

Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE
with Keita Emura and Atsushi Takayasu
Designs, Codes and Cryptography.
[ePrint]

Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption
with Keita Emura and Atsushi Takayasu
Designs, Codes and Cryptography.
[ePrint]

Efficient Revocable Identity-based Encryption with Short Public Parameters
with Keita Emura and Jae Hong Seo
Theoretical Computer Science.
Preliminary version in CT-RSA 2017.
[eprint]

Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance: Lattice-based Construction and More
with Atsushi Takayasu
Theoretical Computer Science.
Preliminary version in ACISP 2017.
[eprint]

Key-Updatable Public-Key Encryption with Keyword Search (Or: How to Realize PEKS with Efficient Key Updates for IoT Environments)
with Hiroaki Anada, Akira Kanaoka, and Natsume Matsuzaki
International Journal of Information Security.
Preliminary version in ACISP 2018.

Multi-Party Computation for Modular Exponentiation based on Replicated Secret Sharing
with Kazuma Ohara, Mitsugu Iwamoto, and Kazuo Ohta
IEICE Trans, 2019.

Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices
with Amonrat Prasitsupparote, Junichi Sakamoto, Junji Shikata, and Tsutomu Matsumoto
International Journal of Digital Information and Wireless Communications.
Preliminary version in ISDF 2018.

Identity-based Encryption with Hierarchical Key-insulation in the Standard Model
with Junji Shikata
Designs, Codes and Cryptography.
Preliminary version in PKC 2016.
[eprint]

Timed-Release Computational Secret Sharing and Threshold Encryption
with Junji Shikata
Designs, Codes and Cryptography, 2018.
Preliminary version in ProvSec 2014.

CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance
with Yuu Ishida and Junji Shikata
International Journal of Applied Cryptography, 2017.
Preliminary version in ACISP 2015.

Information-Theoretically Secure Timed-Release Secret Sharing Schemes
with Junji Shikata
Journal of Information Processing, 2016.
Preliminary version in BalkanCryptSec 2014.
[eprint]

Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Storage
with Junji Shikata
IEICE Transactions, 2016.
Preliminary version in ProvSec 2015.

[Peer-Reviewed Conference Papers]

Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners
with Shun Uchizono, Takeshi Nakai, and Mitsugu Iwamoto
In ICISC, 2023.

Single-Shuffle Card-Based Protocols with Six Cards per Gate
with Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, and Mitsugu Iwamoto
In ICISC, 2023.

Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy
with Takumi Amada and Mitsugu Iwamoto
In ICISC, 2023.

Lattice-based Multi-Entity Identification Protocols
with Toi Tomita and Junji Shikata
In MobiSec, 2023.
Received Best Paper Award.

The Two Sheriffs Problem: Cryptographic Formalization and Generalization
with Kota Sugimoto, Takeshi Nakai, and Mitsugu Iwamoto
In COCOA, 2023.

Packet Analysis and Information Theory on Attack Detection for Modbus TCP
with Tatsuya Nishiuchi, Yoshiki Abe, Mitsugu Iwamoto, and Kenji Sawada
In IECON, 2023.

IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures
with
Naoto Yanai and Junji Shikata
In ISPEC, 2023.
[eprint]

Designated Verifier Signature with Claimability
with Kyosuke Yamashita, Keisuke Hara, Naoto Yanai, and Junji Shikata
In APKC, 2023.

Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency
with Yexuan Liu and Junji Shikata
In CISS, 2023.

A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test
with Kyoichi Asano, Keita Emura, and Atsushi Takayasu
In ProvSec, 2022.
[eprint]
Received Best Paper Award.

Card-based Cryptographic Protocols for Private Set Intersection
with Anastasiia Doi, Tomoki Ono, Takeshi Nakai, Kazumasa Shinagawa, Koji Nuida, and Mitsugu Iwamoto
In ISITA, 2022.

An Improvement of Multi-Party Private Set Intersection Based on Oblivious Programmable PRFs
with Seiya Shimizu, Takeshi Nakai, and Mitsugu Iwamoto
In ISITA, 2022.

State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption
with Keita EmuraKeita Emura, Ryoma Ito, Sachiko Kanamori, and Ryo Nojima
In ICEIS, 2022.
[eprint]

Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage
with Kazuma Ohara, Mitsugu Iwamoto, and Kazuo Ohta
In ACM CODASPY, 2022.

Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security
with Takenobu Seito and Junji Shikata
In CISS, 2022.

Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication
with Hirokazu Kobayashi and Junji Shikata
In IMACC, 2021.

Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption
with Masahiro Ebina, Jumpei Mita, and Junji Shikata
In APKC, 2021.

Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices
with
Naoto Yanai and Junji Shikata
In AINA, 2021.

A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
with Tomoki Uemura, Li Yang, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, and Kazuo Ohta
In ISITA, 2020.

On the Power of Interaction in Signcryption
with Junichi Ida and Junji Shikata
In ISITA, 2020.

Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices
with Keita Emura and Shuichi Katsumata
In ESORICS, 2019.

Implementation and Analysis of Fully Homomorphic Encryption in Wearable Devices
with Amonrat Prasitsupparote and Junji Shikata
In ISDF, 2018.

Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
with Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, and Kazuo Ohta
In ISITA, 2018.
Received IEEE ITSJC Young Researcher Best Paper Award.

Key-updatable Public-key Encryption with Keyword Search: Models and Generic Constructions
with Hiroaki Anada, Akira Kanaoka, and Natsume Matsuzaki
In ACISP, 2018.

Broadcast Encryption with Guessing Secrecy
In ICITS, 2017.

Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
with Atsushi Takayasu
In ACISP, 2017.

Unconditionally Secure Searchable Encryption
with Takahiro Yoshizawa and Junji Shikata
In CISS, 2017.

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
with Keita Emura and Jae Hong Seo
In CT-RSA, 2017.

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
with Goichiro Hanaoka and Junji Shikata
In ICITS, 2016.
[eprint]

Sequential Aggregate Authentication Codes with Information Theoretic Security
with Shinichiro Tomita and Junji Shikata
In CISS, 2016.

Identity-based Hierarchical Key-insulated Encryption without Random Oracles
with Junji Shikata
In PKC, 2016.

Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage
with Junji Shikata
In ProvSec, 2015.

Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
with Keita Emura and Le Trieu Phong
In IEEE TrustCom, 2015.

Constructions of CCA-secure Revocable Identity-based Encryption
with Yuu Ishida and Junji Shikata
In ACISP, 2015.
Invited to International Journal on Applied Cryptography.

Information-Theoretically Secure Blind Authentication Codes without Verifier’s Secret Keys
with Noriyasu Takei and Junji Shikata
In Annual Workshop on Statistical Science and Related Topics, 2015.
Preliminary version in 3rd ISEEE.

Timed-Release Secret Sharing Schemes with Information Theoretic Security
with Junji Shikata
In BalkanCryptSec, 2014.

Timed-Release Computational Secret Sharing Scheme and Its Applications
with Junji Shikata
In ProvSec, 2014.

Information-Theoretically Secure Anonymous Group Authentication with Arbitration: Formal Definition and Construction
with Takenobu Seito, Kazuyuki Kinose, and Junji Shikata
In Annual Workshop on Mathematics and Computer Science, 2014.
Preliminary version in 3rd ISEEE.

Information-Theoretically Secure Entity Authentication in the Multi-user Setting
with Shogo Hajime and Junji Shikata
In ICISC, 2013.

Unconditionally Secure Blind Authentication Codes in the Manual Channel Model
with Noriyasu Takei and Junji Shikata
In 3rd ISEEE, 2013.

Unconditionally Secure Anonymous Group Authentication with an Arbiter
with Takenobu Seito, Kazuyuki Kinose, and Junji Shikata
In 3rd ISEEE, 2013.

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions
with Asato Kubai and Junji Shikata
In MoCrySEn,2013.

Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes
with Takenobu Seito and Junji Shikata
In ICITS, 2012.
[eprint]

[Manuscripts]

Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction
with Kyoichi Asano
[eprint]

Abstraction Model of Probing and DFA Attacks on Block Ciphers
with Yuiko Matsubara, Daiki Miyahara, Mitsugu Iwamoto, and Kazuo Sakiyama
[eprint]

Generic Constructions of Revocable Hierarchical Identity-based Encryption
with Keita Emura and Atsushi Takayasu
[eprint]

[Dissertation]

Cryptography with Timed Access Control
Graduate School of Environment and Information Sciences, Yokohama National University, Japan, March 2016.
Supervisor: Asso. Prof. Dr. Junji Shikata

[Non Peer-Reviewed International Posters]

How to Provide Long-term Security and Required Functionality for Cloud Storage
with Goichiro Hanaoka and Junji Shikata
In Yokohama Environment and Information Sciences (YEIS) International Forum, Yokohama, Japan, 2015.

Constructions of Strongly Secure Revocable Identity-based Encryption
with Yuu Ishida and Junji Shikata
In Yokohama Environment and Information Sciences (YEIS) International Forum, Yokohama, Japan, 2015.

How to Provide Long-term Security and Required Functionality for Cloud Storage
with Goichiro Hanaoka and Junji Shikata
In PRIVAGEN, Tokyo, Japan, 2015.

Information-Theoretically Secure Revocable-Storage Broadcast Encryption
with Junji Shikata
In IWSEC, Hirosaki, Japan, 2014.
Received Best Poster Award.

[Invited Talks]

Unconditionally Secure Revocable Storage
In IWSEC, Nara, Japan, 2015.

Timed-Release Cryptography -Two Theoretical Approaches to Achieve Security
In JSPS-DST Asian Academic Seminar, Tokyo, Japan, 2013.

[Awards and Honers]

MobiSec 2023 Best Paper Award, 2023.

ProvSec 2022 Best Paper Award, 2022.

CSS 2022 Best Paper Award, 2022.

CSS 2020 Encouragement Research Award, 2020.

CSS 2019 Encouragement Research Award, 2019.

IEEE Information Theory Society Japan Chapter Young Researcher Best Paper Award, 2018.

CSS 2018 Best Paper Award, 2018.

Invitation to 4th Heidelberg Laureate Forum, 2016.

SCIS Paper Award, 2016.

JSPS Research Fellowship for Young Scientists (PD), 2016–2019.

CSS 2014 Student Paper Award, 2014.

IWSEC 2014 Best Poster Award, 2014.

JSPS Research Fellowship for Young Scientists (DC1), 2013–2016.