暗号・情報セキュリティ研究室

Lab. of Cryptography and Information Security

論文誌

・ 田中和磨, 矢内直人, 岡田雅之, 西出隆志, 岡本栄司, APAT: BGPSEC におけるアグリゲート署名の導入, 情報処理学会論文誌, Vol.58, No.2, pp.544–556, 2月, 2017.
・ Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.5, pp.764–771, 2016.
・ Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Computation Protocols Using Polarizing Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E99-A, No. 6, pp.1122–1131, 2016.
・ Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions, Transactions of Information Processing Society of Japan (IPSJ), 2016 (to appear).
・Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Character-based Symmetric Searchable Encryption and Its Implementation and Experiment on Mobile Devices, Wiley Security and Communication Networks, vol. 9(12), pp.1717–1725, DOI:10.1002/sec.876, 2016.
・ Masayuki Okada, Nasato Goto, Akira Kanaoka and Eiji Okamoto, “Transparent Probabilistic Packet Marking”, Journal of Information Processing, Vol.22, No.4, pp.609-616, 2014.
・ Ichita Higurashi, Akira Kanaoka, Masahiko Kato, Eiji Okamoto, “Detection of Unexpected Services and Communication Paths in Networked Systems”, Journal of Information Processing, Vol. 21, No. 4, pp. 632-639, 2013.
・ Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto, “A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adversaries”, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications, Vol. 3, No. 1-2, pp. 30-54, 2012.
・ N. Ogura, S. Uchiyama, N. Kanayama and E. Okamoto, A note on the pairing computation using normalized Miller functions, to appear in IEICE Trans. on Fundamentals, Vol.E95-A, No.1, Jan. 2012.
・ 岡田雅之, 金岡晃, 勝野恭治, 岡本栄司, 確率的パケットマーキングにおける最適マーキング確率の推定, 情報処理学会論文誌 Vol. 52, No. 9, pp.2718–2728, 2011.
・ 原田敏樹, 金岡晃, 加藤雅彦, 勝野恭治, 岡本栄司, ネットワークシステムにおける脆弱性影響の測定手法とシステム実装, 情報処理学会論文誌 Vol. 52 No. 9 pp. 2613–2623, 2011.
・J.-L. Beuchat, E. Okamoto, and T. Yamazaki. A Low-Area Unified Hardware Architecture for the AES and the Cryptographic Hash Function ECHO. Journal of Cryptographic Engineering, 1(2):101-121, 2011.
・ N. Kanayama and E. Okamoto, Approach to pairing inversions without solving Miller inversion, to appear in IEEE Transaction on Information Theory.
・ N. Yanai, E. Chida, and M. Mambo, A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism, to appear in IEICE Trans. on Fundamentals, Vol.94-A, No.6, pp.1346-1355, 2011.
・ N. Kanayama, T. Teruya and E. Okamoto, Scalar Multiplication on Pairing Friendly Elliptic Curves, to appear in IEICE Trans. on Fundamentals, Vol.E94-A, No.6, pp. 1285–1292, Jun. 2011.
・ 金岡晃, 岡田雅之, 勝野恭治, 岡本栄司, DoS攻撃経路を効率的に再構築するためのトポロジ特性を利用した確率的パケットマーキング手法, 情報処理学会論文誌 Vol. 52, No.3, 2011.
・ J.-L. Beuchat, J. Detrey, N. Estibals, E. Okamoto, and F. Rodriguez-Henriquez. Fast Architectures for the ηT Pairing over Small-Characteristic Supersingular Elliptic Curves. IEEE Transactions on Computers, Special Section on Computer Arithmetic, 60(2):266-281, 2011.
・ 金岡晃, 島岡政基, 岡本栄司, IDベース暗号の信頼構築フレームワーク, 情報処理学会論文誌 Vol. 51, No. 9, pp. 1692-1701, 2010.
・ 金岡晃, 原田敏樹, 加藤雅彦, 勝野恭治, 岡本栄司, 安全なネットワークシステム設計のためのマルチレイヤネットワークモデルの提案と応用, 情報処理学会論文誌 Vol. 51, No. 9, pp. 1726-1735, 2010.
・ 金岡晃, 勝野恭治, 岡本栄司, メーリングリストを考慮したマスメール型ワームの感染数理モデル, 情報処理学会論文誌, Vol. 51, No. 3, pp. 682-690, 2010.
・ J.-L. Beuchat, H. Doi, K. Fujita, A. Inomata, P. Ith, A. Kanaoka, M. Katouno, M. Mambo, E. Okamoto, T. Okamoto, T. Shiga, M. Shirase, R. Soga, T. Takagi, A. Vithanage, and H. Yamamoto. FPGA and ASIC Implementations of the ηT Pairing in Characteristic Three. Computers and Electrical Engineering, 36(1):73-87, 2010
・ A. Romanov, H. Tsubaki and E. Okamoto, An Approach to Perform Quantitative Information Security Risk Assessment in IT Landscapes, Journal of Information Processing (IPSJ), Volume 18, September, 2010.
・ A. Romanov and E. Okamoto, Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study, IEICE TRANSACTIONS on Communications, Volume E93-B No.6, pp.1411-1421, 2010.
・ S. Kramer and J. C. Bradfield, A general definition of malware. Journal in Computer Virology, 2009.
・ S. MATSUDA, N. KANAYAMA, F. HESS, and E. Okamoto, Optimised versions of the ate and twisted ate pairings,IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No. 7, pp. 1660-1667, 2009.
・ J.-L. Beuchat, N. Brisebarre, J. Detrey, E. Okamoto, M. Shirase, and T. Takagi, Algorithms and arithmetic operators for computing the ηt pairing in characteristic three. IEEE Transactions on Computers, Vol. 57, No.11, pp. 1454-1468, November 2008.
・ J.-L. Beuchat, T. Miyoshi, J.-M. Muller, and E. Okamoto, Horner’s rule-based multiplication over gf(p) and gf(pn): A survey. International Journal of Electronics, Vol. 95, No. 7, pp. 669-684, July 2008.
・ J.-L. Beuchat and J.-M. Muller, Automatic generation of modular multipliers for fpga applications. IEEE Transactions on Computers, Vol. 57, No. 12, pp. 1600-1613, December 2008.
・ B. antoso, N. Kunihiro, N. Kanayama, and K. Ohta, Factoring square-free composite integer by solving multivariate integer polynomial equations. IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 1, pp. 306-315, 2008.
・ 高木剛, 岡本栄司, Javaを利用した携帯電話上でのtateペアリングの高速実装, 情報処理学会論文誌, January 2008.
・ N. Kanayama and S. Uchiyama, The vanstone-zuccherato schemes revisited. IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No. 12, pp. 2903-2907, May 2007.
・ M. Shirase, T. Takagi, and E. Okamoto, Some efficient algorithms for the final exponentiation of ηt pairing. IEICE Fundamental Journal, 2007.
・ X. Yi and E. Okamoto, Directed transitive signature scheme. IEEE Trans. on IT, 2007.
・ 大山義仁, 岡本栄司, 暗号危殆化に対する暗号slaの提案と支援ツールの実現. 情報処理学会論文誌, Vol. 48, No. 1, pp. 178-188, 2007.
・ L. Wang, E. Okamoto, Y. Miao, T. Okamoto, and H. Doi, An id-sp-m4m scheme and its security analysis. IEICE Trans. Fundamentals, Vol. E90, No. 1, pp. 91-100, 2007.
・ R. Tso, Y. Miao, and E.Okamoto, On algorithms for searching a consistent set of shares in a threshold scheme and the related covering problem. Journal of Combinatorial Mathematics and Combinatorial Computing, Vol. 60, pp. 47-63, 2007.
・ 金沢史明, 岡本健, 猪俣敦夫, 岡本栄司,送信者に認証機能を付加したブロードキャスト暗号とその応用.情報処理学会論文誌, Vol. 47, No. 11, pp. 2992-3004, 2006.
・ I. Agudo, J. Lopez, J. A. Montenegro, E. Okamoto, and E. Dawson. Delegation perspective of practical authorization schemes. Computer Standard and Interface Journal, 2004.
・ L. Wang, Z. Cao, T. Okamoto, and E. Okamoto, Authorization-limited tfp systems and security analysis. IEICE Trans. Fundamentals, Vol. E89-A, No. 1, pp. 106-114, 2006.
・ S.M.M. Rahman, A. Inomata, M. Mambo, and E. Okamoto. Anonymous on-demand position-based routing in mobile ad-hoc networks. IPSJ Journal, Vol. 47, No. 8, pp. 2396-2408, 2006.

・ R. Tso, Y. Miao, T. Okamoto, and E. Okamoto, How to verify the threshold t of shamir’s (t,n)-threshold scheme. IPSJ Journal, Vol. 46, No. 8, pp. 1824-1833, 2005.
・ R. Tso, Y. Miao, T. Okamoto, and E. Okamoto, A share-correctable protocol for the shamir threshold scheme and its application to participant enrollment. IPSJ Journal, Vol. 46, No. 8, pp. 1880-1888, 2005.
・ G. Ge, Y. Miao, and L. Wang, Combinatorial constructions for optimal splitting authentication codes. SIAM Journal on Discrete Mathematics, Vol. 18, No. 4, pp. 663-678, 2005.
・ J. Lopez, J.A. Montenegro, J.L. Vivas, E. Okamoto, and E. Dawson, Specification and design of advanced authentication and authorization services. Computer Standard and Interface Journal, Vol. 27, pp. 467-478, 2005.
・ R. Tso, Y. Miao, and E. Okamoto, On algorithms for searching a consistent set of shares in a threshold, scheme and the related covering problem. Journal of Combinatorial Mathematics and Combinatorial Computing, 2004.
・ J. Peng, E. Okamoto, X.-F. Liao, and Y.-G. Liu, Research on a chaos based block encryption cipher. Submitted to Chinese Journal of Computers, 2004.
・ X. Yi, C.-H. Tan, and E. Okamoto, Security of kuwakado-tanaka transitive signature scheme for directed trees. IEICE Trans. Fundamentals, Vol. E87-A, No. 4, pp. 955-957, 2004.
・ T. Okamoto, H. Katsuno, and E. Okamoto, A fast signature scheme with new on-line computation. IEICE Trans. Fundamentals, Vol. E87-A, No. 5, pp. 1154-1161, 2004.
・ M. Soshi, M. Maekawa, and E. Okamoto, The dynamic-typed access matrix model and decidability of the safety problem. IEICE Trans. Fundamentals, Vol. E87-A, No. 1, pp. 190-203, 2004.
・ T.-B. Deng and E. Okamoto, Svd-based design of fractional-delay 2-d digital filters exploiting specification symmetries. IEEE Transactions on Circuits and Systems-I, Vol. 50, No. 8, pp. 470-480, 2003.
・ E. Dawson S. Russell, E. Okamoto and J. Lopez. Virtual certificates and synthetic certificates: New paradigms for improving public key validation. Computer Communication, Elsevier, Vol. 26, No. 16, pp. 1826-1838, 2003.
・ 金岡晃, 岡本栄司, Ietfにおける侵入検知情報交換方式の問題点と対策. 情報処理学会論文誌, Vol. 44, No. 8, pp. 1830-1837, 2003.
・ 服部進実, 岡本栄司, 完全駆除までの期限を考慮したコンピュータウイルス駆除手法. 情報処理学会論文誌, Vol. 44, No. 1, pp. 106-113, 2003.
・ T.-B. Deng, E. Saito, and E. Okamoto. Efficient design of svd-based 2d digital filters using specification symmetry and order-selecting criterion. IEEE Trans. on Circuits and Systems-I, Vol.50, No. 2, pp. 217-226, 2003.