Publications

Journals
  1. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, Provably Secure Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100--A, No. 12, pp.2991--3006, 2017.
  2. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai, A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures, International Journal of Applied Cryptography, Vol. 3, No. 4, pp.394--406, 2017.
  3. Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Card-Based Protocols Using Regular Polygon Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100-A, No. 9, pp.1900--1909, 2017.
  4. Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.5, pp.764--771, 2016.
  5. Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Computation Protocols Using Polarizing Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E99-A, No. 6, pp.1122--1131, 2016.
  6. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.2, pp.275--291, March, 2016.
  7. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Character-based Symmetric Searchable Encryption and Its Implementation and Experiment on Mobile Devices, Wiley Security and Communication Networks, vol. 9(12), pp.1717--1725, DOI:10.1002/sec.876, 2016.
  8. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search, IEICE Transactions on Information and Systems, Vol.E97-D, No.7, pp.1790--1803, 2014.
  9. Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi, Anonymous Encryption with Partial-order Subset Delegation and Its Application in Privacy Email Systems, IET Information Security, Vol. 8, No. 4, pp.240--249, Jul. 2014.
  10. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Efficient Implementation for QUAD Stream Cipher with GPUs, Computer Science and Information Systems Journal (ComSIS), Vol.10(2), pp.897--911, 2013.
  11. Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, and Hiroshi Yoshiura, Batch Logical Protocols for Efficient Multi-party Computation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No.10, pp.1718--1728, Oct., 2012.
  12. Ruan Na, Takashi Nishide, and Yoshiaki Hori, Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs, Journal of Information Processing, Information Processing Society of Japan, Vol.20, No.4, pp.846--853, 2012.
  13. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura, Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation, Journal of Information Processing, Information Processing Society of Japan, Vol.20, No.4, pp.861--870, 2012.
  14. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Securing Provenance of Distributed Processes in an Untrusted Environment, IEICE Transactions on Information and Systems, Vol.E95-D, No.7, pp.1894--1907, 2012.
  15. Takashi Nishide, Shingo Miyazaki, and Kouichi Sakurai, Security Analysis of Offline E-Cash Systems with Malicious Insider, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), Vol. 3, No. 1/2, pp.55--71, 2012.
  16. Masanori Shimura, Kunihiko Miyazaki, Takashi Nishide, and Hiroshi Yoshiura, Relational Algebra in Multi-party Protocol to Enable Structural Operation in Secret Shared Databases, Journal of Information Processing, Information Processing Society of Japan, Vol.51, No.9, pp.1563--1578, 2010 (in Japanese).
    (IPSJ Best Paper Award 2010).
  17. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden ciphertext policies, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.92-A, No.1, pp.22--32, 2009.
  18. Takashi Nishide, Kazuo Ohta, Constant-round multiparty computation for interval test, equality test, and comparison, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.90-A, No.5, pp.960--968, 2007.
Conference Proceedings
  1. Noboru Kunihiro, Wen-jie Lu, Takashi Nishide, and Jun Sakuma, Outsourced Private Function Evaluation with Privacy Policy Enforcement, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.412--423, 2018.
  2. Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide, Identity-Based Key-Insulated Aggregate Signatures, Revisited, Inscrypt, LNCS 10726, pp.141--156, Springer-Verlag, 2017.
  3. Genki Osada, Kazumasa Omote, and Takashi Nishide, Network Intrusion Detection based on Semi-Supervised Variational Auto-Encoder, ESORICS, LNCS 10493, pp.344--361, Springer-Verlag, 2017.
  4. Kouichi Sakurai, Takashi Nishide, and Syalim Amril, Improved proxy re-encryption scheme for symmetric key cryptography, International Workshop on Big Data and Information Security (IWBIS), pp.105--111, IEEE, 2017.
  5. Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide and Eiji Okamoto, One-time Programs with Cloud Storage and Its Application to Electronic Money, ACM International Workshop on ASIA Public-Key Cryptography (APKC), pp.25--30, ACM, 2017.
  6. Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, and Kwangjo Kim, Revocable Decentralized Multi-Authority Functional Encryption, Indocrypt, LNCS 10095, pp.248--265, Springer-Verlag, 2016.
  7. Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Size-Hiding Computation for Multiple Parties, Asiacrypt, LNCS 10032, pp.248--265, Springer-Verlag, 2016.
  8. Fangming Zhao and Takashi Nishide, Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards, International Conference on Network and System Security (NSS), LNCS 9955, pp.266--282, Springer-Verlag, 2016.
  9. Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Committed AND Protocol Using Three Cards with More Handy Shuffle, International Symposium on Information Theory and its Application (ISITA), pp.700--702, IEEE, 2016.
  10. Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, and Eiji Okamoto, Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs, 7th International Conference on Trustworthy Systems (Intrust), LNCS 9565, pp.32--48, Springer-Verlag, 2016.
  11. Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, 9th International Conference on Provable Security (ProvSec), LNCS 9451, pp.127--146, Springer-Veralag, 2015.
  12. Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Implementation of a Pairing Function for Public Key Cryptosystems, 5th International Conference on IT Convergence and Security (ICITCS’15), pp.1--5, IEEE, 2015.
  13. Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability, 5th International Conference on IT Convergence and Security (ICITCS’15), pp.1--4, IEEE, 2015.
  14. Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, 10th International Workshop on Security (IWSEC), LNCS 9241, pp.281--297, Springer-Veralag, 2015.
  15. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack, International Conference on Security and Cryptography (SECRYPT), pp.39--52, SciTePress, 2015, DOI:10.5220/0005539300390052.
    (there was a flaw in the protocol, and it was fixed in the journal version)
  16. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Constructions of Fail-Stop Signatures for Multi-signer Setting, 10th Asia Joint Conference on Information Security (AsiaJCIS), pp.112--123, IEEE, 2015, DOI:10.1109/AsiaJCIS.2015.26.
  17. Takashi Nishide, Mitsugu Iwamoto,Atsushi Iwasaki,and Kazuo Ohta, Secure (M+1)st-Price Auction with Automatic Tie-Break, 6th International Conference on Trustworthy Systems (Intrust) 2014, LNCS 9473, pp.422--437, Springer-Veralag, 2015.
  18. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai, A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.565--574, 2014, DOI:10.1109/TrustCom.2014.72.
  19. Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, A Short Fail-Stop Signature Scheme from Factoring, Provable Security (ProvSec), LNCS 8782, pp.309--316, Springer-Veralag, 2014(short paper).
  20. Motoki Kitahara, Takanori Yasuda, Takashi Nishide, and Kouichi Sakurai, Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus, ACM Asia Public-Key Cryptography (AsiaPKC), pp.33--38, 2013 (short paper).
  21. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Supporting Secure Provenance Update by Keeping Provenance of the Provenance, Information and Communicatiaon Technology - International Conference (ICT-EurAsia), LNCS 7804, pp.363--372, Springer-Verlag, 2013.
  22. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Weakness of Provably Secure Searchable Encryption Against Frequency Analysis, 5th Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA), ISSN: 2227-331X, pp.142--147, 2012.
  23. Fangming Zhao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Analysis of Methods for Detecting Compromised Nodes and Its Countermeasures, International Conference on IT Convergence and Security (ICITCS'12), LNEE 215, pp.53--60, Springer-Verlag, 2013.
  24. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Secure Keyword Search Using Bloom Filter with Specified Character Positions, 6th International Conference on Provable Security (ProvSec), LNCS 7496, pp.235--252, Springer-Verlag, 2012.
  25. Motoki Kitahara, Takashi Nishide, and Kouichi Sakurai, A Method for Embedding Secret Key Information in RSA Public Key and Its Application, 6th International Workshop on Advances in Information Security (WAIS), pp.665--670, 2012, doi.ieeecomputersociety.org/10.1109/IMIS.2012.123.
  26. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs, 6th International Workshop on Advances in Information Security (WAIS), pp.660--664, 2012, doi.ieeecomputersociety.org/10.1109/IMIS.2012.139.
  27. Liang Zhao, Takashi Nishide, and Kouichi Sakurai, Differential Fault Analysis of Full LBlock, 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'12), LNCS 7275, pp.135--150, 2012.
  28. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control, 14th Annual International Conference on Information Security and Cryptology (ICISC'11), LNCS 7259, pp.406--418, Springer-Verlag, 2012.
  29. Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai, Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model, 7th International Conference on Information Security and Cryptology (Inscrypt'11), LNCS 7537, pp.341--362, Springer-Verlag, 2012.
  30. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, and Hiroshi Yoshiura, Batching Multiple Protocols to Improve Efficiency of Multi-party Computation, 7th International Conference on Information Security and Cryptology (Inscrypt'11), LNCS 7537, pp.289--308, Springer-Verlag, 2012.
  31. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Fast Implementation and Experimentation of Multivariate Cryptosystems on GPU, 6th Joint Workshop on Information Security (JWIS), 2011.
  32. Yoshiaki Hori, Takashi Nishide, and Kouichi Sakurai, Towards Countermeasure Against Insider Threat on Network Security, 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.634--636, 2011.
  33. Takashi Nishide, and Kouichi Sakurai, Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited, 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.656--661, 2011.
  34. Ruan Na, Takashi Nishide, and Yoshiaki Hori, ElGamal-based Key Management scheme for distributed RSUs in VANET, IEEE International Conference on Selected Topics in Mobile & Wireless Networking (iCOST), pp.128--133, 2011.
  35. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Realizing Proxy Re-encryption in the Symmetric World, The International Conference on Informatics Engineering & Information Science (ICIEIS), CCIS 251, pp.259--274, Springer-Verlag, 2011.
  36. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura, Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols, 12th International Workshop on Information Security Applications (WISA'11), LNCS 7115, pp.187--202, Springer-Verlag, 2011.
  37. Takashi Nishide, Shinichi Yoshinaga, Rishiraj Bhattacharyya, Mridul Nandi, Bimal Roy, and Kouichi Sakurai, New Multiple Encryption for Making Double Encryption Secure against Meet-in-the-Middle and Related-Key Attacks, 12th International Workshop on Information Security Applications (WISA'11), 2011(short paper)pdf.
  38. Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi, Anonymous Encryption with Partial-Order Subset Delegation Functionality, International Conference on Provable Security (ProvSec), LNCS 6980, pp.154--169, Springer-Verlag, 2011.
  39. Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, and Kyung Hyune Rhee, Securing Location-Aware Services Based on Online/Offline Signatures in VANETs, International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11), LNCS 6908, pp.271--285, Springer-Verlag, 2011.
  40. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems, 7th Information Security Practice and Experience Conference (ISPEC), LNCS 6672, pp.83--97, Springer-Verlag, 2011.
  41. Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Design and Implementation of a Forced Encryption Kernel Module, 5th International Workshop on Advances in Information Security (WAIS), pp.663--667, 2011, doi:10.1109/IMIS.2011.68.
  42. Peng Gao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Integrity for the In-flight Web Page Based on A Fragile Watermarking Chain Scheme, 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC), 2011, doi:10.1145/1968613.1968715.
  43. Takashi Nishide and Kouichi Sakurai, Distributed Paillier Cryptosystem without Trusted Dealer, 11th International Workshop on Information Security Applications (WISA2010), LNCS 6513, pp.44--60, 2011.
  44. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Adaptive and Composable Non-committing Encryptions, 15th Australasian Conference on Information Security and Privacy (ACISP), LNCS 6168, pp.135--144, 2010.
  45. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Adaptive and Composable Non-interactive String-Commitment Protocols,, International Conference on Security and Cryptography (SECRYPT), pp.354--361, SciTePress, 2010.
  46. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries, International Conference on Security and Cryptography (SECRYPT), pp.389--398, SciTePress, 2010.
  47. Jingyu Hua, Takashi Nishide, and Kouichi Sakurai, Model-Based Intrusion Detection by Abstract Interpretation, 10th IEEE/IPSJ Annual International Symposium on Applications and the Internet, Workshop on Convergence Security and Privacy (SAINT/CSnP), pp.359--362, 2010.
  48. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, 24th IFIP WG11.3 Working Conference, Data and Applications Security and Privacy (DBSec), LNCS 6166, pp.311--318, 2010.
  49. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, Proc. 6th International Conference on Applied Cryptography and Network Security (ACNS), LNCS 5037, pp.111--129, 2008.
  50. Takashi Nishide, Kazuo Ohta, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol, Proc. 10th International Conference on Theory and Practice of Public-Key Cryptography (PKC), LNCS 4450, pp.343--360, 2007.