Publications

International Conference Proceedings
  1. Genki Osada, Tsubasa Takahashi, and Takashi Nishide, Understanding Likelihood of Normalizing Flow and Image Complexity through the Lens of Out-of-Distribution Detection, Annual AAAI Conference on Artificial Intelligence, Special Track on Safe, Robust and Responsible AI, pp.21492--21500, 2024.
  2. Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, and Takashi Nishide, GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation, Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), pp.1--9, ACM, 2023.
  3. Genki Osada, Tsubasa Takahashi, Budrul Ahsan, and Takashi Nishide, Out-of-Distribution Detection with Reconstruction Error and Typicality-based Penalty, IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), pp.5540--5552, IEEE, 2023.
  4. Daisuke Maeda, Koki Morimura, and Takashi Nishide, Efficient Homomorphic Evaluation of Arbitrary Bivariate Integer Functions, Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), pp.13--22, ACM, 2022.
  5. Zhongqi Wang, Keita Fuse, and Takashi Nishide, Square Table Lookup Multiparty Computation Protocol, International Symposium on Computing and Networking Workshops (CANDARW), pp.392--395, IEEE, 2022.
  6. Koki Morimura, Daisuke Maeda, and Takashi Nishide, Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation, International Conference on Availability, Reliability and Security (ARES), No. 33, pp.1--10, ACM, 2022.
  7. Seiya Nuta, Jacob C.N. Schuldt, and Takashi Nishide, Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain, Indocrypt, LNCS 13143, pp.436--461, Springer-Verlag, 2021.
  8. Hikaru Tsuchida, and Takashi Nishide, Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC, ACISP, LNCS 13083, pp.309--329, Springer-Verlag, 2021.
  9. Takashi Nishide, One-Time Delegation of Unlinkable Signing Rights and Its Application, ProvSec, LNCS 12505, pp.103--123, Springer-Verlag, 2020.
  10. Hikaru Tsuchida, Takashi Nishide, and Yusaku Maeda, Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring, ProvSec, LNCS 12505, pp.298--317, Springer-Verlag, 2020.
  11. Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide, Regularization with Latent Space Virtual Adversarial Training, ECCV, LNCS 12346, pp.565--581, Springer-Verlag, 2020.
  12. Hikaru Tsuchida, and Takashi Nishide, Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery, International Symposium on Information Theory and its Application (ISITA), pp.387--391, IEEE, 2020.
  13. Naoya Okanami, Ryuya Nakamura, and Takashi Nishide, Load Balancing in Sharded Blockchains, Workshop on Trusted Smart Contracts (in Financial Cryptography), LNCS 12063, pp.512--524, Springer-Verlag, 2020.
  14. Noboru Kunihiro, Wen-jie Lu, Takashi Nishide, and Jun Sakuma, Outsourced Private Function Evaluation with Privacy Policy Enforcement, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.412--423, 2018.
  15. Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide, Identity-Based Key-Insulated Aggregate Signatures, Revisited, Inscrypt, LNCS 10726, pp.141--156, Springer-Verlag, 2017.
  16. Genki Osada, Kazumasa Omote, and Takashi Nishide, Network Intrusion Detection based on Semi-Supervised Variational Auto-Encoder, ESORICS, LNCS 10493, pp.344--361, Springer-Verlag, 2017.
  17. Kouichi Sakurai, Takashi Nishide, and Syalim Amril, Improved proxy re-encryption scheme for symmetric key cryptography, International Workshop on Big Data and Information Security (IWBIS), pp.105--111, IEEE, 2017.
  18. Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide and Eiji Okamoto, One-time Programs with Cloud Storage and Its Application to Electronic Money, ACM International Workshop on ASIA Public-Key Cryptography (APKC), pp.25--30, ACM, 2017.
  19. Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, and Kwangjo Kim, Revocable Decentralized Multi-Authority Functional Encryption, Indocrypt, LNCS 10095, pp.248--265, Springer-Verlag, 2016.
  20. Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Size-Hiding Computation for Multiple Parties, Asiacrypt, LNCS 10032, pp.248--265, Springer-Verlag, 2016.
  21. Fangming Zhao and Takashi Nishide, Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards, International Conference on Network and System Security (NSS), LNCS 9955, pp.266--282, Springer-Verlag, 2016.
  22. Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Committed AND Protocol Using Three Cards with More Handy Shuffle, International Symposium on Information Theory and its Application (ISITA), pp.700--702, IEEE, 2016.
  23. Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, and Eiji Okamoto, Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs, 7th International Conference on Trustworthy Systems (Intrust), LNCS 9565, pp.32--48, Springer-Verlag, 2016.
  24. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, 9th International Conference on Provable Security (ProvSec), LNCS 9451, pp.127--146, Springer-Veralag, 2015.
  25. Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Implementation of a Pairing Function for Public Key Cryptosystems, 5th International Conference on IT Convergence and Security (ICITCS’15), pp.1--5, IEEE, 2015.
  26. Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability, 5th International Conference on IT Convergence and Security (ICITCS’15), pp.1--4, IEEE, 2015.
  27. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, 10th International Workshop on Security (IWSEC), LNCS 9241, pp.281--297, Springer-Veralag, 2015.
  28. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack, International Conference on Security and Cryptography (SECRYPT), pp.39--52, SciTePress, 2015, DOI:10.5220/0005539300390052.
    (there was a flaw in the protocol, and it was fixed in the journal version)
  29. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Constructions of Fail-Stop Signatures for Multi-signer Setting, 10th Asia Joint Conference on Information Security (AsiaJCIS), pp.112--123, IEEE, 2015, DOI:10.1109/AsiaJCIS.2015.26.
  30. Takashi Nishide, Mitsugu Iwamoto,Atsushi Iwasaki,and Kazuo Ohta, Secure (M+1)st-Price Auction with Automatic Tie-Break, 6th International Conference on Trustworthy Systems (Intrust) 2014, LNCS 9473, pp.422--437, Springer-Veralag, 2015.
  31. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai, A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.565--574, 2014, DOI:10.1109/TrustCom.2014.72.
  32. Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, A Short Fail-Stop Signature Scheme from Factoring, Provable Security (ProvSec), LNCS 8782, pp.309--316, Springer-Veralag, 2014(short paper).
  33. Motoki Kitahara, Takanori Yasuda, Takashi Nishide, and Kouichi Sakurai, Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus, ACM Asia Public-Key Cryptography (AsiaPKC), pp.33--38, 2013 (short paper).
  34. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Supporting Secure Provenance Update by Keeping Provenance of the Provenance, Information and Communicatiaon Technology - International Conference (ICT-EurAsia), LNCS 7804, pp.363--372, Springer-Verlag, 2013.
  35. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Weakness of Provably Secure Searchable Encryption Against Frequency Analysis, 5th Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA), ISSN: 2227-331X, pp.142--147, 2012.
  36. Fangming Zhao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Analysis of Methods for Detecting Compromised Nodes and Its Countermeasures, International Conference on IT Convergence and Security (ICITCS'12), LNEE 215, pp.53--60, Springer-Verlag, 2013.
  37. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Secure Keyword Search Using Bloom Filter with Specified Character Positions, 6th International Conference on Provable Security (ProvSec), LNCS 7496, pp.235--252, Springer-Verlag, 2012.
  38. Motoki Kitahara, Takashi Nishide, and Kouichi Sakurai, A Method for Embedding Secret Key Information in RSA Public Key and Its Application, 6th International Workshop on Advances in Information Security (WAIS), pp.665--670, 2012, doi.ieeecomputersociety.org/10.1109/IMIS.2012.123.
  39. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs, 6th International Workshop on Advances in Information Security (WAIS), pp.660--664, 2012, doi.ieeecomputersociety.org/10.1109/IMIS.2012.139.
  40. Liang Zhao, Takashi Nishide, and Kouichi Sakurai, Differential Fault Analysis of Full LBlock, 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'12), LNCS 7275, pp.135--150, 2012.
  41. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control, 14th Annual International Conference on Information Security and Cryptology (ICISC'11), LNCS 7259, pp.406--418, Springer-Verlag, 2012.
  42. Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai, Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model, 7th International Conference on Information Security and Cryptology (Inscrypt'11), LNCS 7537, pp.341--362, Springer-Verlag, 2012.
  43. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, and Hiroshi Yoshiura, Batching Multiple Protocols to Improve Efficiency of Multi-party Computation, 7th International Conference on Information Security and Cryptology (Inscrypt'11), LNCS 7537, pp.289--308, Springer-Verlag, 2012.
  44. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Fast Implementation and Experimentation of Multivariate Cryptosystems on GPU, 6th Joint Workshop on Information Security (JWIS), 2011.
  45. Yoshiaki Hori, Takashi Nishide, and Kouichi Sakurai, Towards Countermeasure Against Insider Threat on Network Security, 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.634--636, 2011.
  46. Takashi Nishide, and Kouichi Sakurai, Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited, 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.656--661, 2011.
  47. Ruan Na, Takashi Nishide, and Yoshiaki Hori, ElGamal-based Key Management scheme for distributed RSUs in VANET, IEEE International Conference on Selected Topics in Mobile & Wireless Networking (iCOST), pp.128--133, 2011.
  48. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Realizing Proxy Re-encryption in the Symmetric World, The International Conference on Informatics Engineering & Information Science (ICIEIS), CCIS 251, pp.259--274, Springer-Verlag, 2011.
  49. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura, Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols, 12th International Workshop on Information Security Applications (WISA'11), LNCS 7115, pp.187--202, Springer-Verlag, 2011.
  50. Takashi Nishide, Shinichi Yoshinaga, Rishiraj Bhattacharyya, Mridul Nandi, Bimal Roy, and Kouichi Sakurai, New Multiple Encryption for Making Double Encryption Secure against Meet-in-the-Middle and Related-Key Attacks, 12th International Workshop on Information Security Applications (WISA'11), 2011(short paper)pdf.
  51. Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi, Anonymous Encryption with Partial-Order Subset Delegation Functionality, International Conference on Provable Security (ProvSec), LNCS 6980, pp.154--169, Springer-Verlag, 2011.
  52. Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, and Kyung Hyune Rhee, Securing Location-Aware Services Based on Online/Offline Signatures in VANETs, International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11), LNCS 6908, pp.271--285, Springer-Verlag, 2011.
  53. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems, 7th Information Security Practice and Experience Conference (ISPEC), LNCS 6672, pp.83--97, Springer-Verlag, 2011.
  54. Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Design and Implementation of a Forced Encryption Kernel Module, 5th International Workshop on Advances in Information Security (WAIS), pp.663--667, 2011, doi:10.1109/IMIS.2011.68.
  55. Peng Gao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Integrity for the In-flight Web Page Based on A Fragile Watermarking Chain Scheme, 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC), 2011, doi:10.1145/1968613.1968715.
  56. Takashi Nishide and Kouichi Sakurai, Distributed Paillier Cryptosystem without Trusted Dealer, 11th International Workshop on Information Security Applications (WISA2010), LNCS 6513, pp.44--60, 2011.
  57. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Adaptive and Composable Non-committing Encryptions, 15th Australasian Conference on Information Security and Privacy (ACISP), LNCS 6168, pp.135--144, 2010.
  58. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Adaptive and Composable Non-interactive String-Commitment Protocols,, International Conference on Security and Cryptography (SECRYPT), pp.354--361, SciTePress, 2010.
  59. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries, International Conference on Security and Cryptography (SECRYPT), pp.389--398, SciTePress, 2010.
  60. Jingyu Hua, Takashi Nishide, and Kouichi Sakurai, Model-Based Intrusion Detection by Abstract Interpretation, 10th IEEE/IPSJ Annual International Symposium on Applications and the Internet, Workshop on Convergence Security and Privacy (SAINT/CSnP), pp.359--362, 2010.
  61. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, 24th IFIP WG11.3 Working Conference, Data and Applications Security and Privacy (DBSec), LNCS 6166, pp.311--318, 2010.
  62. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, Proc. 6th International Conference on Applied Cryptography and Network Security (ACNS), LNCS 5037, pp.111--129, 2008.
  63. Takashi Nishide, Kazuo Ohta, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol, Proc. 10th International Conference on Theory and Practice of Public-Key Cryptography (PKC), LNCS 4450, pp.343--360, 2007.
Journals
  1. Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, and Takashi Nishide, Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E107--A, No. 3, pp.234--247, 2024.
  2. Koki Morimura, Daisuke Maeda, and Takashi Nishide, Accelerating Polynomial Evaluation for Integer-wise Homomorphic Comparison and Division, Journal of Information Processing, Information Processing Society of Japan, Vol.31, pp.288--298, 2023.
  3. Seiya Nuta, Jacob C.N. Schuldt, and Takashi Nishide, PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E106--A, No. 3, pp.212--227, 2023.
  4. Hikaru Tsuchida, and Takashi Nishide, Constant-Round Fair SS-4PC for Private Decision Tree Evaluation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E105--A, No. 9, pp.1270--1288, 2022.
  5. Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide, Latent Space Virtual Adversarial Training for Supervised and Semi-supervised Learning, IEICE Transactions on Information and Systems, Vol. E105--D, No. 3, pp.667--678, 2022.
  6. Naoya Okanami, Ryuya Nakamura, and Takashi Nishide, Load Balancing with In-protocol/Wallet-level Account Assignment in Sharded Blockchains, IEICE Transactions on Information and Systems, Vol. E105--D, No. 2, pp.205--214, 2022.
  7. Hikaru Tsuchida, Takashi Nishide, and Yusaku Maeda, Private Decision Tree Evaluation with Constant Rounds via (only) SS-3PC over Ring and Field, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E105--A, No. 3, pp.214--230, 2022.
  8. Hikaru Tsuchida, and Takashi Nishide, Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model, Journal of Information Processing, Information Processing Society of Japan, Vol.29, pp.515--524, 2021.
  9. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, Provably Secure Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100--A, No. 12, pp.2991--3006, 2017.
  10. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai, A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures, International Journal of Applied Cryptography, Vol. 3, No. 4, pp.394--406, 2017.
  11. Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Card-Based Protocols Using Regular Polygon Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100-A, No. 9, pp.1900--1909, 2017.
  12. Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.5, pp.764--771, 2016.
  13. Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Computation Protocols Using Polarizing Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E99-A, No. 6, pp.1122--1131, 2016.
  14. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.2, pp.275--291, March, 2016.
  15. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Character-based Symmetric Searchable Encryption and Its Implementation and Experiment on Mobile Devices, Wiley Security and Communication Networks, vol. 9(12), pp.1717--1725, DOI:10.1002/sec.876, 2016.
  16. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search, IEICE Transactions on Information and Systems, Vol.E97-D, No.7, pp.1790--1803, 2014.
  17. Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi, Anonymous Encryption with Partial-order Subset Delegation and Its Application in Privacy Email Systems, IET Information Security, Vol. 8, No. 4, pp.240--249, Jul. 2014.
  18. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Efficient Implementation for QUAD Stream Cipher with GPUs, Computer Science and Information Systems Journal (ComSIS), Vol.10(2), pp.897--911, 2013.
  19. Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, and Hiroshi Yoshiura, Batch Logical Protocols for Efficient Multi-party Computation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No.10, pp.1718--1728, Oct., 2012.
  20. Ruan Na, Takashi Nishide, and Yoshiaki Hori, Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs, Journal of Information Processing, Information Processing Society of Japan, Vol.20, No.4, pp.846--853, 2012.
  21. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura, Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation, Journal of Information Processing, Information Processing Society of Japan, Vol.20, No.4, pp.861--870, 2012.
  22. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Securing Provenance of Distributed Processes in an Untrusted Environment, IEICE Transactions on Information and Systems, Vol.E95-D, No.7, pp.1894--1907, 2012.
  23. Takashi Nishide, Shingo Miyazaki, and Kouichi Sakurai, Security Analysis of Offline E-Cash Systems with Malicious Insider, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), Vol. 3, No. 1/2, pp.55--71, 2012.
  24. Masanori Shimura, Kunihiko Miyazaki, Takashi Nishide, and Hiroshi Yoshiura, Relational Algebra in Multi-party Protocol to Enable Structural Operation in Secret Shared Databases, Journal of Information Processing, Information Processing Society of Japan, Vol.51, No.9, pp.1563--1578, 2010 (in Japanese).
    (IPSJ Best Paper Award 2010).
  25. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden ciphertext policies, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.92-A, No.1, pp.22--32, 2009.
  26. Takashi Nishide, Kazuo Ohta, Constant-round multiparty computation for interval test, equality test, and comparison, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.90-A, No.5, pp.960--968, 2007.