Остановите войну!
for scientists:
default search action
Takeshi Koshiba
- > Home > Persons > Takeshi Koshiba
Publications
- 2024
- [j45]Masahito Hayashi, Takeshi Koshiba:
Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage. IEEE/ACM Trans. Netw. 32(1): 253-267 (2024) - 2022
- [j38]Maiki Fujita, Takeshi Koshiba, Kenji Yasunaga:
Perfectly Secure Message Transmission Against Rational Adversaries. IEEE J. Sel. Areas Inf. Theory 3(2): 390-404 (2022) - [j37]Masahito Hayashi, Takeshi Koshiba:
Quantum verifiable protocol for secure modulo zero-sum randomness. Quantum Inf. Process. 21(8): 291 (2022) - 2021
- [j34]Tushar Kanti Saha, Takeshi Koshiba:
Efficient Private Conjunctive Query Protocol Over Encrypted Data. Cryptogr. 5(1): 2 (2021) - 2020
- [j24]Tushar Kanti Saha, Deevashwer Rathee, Takeshi Koshiba:
Efficient protocols for private wildcards pattern matching. J. Inf. Secur. Appl. 55: 102609 (2020) - [c50]Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai:
Enhanced Secure Comparison Schemes Using Homomorphic Encryption. NBiS 2020: 211-224 - [i17]Maiki Fujita, Takeshi Koshiba, Kenji Yasunaga:
Perfectly Secure Message Transmission against Rational Adversaries. CoRR abs/2009.07513 (2020) - 2019
- [j21]Tushar Kanti Saha, Mayank Rathee, Takeshi Koshiba:
Efficient private database queries using ring-LWE somewhat homomorphic encryption. J. Inf. Secur. Appl. 49 (2019) - [j20]Tomoyuki Morimae, Takeshi Koshiba:
Impossibility Of Perfectly-Secure Ono-Round Delegated Quantum Computing for classical client. Quantum Inf. Comput. 19(3&4): 214-221 (2019) - [j19]Go Sato, Takeshi Koshiba, Tomoyuki Morimae:
Arbitrable blind quantum computation. Quantum Inf. Process. 18(12): 370 (2019) - [c49]Kenji Yasunaga, Takeshi Koshiba:
Perfectly Secure Message Transmission Against Independent Rational Adversaries. GameSec 2019: 563-582 - [i16]Masahito Hayashi, Takeshi Koshiba:
Verifiable Quantum Secure Modulo Summation. CoRR abs/1910.05976 (2019) - 2018
- [j17]Tushar Kanti Saha, Takeshi Koshiba:
Outsourcing private equality tests to the cloud. J. Inf. Secur. Appl. 43: 83-98 (2018) - [c47]Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba:
Perfectly Secure Message Transmission Against Rational Timid Adversaries. GameSec 2018: 127-144 - [c45]Takeshi Koshiba, Katsuyuki Takashima:
New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption. ICISC 2018: 3-19 - [c43]Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters Based on Message Authentication. ISIT 2018: 2614-2618 - [i15]Masahito Hayashi, Takeshi Koshiba:
Secure Modulo Zero-Sum Randomness as Cryptographic Resource. IACR Cryptol. ePrint Arch. 2018: 802 (2018) - 2017
- [j14]Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba:
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. J. Math. Cryptol. 11(1): 1-24 (2017) - [c39]Tushar Kanti Saha, Takeshi Koshiba:
Private Conjunctive Query over Encrypted Data. AFRICACRYPT 2017: 149-164 - [c35]Tushar Kanti Saha, Mayank, Takeshi Koshiba:
Efficient Protocols for Private Database Queries. DBSec 2017: 337-348 - [c34]Tushar Kanti Saha, Takeshi Koshiba:
Privacy-Preserving Equality Test Towards Big Data. FPS 2017: 95-110 - [c33]Tushar Kanti Saha, Mayank, Deevashwer, Takeshi Koshiba:
Private Comparison Protocol and Its Application to Range Queries. IDCS 2017: 128-141 - [c31]Tushar Kanti Saha, Takeshi Koshiba:
An Efficient Privacy-Preserving Comparison Protocol. NBiS 2017: 553-565 - [i14]Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority. CoRR abs/1701.04470 (2017) - [i11]Maiki Fujita, Takeshi Koshiba:
Perfectly Secure Message Transmission Scheme against Rational Adversaries. IACR Cryptol. ePrint Arch. 2017: 309 (2017) - [i10]Masahito Hayashi, Takeshi Koshiba:
Universal Construction of Cheater-Identifiable Secret Sharing Against Rushing Cheaters without Honest Majority. IACR Cryptol. ePrint Arch. 2017: 457 (2017) - 2016
- [c28]Tushar Kanti Saha, Takeshi Koshiba:
An Enhancement of Privacy-Preserving Wildcards Pattern Matching. FPS 2016: 145-160 - [i9]Takeshi Koshiba, Katsuyuki Takashima:
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups. IACR Cryptol. ePrint Arch. 2016: 1138 (2016) - 2015
- [j13]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
New packing method in somewhat homomorphic encryption and its applications. Secur. Commun. Networks 8(13): 2194-2213 (2015) - [c27]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. ACISP 2015: 471-487 - [c26]Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama:
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption. SCC@ASIACCS 2015: 53-61 - [c25]Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba:
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes. FPS 2015: 117-133 - 2014
- [j12]Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba:
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption. J. Math. Cryptol. 8(3): 305-329 (2014) - [c24]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. ACISP 2014: 338-353 - [i8]Ryuhei Mori, Takeshi Koshiba, Osamu Watanabe, Masaki Yamamoto:
Linear Programming Relaxations for Goldreich's Generators over Non-Binary Alphabets. CoRR abs/1406.0373 (2014) - 2013
- [c23]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics. CD-ARES Workshops 2013: 55-74 - [c22]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Secure pattern matching using somewhat homomorphic encryption. CCSW 2013: 65-76 - [c21]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Practical Packing Method in Somewhat Homomorphic Encryption. DPM/SETOP 2013: 34-50 - 2012
- [j11]Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability Between Quantum States and Its Cryptographic Application. J. Cryptol. 25(3): 528-555 (2012) - 2008
- [j10]Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba:
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions. IEEE Trans. Inf. Theory 54(6): 2566-2571 (2008) - [c16]Kaoru Kurosawa, Takeshi Koshiba:
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification. ICITS 2008: 199-209 - 2007
- [j9]Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama:
Low-density attack revisited. Des. Codes Cryptogr. 43(1): 47-59 (2007) - [i6]Kaoru Kurosawa, Takeshi Koshiba:
Direct Reduction of String (1, 2)-OT to Rabin's OT. IACR Cryptol. ePrint Arch. 2007: 46 (2007) - [i5]Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba:
How to Derive Lower Bound on Oblivious Transfer Reduction. IACR Cryptol. ePrint Arch. 2007: 65 (2007) - [i4]Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama:
Low-Density Attack Revisited. IACR Cryptol. ePrint Arch. 2007: 66 (2007) - 2006
- [j7]Akinori Kawachi, Takeshi Koshiba:
Progress in Quantum Computational Cryptography. J. Univers. Comput. Sci. 12(6): 691-709 (2006) - [i2]Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability between Quantum States and Its Cryptographic Application. IACR Cryptol. ePrint Arch. 2006: 148 (2006) - 2005
- [j6]Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Raymond H. Putra:
Universal test for quantum one-way permutations. Theor. Comput. Sci. 345(2-3): 370-385 (2005) - [c15]Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami:
Computational Indistinguishability Between Quantum States and Its Cryptographic Application. EUROCRYPT 2005: 268-284 - 2004
- [j5]Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 28-36 (2004) - [c14]Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Raymond H. Putra:
Universal Test for Quantum One-Way Permutations. MFCS 2004: 839-850 - [c13]Takeshi Koshiba, Kaoru Kurosawa:
Short Exponent Diffie-Hellman Problems. Public Key Cryptography 2004: 173-186 - 2003
- [c12]Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. ACISP 2003: 142-153 - 2002
- [c11]Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba:
Multiple Linear Cryptanalysis of a Reduced Round RC6. FSE 2002: 76-88 - [i1]Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of "Correlations in RC6". IACR Cryptol. ePrint Arch. 2002: 176 (2002) - 2000
- [j4]Takeshi Koshiba, Erkki Mäkinen, Yuji Takada:
Inferring pure context-free languages from positive data. Acta Cybern. 14(3): 469-477 (2000) - [c7]Takeshi Koshiba, Kunihiko Hiraishi:
A Note on Finding One-Variable Patterns Consistent with Examples and Counterexamples. Words, Languages & Combinatorics 2000: 253-265 - 1998
- [c5]Kazuo Misue, Kiyoshi Nitta, Kozo Sugiyama, Takeshi Koshiba, R. Inder:
Enhancing D-ABDUCTOR towards a diagrammatic user interface platform. KES (1) 1998: 359-368 - 1997
- [j2]Takeshi Koshiba, Erkki Mäkinen, Yuji Takada:
Learning Deterministic even Linear Languages From Positive Examples. Theor. Comput. Sci. 185(1): 63-79 (1997) - 1996
- [j1]Yasubumi Sakakibara, Kazuo Misue, Takeshi Koshiba:
A machine learning approach to knowledge acquisitions from text databases. Int. J. Hum. Comput. Interact. 8(3): 309-324 (1996) - 1995
- [c2]Takeshi Koshiba, Erkki Mäkinen, Yuji Takada:
Learning Strongly Deterministic Even Linear Languages from Positive Examples. ALT 1995: 41-54
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint