default search action
Kaoru Kurosawa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c134]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search. EUROCRYPT (5) 2024: 92-121 - [i53]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search. IACR Cryptol. ePrint Arch. 2024: 375 (2024) - 2023
- [i52]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
New Generic Constructions of Error-Correcting PIR and Efficient Instantiations. IACR Cryptol. ePrint Arch. 2023: 210 (2023) - 2022
- [j80]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa:
Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 143-159 (2022) - [c133]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Multi-Server PIR with Full Error Detection and Limited Error Correction. ITC 2022: 1:1-1:20 - [c132]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
On the Optimal Communication Complexity of Error-Correcting Multi-server PIR. TCC (3) 2022: 60-88 - [i51]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
Multi-Server PIR with Full Error Detection and Limited Error Correction. IACR Cryptol. ePrint Arch. 2022: 500 (2022) - [i50]Reo Eriguchi, Kaoru Kurosawa, Koji Nuida:
On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR. IACR Cryptol. ePrint Arch. 2022: 1206 (2022) - 2021
- [c131]Takanori Daiza, Kaoru Kurosawa:
Optimum Attack on 3-Round Feistel-2 Structure. IWSEC 2021: 175-192 - 2020
- [j79]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama:
CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(10): 1157-1166 (2020) - [j78]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
On the Invisibility and Anonymity of Undeniable Signature Schemes. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1): 18-34 (2020)
2010 – 2019
- 2019
- [j77]Wakaha Ogata, Kaoru Kurosawa:
No-Dictionary Searchable Symmetric Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 114-124 (2019) - [c130]Kaoru Kurosawa:
How to Correct Errors in Multi-server PIR. ASIACRYPT (2) 2019: 564-574 - [c129]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa:
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions. IWSEC 2019: 3-22 - [c128]Kaoru Kurosawa, Akinaga Ueda, Hayato Matsuhashi, Yusuke Sakagami:
How to Solve Multiple Short-Exponent Discrete Logarithm Problem. IWSEC 2019: 53-64 - [c127]Jia-Ch'ng Loh, Swee-Huay Heng, Syh-Yuan Tan, Kaoru Kurosawa:
A Note on the Invisibility and Anonymity of Undeniable Signature Schemes. WISA 2019: 112-125 - [i49]Kaoru Kurosawa:
How to Correct Errors in Multi-Server PIR. IACR Cryptol. ePrint Arch. 2019: 531 (2019) - [i48]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama:
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions. IACR Cryptol. ePrint Arch. 2019: 982 (2019) - 2018
- [c126]Akinaga Ueda, Hayato Tada, Kaoru Kurosawa:
(Short Paper) How to Solve DLOG Problem with Auxiliary Input. IWSEC 2018: 104-113 - [c125]Hayato Tada, Akinaga Ueda, Kaoru Kurosawa:
How to Prove KDM Security of BHHO. IWSEC 2018: 281-296 - 2017
- [j76]Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta:
How to make a linear network code (strongly) secure. Des. Codes Cryptogr. 82(3): 559-582 (2017) - [j75]Kaoru Kurosawa, Le Trieu Phong:
Anonymous and leakage resilient IBE and IPE. Des. Codes Cryptogr. 85(2): 273-298 (2017) - [j74]Naoto Itakura, Kaoru Kurosawa, Kazuki Yoneyama:
Oblivious Polynomial Evaluation in the Exponent, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 26-33 (2017) - [j73]Kaoru Kurosawa, Le Trieu Phong:
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. Int. J. Appl. Cryptogr. 3(3): 210-224 (2017) - [c124]Kaoru Kurosawa, Rie Habuka:
More Efficient Construction of Bounded KDM Secure Encryption. ACNS 2017: 354-372 - [c123]Wakaha Ogata, Kaoru Kurosawa:
Efficient No-dictionary Verifiable Searchable Symmetric Encryption. Financial Cryptography 2017: 498-516 - 2016
- [c122]Kaoru Kurosawa, Keisuke Sasaki, Kiyohiko Ohta, Kazuki Yoneyama:
UC-Secure Dynamic Searchable Symmetric Encryption Scheme. IWSEC 2016: 73-90 - [i47]Wakaha Ogata, Kaoru Kurosawa:
Efficient No-dictionary Verifiable SSE. IACR Cryptol. ePrint Arch. 2016: 981 (2016) - 2015
- [j72]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 232-245 (2015) - [j71]Shigeyoshi Imai, Kaoru Kurosawa:
Improved reconstruction of RSA private-keys from their fraction. Inf. Process. Lett. 115(6-8): 630-632 (2015) - [c121]Kaoru Kurosawa, Le Trieu Phong:
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. ACISP 2015: 145-159 - [c120]Koji Nuida, Naoto Itakura, Kaoru Kurosawa:
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints. CT-RSA 2015: 258-269 - [c119]Koji Nuida, Kaoru Kurosawa:
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces. EUROCRYPT (1) 2015: 537-555 - [i46]Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Construct UC-Secure Searchable Symmetric Encryption Scheme. IACR Cryptol. ePrint Arch. 2015: 251 (2015) - 2014
- [j70]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 215-224 (2014) - [c118]Kaoru Kurosawa, Le Trieu Phong:
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. AFRICACRYPT 2014: 51-68 - [c117]Kaoru Kurosawa, Jun Furukawa:
2-Pass Key Exchange Protocols from CPA-Secure KEM. CT-RSA 2014: 385-401 - [c116]Kaoru Kurosawa:
Garbled Searchable Symmetric Encryption. Financial Cryptography 2014: 234-251 - [i45]Koji Nuida, Kaoru Kurosawa:
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces. IACR Cryptol. ePrint Arch. 2014: 777 (2014) - [i44]Koji Nuida, Naoto Itakura, Kaoru Kurosawa:
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints. IACR Cryptol. ePrint Arch. 2014: 839 (2014) - 2013
- [j69]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New leakage-resilient CCA-secure public key encryption. J. Math. Cryptol. 7(4): 297-312 (2013) - [c115]Kaoru Kurosawa, Le Trieu Phong:
Leakage Resilient IBE and IPE under the DLIN Assumption. ACNS 2013: 487-501 - [c114]Kaoru Kurosawa, Yasuhiro Ohtaki:
How to Update Documents Verifiably in Searchable Symmetric Encryption. CANS 2013: 309-328 - [c113]Kaoru Kurosawa, Hiroyuki Ohta, Kenji Kakuta:
How to Construct Strongly Secure Network Coding Scheme. ICITS 2013: 1-17 - [c112]Kaoru Kurosawa, Takuma Ueda:
How to Factor N 1 and N 2 When $p_1=p_2 \bmod 2^t$. IWSEC 2013: 217-225 - [e5]Kaoru Kurosawa, Goichiro Hanaoka:
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings. Lecture Notes in Computer Science 7778, Springer 2013, ISBN 978-3-642-36361-0 [contents] - [i43]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
UC-Secure Multi-Session OT Using Tamper-Proof Hardware. IACR Cryptol. ePrint Arch. 2013: 77 (2013) - [i42]Kaoru Kurosawa, Takuma Ueda:
How to Factor N1 and N2 When p1=p2 mod 2t. IACR Cryptol. ePrint Arch. 2013: 249 (2013) - [i41]Kaoru Kurosawa, Le Trieu Phong:
Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited. IACR Cryptol. ePrint Arch. 2013: 765 (2013) - 2012
- [j68]Kaoru Kurosawa:
Round-efficient perfectly secure message transmission scheme against general adversary. Des. Codes Cryptogr. 63(2): 199-207 (2012) - [j67]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Undeniable and Unpretendable Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 138-150 (2012) - [c111]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. ACISP 2012: 235-246 - [c110]Kaoru Kurosawa, Yasuhiro Ohtaki:
UC-Secure Searchable Symmetric Encryption. Financial Cryptography 2012: 285-298 - [i40]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. IACR Cryptol. ePrint Arch. 2012: 213 (2012) - [i39]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
New Leakage Resilient CCA-Secure Public Key Encryption. IACR Cryptol. ePrint Arch. 2012: 453 (2012) - 2011
- [j66]Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta:
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1293-1305 (2011) - [j65]Kaoru Kurosawa:
General Error Decodable Secret Sharing Scheme and Its Application. IEEE Trans. Inf. Theory 57(9): 6304-6309 (2011) - [c109]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. ACNS 2011: 274-291 - [c108]Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
Simple and Efficient Single Round almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. ACNS 2011: 292-308 - [c107]Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
The Round Complexity of Perfectly Secure General VSS. ICITS 2011: 143-162 - [r1]Kaoru Kurosawa:
Hybrid Encryption. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 570-572 - [i38]Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
Simple and Efficient Single Round Almost Perfectly Secure Message Transmission Tolerating Generalized Adversary. IACR Cryptol. ePrint Arch. 2011: 27 (2011) - [i37]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Generic Fully Simulatable Adaptive Oblivious Transfer. IACR Cryptol. ePrint Arch. 2011: 382 (2011) - [i36]Kaoru Kurosawa, Le Trieu Phong:
Maximum Leakage Resilient IBE and IPE. IACR Cryptol. ePrint Arch. 2011: 628 (2011) - 2010
- [j64]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 63-75 (2010) - [j63]Goichiro Hanaoka, Kaoru Kurosawa:
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1994-2006 (2010) - [j62]Yvo Desmedt, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup:
A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack. J. Cryptol. 23(1): 91-120 (2010) - [j61]Kaoru Kurosawa:
Power of a public random permutation and its application to authenticated encryption. IEEE Trans. Inf. Theory 56(10): 5366-5374 (2010) - [c106]Kaoru Kurosawa:
Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk). CANS 2010: 43 - [c105]Yusuke Sakai, Goichiro Hanaoka, Kaoru Kurosawa, Kazuo Ohta:
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model. IWSEC 2010: 55-69 - [c104]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. SCN 2010: 172-181 - [c103]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. SCN 2010: 291-308 - [e4]Kaoru Kurosawa:
Information Theoretic Security, 4th International Conference, ICITS 2009, Shizuoka, Japan, December 3-6, 2009. Revised Selected Papers. Lecture Notes in Computer Science 5973, Springer 2010, ISBN 978-3-642-14495-0 [contents] - [e3]Swee-Huay Heng, Kaoru Kurosawa:
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings. Lecture Notes in Computer Science 6402, Springer 2010, ISBN 978-3-642-16279-4 [contents] - [i35]Goichiro Hanaoka, Kaoru Kurosawa:
Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption. IACR Cryptol. ePrint Arch. 2010: 35 (2010) - [i34]Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Efficiency-Improved Fully Simulatable Adaptive OT under the DDH Assumption. IACR Cryptol. ePrint Arch. 2010: 327 (2010) - [i33]Kaoru Kurosawa:
Round-Efficient Perfectly Secure Message Transmission Scheme Against General Adversary. IACR Cryptol. ePrint Arch. 2010: 450 (2010) - [i32]Ashish Choudhury, Kaoru Kurosawa, Arpita Patra:
The Round Complexity of General VSS. IACR Cryptol. ePrint Arch. 2010: 609 (2010)
2000 – 2009
- 2009
- [j60]Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa:
Small Secret Key Attack on a Takagi's Variant of RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 33-41 (2009) - [j59]Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 42-52 (2009) - [j58]Kaoru Kurosawa, Kazuhiro Suzuki:
Almost Secure (1-Round, n-Channel) Message Transmission Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 105-112 (2009) - [j57]Kaoru Kurosawa, Tsuyoshi Takagi:
One-wayness equivalent to general factoring. IEEE Trans. Inf. Theory 55(9): 4249-4262 (2009) - [j56]Kaoru Kurosawa, Kazuhiro Suzuki:
Truly efficient 2-round perfectly secure message transmission scheme. IEEE Trans. Inf. Theory 55(11): 5223-5232 (2009) - [c102]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. AFRICACRYPT 2009: 116-134 - [c101]Kaoru Kurosawa, Ryo Nojima:
Simple Adaptive Oblivious Transfer without Random Oracle. ASIACRYPT 2009: 334-346 - [i31]Kaoru Kurosawa:
General Error Decodable Secret Sharing Scheme and Its Application. IACR Cryptol. ePrint Arch. 2009: 263 (2009) - [i30]Kaoru Kurosawa, Ryo Nojima:
Simple Adaptive Oblivious Transfer Without Random Oracle. IACR Cryptol. ePrint Arch. 2009: 327 (2009) - [i29]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. IACR Cryptol. ePrint Arch. 2009: 394 (2009) - 2008
- [j55]Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:
Security of the Five-Round Kasumi Type Permutation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 30-38 (2008) - [j54]Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota:
Birthday Paradox for Multi-Collisions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 39-45 (2008) - [j53]Noboru Kunihiro, Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2356-2364 (2008) - [j52]Kaoru Kurosawa, Swee-Huay Heng:
The power of identification schemes. Int. J. Appl. Cryptogr. 1(1): 60-69 (2008) - [j51]Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa:
Tag-KEM/DEM: A New Framework for Hybrid Encryption. J. Cryptol. 21(1): 97-130 (2008) - [j50]Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba:
A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions. IEEE Trans. Inf. Theory 54(6): 2566-2571 (2008) - [c100]Goichiro Hanaoka, Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. ASIACRYPT 2008: 308-325 - [c99]Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi). CT-RSA 2008: 387-406 - [c98]Kaoru Kurosawa, Kazuhiro Suzuki:
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. EUROCRYPT 2008: 324-340 - [c97]Kaoru Kurosawa, Jun Furukawa:
Universally Composable Undeniable Signature. ICALP (2) 2008: 524-535 - [c96]Kaoru Kurosawa, Takeshi Koshiba:
Simple Direct Reduction of String (1, 2)-OT to Rabin's OT without Privacy Amplification. ICITS 2008: 199-209 - [c95]Jun Furukawa, Frederik Armknecht, Kaoru Kurosawa:
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort. SCN 2008: 392-408 - [i28]Kaoru Kurosawa, Jun Furukawa:
Universally Composable Undeniable Signature. IACR Cryptol. ePrint Arch. 2008: 94 (2008) - [i27]Goichiro Hanaoka, Kaoru Kurosawa:
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption. IACR Cryptol. ePrint Arch. 2008: 211 (2008) - [i26]Kaoru Kurosawa, Kazuhiro Suzuki:
Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme. IACR Cryptol. ePrint Arch. 2008: 421 (2008) - 2007
- [j49]Tetsu Iwata, Kaoru Kurosawa:
How to Construct Super-Pseudorandom Permutations with Short Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 2-13 (2007) - [j48]Osamu Hirota, Kaoru Kurosawa:
Immunity against Correlation Attack on Quantum Stream Cipher by Yuen 2000 Protocol. Quantum Inf. Process. 6(2): 81-91 (2007) - [j47]Mihir Bellare, Alexandra Boldyreva, Kaoru Kurosawa, Jessica Staddon:
Multirecipient Encryption Schemes: How to Save on Bandwidth and Computation Without Sacrificing Security. IEEE Trans. Inf. Theory 53(11): 3927-3943 (2007) - [c94]Kaoru Kurosawa, Kazuhiro Suzuki:
Almost Secure (1-Round, n-Channel) Message Transmission Scheme. ICITS 2007: 99-112 - [c93]Yvo Desmedt, Kaoru Kurosawa:
A Generalization and a Variant of Two Threshold Cryptosystems Based on Factoring. ISC 2007: 351-361 - [c92]Kazuhiro Suzuki, Kaoru Kurosawa:
How to Find Many Collisions of 3-Pass HAVAL. IWSEC 2007: 428-443 - [c91]Noboru Kunihiro, Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. Public Key Cryptography 2007: 412-425 - [e2]Kaoru Kurosawa:
Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings. Lecture Notes in Computer Science 4833, Springer 2007, ISBN 978-3-540-76899-9 [contents] - [i25]Kaoru Kurosawa, Takeshi Koshiba:
Direct Reduction of String (1, 2)-OT to Rabin's OT. IACR Cryptol. ePrint Arch. 2007: 46 (2007) - [i24]Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba:
How to Derive Lower Bound on Oblivious Transfer Reduction. IACR Cryptol. ePrint Arch. 2007: 65 (2007) - [i23]Kaoru Kurosawa, Kazuhiro Suzuki:
Almost Secure (1-Round, n-Channel) Message Transmission Scheme. IACR Cryptol. ePrint Arch. 2007: 76 (2007) - [i22]Kazuhiro Suzuki, Kaoru Kurosawa:
How To Find Many Collisions of 3-Pass HAVAL. IACR Cryptol. ePrint Arch. 2007: 79 (2007) - 2006
- [j46]Swee-Huay Heng, Kaoru Kurosawa:
k-Resilient Identity-Based Encryption in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 39-46 (2006) - [j45]Lan Nguyen, Reihaneh Safavi-Naini, Kaoru Kurosawa:
Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security. Int. J. Inf. Sec. 5(4): 241-255 (2006) - [j44]Wakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson:
Optimum Secret Sharing Scheme Secure against Cheating. SIAM J. Discret. Math. 20(1): 79-95 (2006) - [j43]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Trans. Inf. Theory 52(5): 2006-2017 (2006) - [j42]Ryutaroh Matsumoto, Kaoru Kurosawa, Toshiya Itoh, Toshimitsu Konno, Tomohiko Uyematsu:
Primal-Dual Distance Bounds of Linear Codes With Application to Cryptography. IEEE Trans. Inf. Theory 52(9): 4251-4256 (2006) - [c90]Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations. ACISP 2006: 360-370 - [c89]Kaoru Kurosawa, Tsuyoshi Takagi:
New Approach for Selectively Convertible Undeniable Signature Schemes. ASIACRYPT 2006: 428-443 - [c88]Jun Furukawa, Kaoru Kurosawa, Hideki Imai:
An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge. ICALP (2) 2006: 46-57 - [c87]Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota:
Birthday Paradox for Multi-collisions. ICISC 2006: 29-40 - [c86]Tri Van Le, Kaoru Kurosawa:
Bandwidth Optimal Steganography Secure Against Adaptive Chosen Stegotext Attacks. Information Hiding 2006: 297-313 - [c85]