Zobrazeno 1 - 10
of 236
pro vyhledávání: '"Goichiro Hanaoka"'
Autor:
Mine Arai, Koki Tejima, Yuya Yamada, Takayuki Miura, Kyosuke Yamashita, Chihiro Kado, Rei Shimizu, Masataka Tatsumi, Naoto Yanai, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 12, Pp 47359-47372 (2024)
Education in cybersecurity is crucial in the current society, and it will be extended into the artificial intelligence (AI) area, called AI security, in the near future. Although many video games for education in cybersecurity have been designed, we
Externí odkaz:
https://doaj.org/article/b721b94afbd4493daa5f07d31a148868
Autor:
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 7, Pp 139021-139034 (2019)
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ma
Externí odkaz:
https://doaj.org/article/0b6f5f7b90144a00be9f62d9ecbb6ace
Publikováno v:
Designs, Codes and Cryptography. 91:1645-1684
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) besides appropriate circular security assumptions. I
Autor:
Ryu ISHII, Kyosuke YAMASHITA, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO
Publikováno v:
IEICE Transactions on Information and Systems. :1845-1856
Autor:
SeongHan SHIN, Shota YAMADA, Goichiro HANAOKA, Yusuke ISHIDA, Atsushi KUNII, Junichi OKETANI, Shimpei KUNII, Kiyoshi TOMOMURA
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1121-1133
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :173-181
Autor:
Kyosuke YAMASHITA, Ryu ISHII, Yusuke SAKAI, Tadanori TERUYA, Takahiro MATSUDA, Goichiro HANAOKA, Kanta MATSUURA, Tsutomu MATSUMOTO
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1188-1205
Most aggregate signature schemes are relying on pairings, but high computational and storage costs of pairings limit the feasibility of those schemes in practice. Zhao proposed the first pairing-free aggregate signature scheme (AsiaCCS 2019). However
Publikováno v:
Public-Key Cryptography – PKC 2021 ISBN: 9783030752446
Public Key Cryptography (1)
Public Key Cryptography (1)
In this work, we show negative results on the tamper-resilience of a wide class of cryptographic primitives with uniqueness properties, such as unique signatures, verifiable random functions, signatures with unique keys, injective one-way functions,
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :89-103
Replayable chosen ciphertext (RCCA) security was introduced by Canetti, Krawczyk, and Nielsen (CRYPTO 03) in order to handle an encryption scheme that is “non-malleable except tampering which preserves the plaintext”. RCCA security is a relaxatio