Search Results - "Shirase, Masaaki"

Refine Results
  1. 1

    Cryptanalysis of efficient proxy signature schemes for mobile communication by Li, FaGen, Shirase, Masaaki, Takagi, Tsuyoshi

    Published in Science China. Information sciences (01-10-2010)
    “…In a proxy signature scheme, an original signer is allowed to delegate his signing power to a designated person, called the proxy signer and the proxy signer…”
    Get full text
    Journal Article
  2. 2

    Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS by Nanjo, Yuki, Shirase, Masaaki, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…Pairings on elliptic curves are exploited for pairing-based cryptography, e.g., ID-based encryption and group signature authentication. For secure…”
    Get full text
    Conference Proceeding
  3. 3

    Specific Congruence Classes of Integer Parameters for Generating BLS Curves for Fast Pairings by Nanjo, Yuki, Shirase, Masaaki, Kusaka, Takuya, Nogami, Yasuyuki

    “…Pairings are widely used for innovative protocols such as ID-based encryption and group signature authentication. According to the recent works, the…”
    Get full text
    Conference Proceeding
  4. 4

    FPGA and ASIC implementations of the pairing in characteristic three by Beuchat, Jean-Luc, Doi, Hiroshi, Fujita, Kaoru, Inomata, Atsuo, Ith, Piseth, Kanaoka, Akira, Katouno, Masayoshi, Mambo, Masahiro, Okamoto, Eiji, Okamoto, Takeshi, Shiga, Takaaki, Shirase, Masaaki, Soga, Ryuji, Takagi, Tsuyoshi, Vithanage, Ananda, Yamamoto, Hiroyasu

    Published in Computers & electrical engineering (01-01-2010)
    “…Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of…”
    Get full text
    Journal Article
  5. 5

    Certificateless hybrid signcryption by Li, Fagen, Shirase, Masaaki, Takagi, Tsuyoshi

    Published in Mathematical and computer modelling (01-02-2013)
    “…Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost…”
    Get full text
    Journal Article
  6. 6

    New Operation and Problems on Elliptic Curve and Their Application by Shirase, Masaaki

    “…In this paper, a new operation \mathbf{Me}(\pmb{P},\pmb{Q}) or \pmb{P}\oplus\pmb{Q} and Me-scalar multiplication \pmb{P}_{n,Z} with auxiliary \pmb{Z} are…”
    Get full text
    Conference Proceeding
  7. 7

    Coordinate system for elliptic curve cryptosystem on twisted Edwards curve by Shirase, Masaaki

    “…This paper proposes a coordinate system in which a point (x, y) is represented as (X, Y, Z, W), where x = X/Z and y = Y/W are satisfied. In the proposed…”
    Get full text
    Conference Proceeding
  8. 8

    Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three by Beuchat, J.-L., Brisebarre, N., Detrey, J., Okamoto, E., Shirase, M., Takagi, T.

    Published in IEEE transactions on computers (01-11-2008)
    “…Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of…”
    Get full text
    Journal Article
  9. 9

    Analysis and improvement of authenticatable ring signcryption scheme by Li, Fa-gen, Masaaki, Shirase, Tsuyoshi, Takagi

    Published in Shanghai jiao tong da xue xue bao (01-12-2008)
    “…We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks. Furthermore, we…”
    Get full text
    Journal Article
  10. 10

    A digital content sharing model using proxy re-encryption without server access by Yoshida, Tsutomu, Shirase, Masaaki

    “…In this paper, we proposes a digital content sharing scheme using proxy re-encryption, in which we don't need to access any server when sharing content, and a…”
    Get full text
    Conference Proceeding
  11. 11

    An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form by Shirase, Masaaki

    “…An improved addition formula for an elliptic curve given by Weierstrass form is proposed. First, the coordinate is converted so that P = (0, y 1 ) and Q = (x 2…”
    Get full text
    Conference Proceeding
  12. 12

    A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees by Nanjo, Yuki, Shirase, Masaaki, Kodera, Yuta, Kusaka, Takuya, Nogami, Yasuyuki

    “…Pairings on elliptic curves which are carried out by the Miller loop and final exponentiation are used for innovative protocols such as ID-based encryption and…”
    Get full text
    Conference Proceeding
  13. 13

    An Explicit Formula of Cyclotomic Cubing Available for Pairings on Elliptic Curves with Embedding Degrees of Multiple of Three by Nanjo, Yuki, Shirase, Masaaki, Kusaka, Takuya, Nogami, Yasuyuki

    “…Bilinear pairings are widely used for innovative protocols such as ID-based encryption and group signature authentication. According to the current research of…”
    Get full text
    Conference Proceeding
  14. 14

    A Technique for Fast Miller's Algorithm of Ate Pairings on Elliptic Curves with Embedding Degrees of Multiple of Three by Nanjo, Yuki, Shirase, Masaaki, Kusaka, Takuya, Nogami, Yasuyuki

    “…Bilinear pairings are widely used for innovative protocols such as ID-based encryption and group signature authentication. According to the current research of…”
    Get full text
    Conference Proceeding
  15. 15
  16. 16

    A Performance Analysis and Evaluation of SIDH with Implementation-Friendly Classes of Quadratic Extension Fields by Nanjo, Yuki, Shirase, Masaaki, Kusaka, Takuya, Nogami, Yasuyuki

    “…It is well-known that the class of binomial extension fields is widely used to construct quadratic extension fields (QEFs) of supersingular isogeny…”
    Get full text
    Conference Proceeding
  17. 17

    Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks by Li, Fagen, Shirase, Masaaki, Takagi, Tsuyoshi

    Published in Network and Parallel Computing (2008)
    “…As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing…”
    Get full text
    Book Chapter
  18. 18

    Elliptic Curve Scalar Multiplication with a Bijective Transform by Nagai, Yoshitaka, Shirase, Masaaki, Izu, Tetsuya

    “…It is important to speed up scalar multiplication in elliptic curve cryptosystems and then various speeding-up techniques for that have been proposed. This…”
    Get full text
    Conference Proceeding
  19. 19

    Faster Scalar Multiplication for Elliptic Curve Cryptosystems by Sakemi, Yumi, Izu, Tetsuya, Shirase, Masaaki

    “…In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar…”
    Get full text
    Conference Proceeding
  20. 20

    An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation by Beuchat, J.-L., Shirase, M., Takagi, T., Okamoto, E.

    “…In this paper, we propose a modified eta T pairing algorithm in characteristic three which does not need any cube root extraction. We also discuss its…”
    Get full text
    Conference Proceeding