Search Results - "Shirase, Masaaki"
-
1
Cryptanalysis of efficient proxy signature schemes for mobile communication
Published in Science China. Information sciences (01-10-2010)“…In a proxy signature scheme, an original signer is allowed to delegate his signing power to a designated person, called the proxy signer and the proxy signer…”
Get full text
Journal Article -
2
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS
Published in 2021 Ninth International Symposium on Computing and Networking (CANDAR) (01-11-2021)“…Pairings on elliptic curves are exploited for pairing-based cryptography, e.g., ID-based encryption and group signature authentication. For secure…”
Get full text
Conference Proceeding -
3
Specific Congruence Classes of Integer Parameters for Generating BLS Curves for Fast Pairings
Published in 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW) (01-11-2020)“…Pairings are widely used for innovative protocols such as ID-based encryption and group signature authentication. According to the recent works, the…”
Get full text
Conference Proceeding -
4
FPGA and ASIC implementations of the pairing in characteristic three
Published in Computers & electrical engineering (01-01-2010)“…Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of…”
Get full text
Journal Article -
5
Certificateless hybrid signcryption
Published in Mathematical and computer modelling (01-02-2013)“…Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost…”
Get full text
Journal Article -
6
New Operation and Problems on Elliptic Curve and Their Application
Published in 2018 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) (01-05-2018)“…In this paper, a new operation \mathbf{Me}(\pmb{P},\pmb{Q}) or \pmb{P}\oplus\pmb{Q} and Me-scalar multiplication \pmb{P}_{n,Z} with auxiliary \pmb{Z} are…”
Get full text
Conference Proceeding -
7
Coordinate system for elliptic curve cryptosystem on twisted Edwards curve
Published in 2016 IEEE International Conference on Consumer Electronics-Taiwan (ICCE-TW) (01-05-2016)“…This paper proposes a coordinate system in which a point (x, y) is represented as (X, Y, Z, W), where x = X/Z and y = Y/W are satisfied. In the proposed…”
Get full text
Conference Proceeding -
8
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three
Published in IEEE transactions on computers (01-11-2008)“…Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of…”
Get full text
Journal Article -
9
Analysis and improvement of authenticatable ring signcryption scheme
Published in Shanghai jiao tong da xue xue bao (01-12-2008)“…We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks. Furthermore, we…”
Get full text
Journal Article -
10
A digital content sharing model using proxy re-encryption without server access
Published in 2017 IEEE International Conference on Consumer Electronics - Taiwan (ICCE-TW) (01-06-2017)“…In this paper, we proposes a digital content sharing scheme using proxy re-encryption, in which we don't need to access any server when sharing content, and a…”
Get full text
Conference Proceeding -
11
An Improved Addition Formula on Elliptic Curves Given by Weierstrass Normal Form
Published in 2013 16th International Conference on Network-Based Information Systems (01-09-2013)“…An improved addition formula for an elliptic curve given by Weierstrass form is proposed. First, the coordinate is converted so that P = (0, y 1 ) and Q = (x 2…”
Get full text
Conference Proceeding -
12
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees
Published in 2021 Ninth International Symposium on Computing and Networking (CANDAR) (01-11-2021)“…Pairings on elliptic curves which are carried out by the Miller loop and final exponentiation are used for innovative protocols such as ID-based encryption and…”
Get full text
Conference Proceeding -
13
An Explicit Formula of Cyclotomic Cubing Available for Pairings on Elliptic Curves with Embedding Degrees of Multiple of Three
Published in 2020 35th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) (01-07-2020)“…Bilinear pairings are widely used for innovative protocols such as ID-based encryption and group signature authentication. According to the current research of…”
Get full text
Conference Proceeding -
14
A Technique for Fast Miller's Algorithm of Ate Pairings on Elliptic Curves with Embedding Degrees of Multiple of Three
Published in 2020 35th International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) (01-07-2020)“…Bilinear pairings are widely used for innovative protocols such as ID-based encryption and group signature authentication. According to the current research of…”
Get full text
Conference Proceeding -
15
FPGA and ASIC implementations of the η T pairing in characteristic three
Published in Computers & electrical engineering (2010)“…Since their introduction in constructive cryptographic applications, pairings over (hyper)elliptic curves are at the heart of an ever increasing number of…”
Get full text
Journal Article -
16
A Performance Analysis and Evaluation of SIDH with Implementation-Friendly Classes of Quadratic Extension Fields
Published in 2019 Seventh International Symposium on Computing and Networking (CANDAR) (01-11-2019)“…It is well-known that the class of binomial extension fields is widely used to construct quadratic extension fields (QEFs) of supersingular isogeny…”
Get full text
Conference Proceeding -
17
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks
Published in Network and Parallel Computing (2008)“…As various applications of wireless ad hoc network have been proposed, security has become one of the big research challenges and is receiving increasing…”
Get full text
Book Chapter -
18
Elliptic Curve Scalar Multiplication with a Bijective Transform
Published in 2014 Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (01-07-2014)“…It is important to speed up scalar multiplication in elliptic curve cryptosystems and then various speeding-up techniques for that have been proposed. This…”
Get full text
Conference Proceeding -
19
Faster Scalar Multiplication for Elliptic Curve Cryptosystems
Published in 2013 16th International Conference on Network-Based Information Systems (01-09-2013)“…In Elliptic Curve Cryptosystems (ECC), a scalar multiplication of a base point is the most time-consuming operation. Thus, a lot of improvemnets on the scalar…”
Get full text
Conference Proceeding -
20
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation
Published in 18th IEEE Symposium on Computer Arithmetic (ARITH '07) (01-06-2007)“…In this paper, we propose a modified eta T pairing algorithm in characteristic three which does not need any cube root extraction. We also discuss its…”
Get full text
Conference Proceeding