岡本龍明 略歴・業績リスト
2012年10月9日現在
生年月日
昭和27年9月22日生(60歳)
所属
セキュアプラットフォーム研究所 岡本特別研究室長
略歴
- 1976.3 東京大学工学部計数工学科卒業
- 1978.3 東京大学工学系研究科計数工学専門課程修士修了
- 1988.4 東京大学 博士(工学)取得
研究歴
- 1978.4 日本電信電話公社入社
- 1978.5 横須賀通信研究所データ通信研究部 勤務
- 1985 情報通信処理研究所 勤務
- 1989−1990 カナダ Waterloo大学 客員助教授
- 1994−1995 AT&T Bell Laboratories 客員研究員
- 現在 日本電信電話株式会社 セキュアプラットフォーム研究所 岡本特別研究室長、R&Dフェロー、主席研究員
業績リスト
1. 賞罰
- 1991年 NTT 研究開発本部長表彰・研究開発賞
- 1993年 電子情報通信学会業績賞,小林記念特別賞「公開鍵認証方式に関する研究」
- 1997年 電気通信普及財団賞(テレコムシステム技術賞)「理想的電子現金方式の一方法」
- 1998年 科学技術庁長官賞(研究功績者賞)「効率的な電子署名方式に関する研究」
- 1999年 NTT R&Dフェロー
- 2000年 日経BP技術賞「安全性を数学的に証明しただ円曲線暗号PSEC」
- 2003年 電子情報通信学会フェロー
- 2008年 経済産業省商務情報政策局長表彰
- 2008年 IACR Distinguished Lectures
- 2011年 電子情報通信学会功績賞
- 2012年 紫綬褒章
▲ 業績リスト トップへ
2. 著書
- 「暗号・ゼロ知識証明・数論」(共立出版)1995
- 「現代暗号」(産業図書)1997
- 「暗号と情報セキュリティ」(日経BP社)1998
- 「情報セキュリティ技術」(電気通信協会)2000
- 「現代暗号・確率的証明・擬似乱数」(翻訳)(シュプリンガ−フェアラーク社) 2001
▲ 業績リスト トップへ
3. 招待講演等
3.1 海外・国際会議での招待講演
- IBM Watson Research Labs(米国)(1995.3)
- Waterloo University (カナダ)(1995.8)
- Cambridge University (英国)(1996.3〜4)
- スイス連邦工科大学,チューリッヒ(ETH)(スイス)(1996.5)
- Monash 大学(オーストラリア)(1996.8)
- 電気通信特別講座(マレーシア)(1996.8)
- Workshop on Cryptographic Protocols(スイス)(1998.3)
- 台湾通信研究所(1998.5)
- GJCC (ドイツ) (1998.10)
- JWIS'98, Workshop on CCNT(シンガポール)(1998.12)
- PKC'99(日本) (1999.3)
- 台北大学,高雄技術工科大学,台湾通信研究所(台湾)(1999.5)
- IEEE Information Theory Workshop(南アフリカ)(1999.7)
- Luminy Workshop on Cryptography(フランス)(1999.10)
- Workshop on Cryptographic Protocols(スイス)(2001.3)
- Korea University, KISA, Seongkyunkwan University (韓国) (2001.6)
- IEEE Computer Elements Workshop (アメリカ) (2001.6)
- スイス連邦工科大学,ローザンヌ(EPFL)(スイス) (2001.7)
- IMS Workshop(シンガポール)(2001.9)
- WPMC'01(デンマーク)(2001.9)
- ECC'01,Waterloo University(カナダ)(2001.10)
- WISA'02(韓国)(2002.8)
- Dagstuhl Seminar on Cryptography(ドイツ)(2002.9)
- Daewoo Workshop on Cryptography(韓国)(2004.6)
- Luminy Workshop on Cryptography(フランス)(2004.11)
- EU Workshop on Provable Security (フランス) (2004.11)
- CRM(スペイン国立数学研究所)(スペイン)(2005.4)
- ENS(フランス国立高等師範学校)(フランス)(2005.6)
- ソウル大学(韓国)(2006.2)
- AAECC2006 (アメリカ)(2006.2)
- VietCrypt2006 (ベトナム) (2006.9)
- ISITA 2006 (韓国) (2006.10)
- UCLA (アメリカ) (2006.11)
- Fields Institute (カナダ) (2006.12 )
- ENS(フランス国立高等師範学校)(フランス)(2007.3)
- UCL (ベルギー) (2007.3)
- Bertinoro Workshop (イタリア) (2007.3)
- ソウル大学(韓国)(2007.6)
- NSRI(韓国)(2007.6)
- KIAS-KMS Workshop (韓国) (2007.6)
▲ 業績リスト トップへ
4. 委員・学会活動
4.1.学会役員等
- 国際暗号学会(IACR)理事(1998〜2000)
- 日本応用数理学会 理事(1999〜)
- 日本応用数理学会 会長(2007.4〜2008.3)
- 電子情報通信学会・情報セキュリティ研究専門委員長(1999.5〜2000.4)
- 電子情報通信学会・和文論文誌「代数曲線とその応用」特集号編集委員長(1999.8)
- 日本応用数理学会「数論アルゴリズムとその応用」研究部会幹事(2000〜)
- 電子情報通信学会・英文論文誌「暗号と情報セキュリチィ」特集号編集委員長(2000.1)
- 電子情報通信学会 理事(2001.5〜2003.4)
- 日本数学協会 理事(2002〜)
- 電子情報通信学会・「基礎・境界ソサイエティ フェロー推薦委員会」委員(2003〜2005)
- 電子情報通信学会・「論文賞委員会」(2005)
- 日本応用数理学会「JJAM(日本応用数理学会 英文論文誌)」編集委員 (2005〜)
4.2.国際会議委員等
4.3.公的活動
- 情報処理振興事業協会:「コンピュータウィルス対策システム研究開発委員会」委員(1993〜96)
- 大蔵省:「電子マネー及び電子決済に関する懇談会」委員(1996〜97)
- 郵政省:「電子決済、電子現金とその利用環境整備に関する調査研究会」(1996)
- 郵政省:「暗号通信のあり方に関する研究会」委員会委員(1999〜)
- 警察庁:「科学技術委員会委員」委員(1999〜2000)
- 郵政省:「暗号通信の普及・高度化に関する研究会」技術分科会構成員(2000)
- 総務省、経産省:「暗号技術検討委員会/評価委員会委員」(2000〜)
- 「電子署名法及び認証業務に関する法律」における電子署名技術WG委員(2000〜)
- 情報処理振興事業協会:「情報セキュリティ関連事業推進委員会委員」委員(2000〜)
- 科学技術振興機構:「科学技術振興調整費審査ワーキンググループ委員」(2004〜)
- 産業技術総合研究所:「研究ユニット評価委員会」(2005〜)
- 科学技術振興機構:「情報と社会」研究開発領域 計画型研究開発「高度情報社会の脆弱性の解明と解決」評価委員(2005〜)
4.4.客員教授等
- カナダ Waterloo大学 客員助教授(1989−1990)
- 東京都立大学数学科・非常勤講師(1998)
- 大阪府立大学工学部・非常勤講師(1998)
- 東京工業大学大学院・非常勤講師(1999)
- 東京大学大学院数理科学研究科・客員教授(非常勤1999.4〜2004.3)
- 北陸先端科学大学院大学・非常勤講師(2000)
- 鳥取大学工学部・非常勤講師(2001)
- 新潟大学工学部・非常勤講師(2001)
- 筑波大学大学院・客員教授(非常勤2001.4〜)
- 京都大学大学院情報学研究科・客員教授(非常勤2001.4〜)
- 御茶ノ水女子大学理学部・非常勤講師(2001)
- 中央大学理工学部・非常勤講師(2002〜)
- 千葉大学大学院・非常勤講師(2004)
4.5.学位論文審査委員
- スイス連邦工科大学(ETH)(スイス) M. Stadler氏・学位論文審査委員(U.Maurer:指導教授) (1996.5)
- ENST(フランス) P. Paillier 氏・学位論文審査委員(D.Naccache:指導教授)(1999.9)
- 北陸先端科学大学院大学・岡本健氏・学院論文審査委員(宮地充子:指導教授)(2001.12)
- カタルーニャ工科大学(UPC) (スペイン) Javier Herranz 氏 (German Saez:指導教授) (2005.4)
- ソウル大学(韓国) Namsu Jho 氏および Eunsun Yoo 氏 (Myung-Hwan Kim:指導教官) (2007.6)
▲ 業績リスト トップへ
5. 業績
5.1.論文誌
- "A Digital Signature Scheme Based on Polynomial Operations," (with A. Shiraishi), Systems and Computers in Japan, 17, 5, pp.36-44 (1986) (translated from IECE Transactions, J68-D, 5, pp.1157-1164 (1985)).
- "A Single Public-Key Authentication Scheme for Multiple Users," Systems and Computers in Japan, 18, 10, pp.14-24 (1987) (translated from IECE Transactions, J69-D, 10, pp.1481-1489 (1986)).
- "Fast Public-Key Cryptosystem Using Congruent Polynomial Equations," Electronics Letters, 22, 11, pp.581-582 (1986).
- "Modification of a Public-Key Cryptosystem," Electronics Letters, 23, 16, pp.814-815 (1987).
- "Practical Extension of the Fiat-Shamir Scheme," (with K. Ohta), Electronics Letters, 24, 15, pp.955-956 (1988).
- "A Digital Multisignature Scheme Using Bijective Public-key Cryptosystems," ACM Transactions on Computer Systems, Vol.6, No.8, pp.432-441 (1988).
- "Membership Authentication for Hierarchical Multigroups Using a Mater Key,"(with K. Ohta), IEICE Transactions, Vol. E-73, No.7 (1990).
- "A Fast Signature Scheme Based on Congruential Polynomial Operations, " IEEE Transactions on Information Theory, Vol.IT-36, No.1, pp.47-53 (1990).
- "Abuse of Undeniable Signatures and Their Countermeasures" (with K. Ohta and A. Fujioka), IEICE Transactions, Vol. E74, No.8, pp.2109-2113 (1991).
- "Interactive Bi-proof Systems and Undeniable Signature Schemes" (with A. Fujioka and K. Ohta) IEICE Transactions, Vol. E-75-D, No. 1, pp. 102-109 (1992)
- "Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," (with A. Menezes and S. Vanstone), IEEE Transactions on Information Theory, Vol.IT-39, No.5 (1993).
- "理想的電子現金方式の一方法," (with K. Ohta), IEICE Transaction, Vol. J76-D-I, No.6 (1993)
- "On the Complexity of the Discrete Logarithm for a General Finite (with K. Sakurai and H. Shizuya), IEICE Transactions, Vol. E79-A , No. 1, pp. 61-65 (1996).
- "One-Time Zero-Knowledge Authentication and Untraceable Cash," (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
- "Security of the Modified Fiat-Shamir Schemes," (with K. Ohta), IEICE Transactions, Vol. E81-A, No. 1 (1998).
- "Escraw Cash Systems," (with E. Fujisaki), IEICE Transactions, Vol. E81-A (1998), No. 1 (1998).
- "Threshold Key-Recovery Systems for RSA," IEICE Transactions, Vol. E82-A, No. 1 (1999).
- "Statistical Zero-Knowledge Protocols to Prove Modular] Polynomial Relations," (with E. Fujisaki), IEICE Transactions, Vol. E82-A, No. 1 (1999).
- "Multi-Signature Schemes Secure against Active Insider Attacks,"(with K. Ohta), IEICE Transactions, Vol. E82-A, No. 1 (1999).
- "On Relationships between Statistical Zero-Knowledge Proofs," Journal of Comput. and System Sciences, 60, pp.47-108 (1999).
- "How to Enhance the Security of Public-Key Encryptions at Minimum Cost,"(with E. Fujisaki), IEICE Transactions, Vol. E83-A, No. 1, pp.147-165 (2000).
- "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), IEICE Transactions, Vol. E84-A, No. 1 (2001).
- "A Chosen-Cipher Secure Encryption Scheme Tightly As Secure As Factoring"(with E. Fujisaki), IEICE Transactions, Vol. E84-A, No. 1 (2001).
- "RSA-OAEP is Secure under the RSA Assumption" (with E. Fujisaki, D. Pointcheval and J. Stern), to appear in the Journal of Cryptology.
- "How to Enhance the Security of Public-Key Encryption at Minimum Cost," (with E. Fujisaki), IEICE Transactions, Vol. E83-A, No.1, pp. 24-32(2000).
- "A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring" (with E. Fujisaki), IEICE Transactions, Vol. E84-A, No.1, pp. 179-187(2001).
- "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), IEICE Transactions, Vol. E84-A, No.1, pp. 197-204(2001).
- "Delegation Chains Secure up to Constant Length," (with M. Abe), IEICE Transactions, Vol. E85-A, No.1, pp. 110-116(2002).
- "RSA-OAEP Is Secure under the RSA Assumption", (with E. Fujisaki, D. Pointcheval, and J. Stern), Journal of Cryptology, Vol. 17 (2004).
- "A Universally Composable Secure Channel Based on the KEM-DEM Framework", (with W. Nagao and Y. Manabe), IEICE Transactions, Vol. E89-A, No.1, pp. 28-38 (2006).
5.2.国際会議
- "Modification of the Fiat-Shamir Scheme," (with K. Ohta), the proceedings of Crypto'88, LNCS 403, Springer-Verlag, pp.232-243 (1990).
- "Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility," (with K. Ohta), the proceedings of Eurocrypt'89, LNCS, Springer-Verlag, pp.134-149 (1990).
- "Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash," (with K. Ohta), the proceedings of Crypto'89, LNCS, Springer-Verlag, pp.481-496 (1990).
- "Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme," (with K. Ohta and K. Koyama), the proceedings of Eurocrypt'90, LNCS 473, Springer-Verlag, pp.446-457 (1991).
- "How to Utilize the Randomness of Zero-Knowledge Proofs," (with K. Ohta), the proceedings of Crypto'90, LNCS 537, Springer-Verlag, pp.456-475 (1991).
- "ESIGN: An Efficient Digital Signature Implementation for Smart Cards," (with A. Fujioka and S. Miyaguchi), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.446-457 (1992).
- "Interactive Bi-Proof Systems and Undeniable Signature Schemes," with A. Fujioka and K. Ohta, the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.243-256 (1992).
- "Direct Zero Knowledge Proofs of Computational Power in Five Rounds," (with D. Chaum and K. Ohta), the proceedings of Eurocrypt'91, LNCS 547, Springer-Verlag, pp.96-105 (1992).
- "Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field," (with A. Menezes and S. Vanstone), the proceedings of STOC, pp.80-89 (1991).
- "Universal Electronic Cash," (with K. Ohta), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.324-337 (1992).
- "Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems," (with K. Sakurai), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.267-278 (1992)
- "New Public-Key Schemes Based on Elliptic Curves over the Ring Z_n," (with K. Koyama, U.M. Maurer, and S.A. Vanstone), the proceedings of Crypto'91, LNCS 576, Springer-Verlag, pp.252-266 (1992)
- "An Extension of Zero-Knowledge Proofs and Its Applications," the proceedings of Asiacrypt'91, LNCS, Springer-Verlag (1992).
- "A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme," (with K. Ohta), the proceedings of Asiacrypt'91, LNCS, Springer-Verlag (1992).
- "How Intractable Is the Discrete Logarithm for a General Finite Group," (with K. Sakurai and H. Shizuya), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.420-428 (1993).
- "Secure Bit Commitment Function against Divertibility," (with K. Ohta and A. Fujioka), the proceedings of Eurocrypt'92, LNCS 658, Springer-Verlag, pp.324-340 (1993).
- "An Efficient Digital Signature Scheme Based on an Elliptic Curve over the Ring Z_n," (with A. Fujioka and E. Fujisaki), the proceedings of Crypto'92, LNCS, Springer--Verlag, pp.54-65 (1993)
- "Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes," the proceedings of Crypto'92, LNCS, Springer--Verlag, pp.31-53 (1993)
- "A Practical Secret Voting Scheme for Large Scale Elections", (with A. Fujioka and K. Ohta), the proceedings of Auscrypt'92, LNCS, Springer--Verlag (1993).
- "On Key Distribution and Authentication in Mobile Radio Networks," (with C. Park, K.Kurosawa, and S. Tsujii), the proceedings of Eurocrypt'93, LNCS, Springer-Verlag (1994).
- "Survey of Digital Signature Schemes," (with K. Ohta),the proceedings of SPRC (the symposium on State and Progress of Research in Cryptography), Rome, pp.17-29 (1993)
- "On the Relationship among Cryptographic Physical Assumptions," the Proceedings of ISAAC'93, LNCS 762, Springer-Verlag, pp. 369-378 (1993).
- "Designated Confirmer Signatures and Public-Key Encryption Are Equivalent," the proceedings of Crypto'94, LNCS 839, Springer-Verlag, pp. 61-74 (1995).
- "Simultaneous Secret Exchange Protocols Based on General Assumptions," (with K. Ohta), the Proceedings of the ACM Conference on Computer and Communications Security (1994).
- "Zero-Knowledge Proofs of Computational Power in the Shared String Model," (with A. De Santis and G. Persiano), the proceedings of Asiacrypt'94, LNCS, Springer-Verlag (1995).
- "Single-Term Divisible Electronic Coins," (with T. Eng), the proceedings of Eurocrypt'94, LNCS 950, Springer-Verlag, pp.306-319 (1995).
- "Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs," (with I. Damgaard, O. Goldreich and A. Wigderson), the proceedings of Crypto'95}, LNCS 963, Springer--Verlag, pp.325--338 (1995).
- "An Efficient Divisible Electronic Cash Scheme," the proceedings of Crypto'95, LNCS 963, Springer-Verlag, pp.438-451 (1995).
- "Practical Escrow Cash Systems," (with E. Fujisaki), the proceedings of Security Protocols Workshop, LNCS 1189, Springer-Verlag, pp. 33-48 (1996).
- "On Relationships between Statistical Zero-Knowledge Proofs," the proceedings of STOC, pp.649-658 (1996).
- "An Electronic Voting Scheme," the proceedings of IFIP'96, IT Tools (1996).
- "Receipt-Free Electronic Voting Schemes for Large Scale Elections," the proceedings of Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp.25-36 (1997).
- "Threshold Key-Recovery Systems for RSA," the proceedings of Security Protocols Workshop, LNCS 1361, Springer-Verlag, pp.192-200 (1997).
- "Statistical Zero-Knowledge Protocols to Prove Polynomial Relations," (with E. Fujisaki), the proceedings of Crypto'97, LNCS1294, Springer-Verlag, pp16-30 (1997).
- "Keeping the SZK-Verifier Honest Uncondi tionally," (with G. DiCrescenzo and M. Yung), the proceedings of Crypto'97, LNCS 1294, pp31-45 Springer-Verlag (1997).
- "Lower Bounds on Term-Based Divisible Cash Systems," (with M. Yung), the proceedings of PKC'98, LNCS 1431, Springer-Verlag, pp72-82 (1998).
- "NTT's Public-Key Cryptosystem and Electronic Money System," (with H.Kawahara and K.Koyama), the proceedings of PKS'98, Certicom (1998)
- "Security of an Identity-Based Cryptosystem and the Related Reductions," (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp546-560 (1998).
- "A Practical and Provably Secure Scheme for Publicly Secret Sharing and Its Application," (with E. Fujisaki), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp32-46 (1998).
- "A Public-Key Cryptosystem as Secure as Factoring," (with S. Uchiyama), the proceedings of Eurocrypt'98, LNCS 1403, Springer-Verlag, pp308-318 (1998).
- "On Concrete Security Treatment of Signature Schemes Derived from Identification," (with K. Ohta), the proceedings of Crypto'98, LNCS 1462, Springer-Verlag, pp354-369 (1998).
- "EPOC: Efficient Probabilistic Public-Key Encryption," (with S.Uchiyama and E.Fujisaki), IEEE P1363 (1998).
- "TSH-ESIGN: Efficient Digital Signature Scheme Using Trisection Size Hash," (with E.Fujisaki and H.Morita), IEEE P1363a (1998)
- "Provable Security of Practical Public-Key Encryption Scheme," the proceedings of JWIS98 (1998)
- "Oblivious Transfer Channels and Dealing Channels," DMTCS'99 (1999)
- "How to Enhance the Security of Public-Key Encryptions at Minimum Cost," (with E. Fujisaki), the proceedings of PKC'99, LNCS 1560, Springer-Verlag, pp.53-68 (1999).
- "Secure Integration of Asymmetric and Symmetric Encryption Schemes," (with E. Fujisaki), the proceedings of Crypto'99, LNCS 1666, Springer-Verlag, pp.537-554 (1999).
- "A Signature Scheme with Message Recovery as Secure as Discrete Logarithm," (with M. Abe), the proceedings of Asiacrypto'99, LNCS 1716, Springer-Verlag, pp.378-389 (1999).
- "Quantum Public-Key Cryptosystems", (with K.Tanaka and S.Uchiyama), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.147-165 (2000).
- "Provably Secure Partially Blind Signatures", (with M.Abe), the proceedings of Crypto 2000, LNCS 1880, Springer-Verlag, pp.271- 286 (2000).
- "The Gap-Problems: a New Class of Problems for the Security of Cryptographic Schemes", (with D. Pointcheval), the proceedings of PKC'01, LNCS 1992, Springer-Verlag, pp.104-118 (2001).
- "REACT: Rapid Enhanced-security Asymmetric Cryptosystem Transform", (with D. Pointcheval), the proceedings of Cryptographers' Track at RSA Conference'01 (CT-RSA'01), LNCS 2020, Springer-Verlag, pp.159-175 (2001).
- "RSA-OAEP is Secure under the RSA Assumption" (with E. Fujisaki, D. Pointcheval and J. Stern), the proceedings of Crypto'01, LNCS 2139, Springer-Verlag, pp.260-274 (2001)
- "A New Approach to Knapsack Cryptosystems (Extended Abstract)," (with K. Tanaka), the proceedings of WISA2002, Vol.3, pp.33-42 (2002).
- "Almost Uniform Density of Power Residues and the Provable Security of ESIGN", (with J. Stern), the proceedings of Asiacrypt 2003, LNCS 2894, Springer, pp.287--301 (2003).
- "Resource Bounded Unprovability of Computational Lower Bounds", the Proceedings of Workshop on Cryptography and Related Mathematics, Chuo University, ePrint Archive 2003/187, IACR, http://eprint.iacr.org/ (2003)
- "An RSA Family of Trap-door Permutations with a Common Domain and Its Application", (with R. Hayashi and K. Tanaka), the proceedings of PKC'04, LNCS, Springer-Verlag (2004)
- "A Universal Composable Channel Based on the KEM-DEM Framework", (with W. Nagao and Y. Manabe) the proceedings of TCC'05, LNCS, Springer-Verlag (2005).
- "Efficient Blind and Partially Blind Signatures Without Random Oracles", the proceedings of TCC'06, LNCS, Springer-Verlag (2006).
- "Cryptography Based on Bilinear Maps", the proceedings of AAECC-16} LNCS 3857, Springer-Verlag, pp.35-50 (2006).
- "On Pairing-Based Cryptosystems", the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.50-66 (2006).
- "Universally Composable Identity-Based Encryption", (with R. Nishimaki and Y. Manabe) the proceedings of Vietcrypt'06, LNCS 4341, Springer-Verlag, pp.337-353 (2006).
▲ 業績リスト トップへ
▲ このページのトップへ