

阿部 正幸
セキュアプラットフォーム研究所
[ 任命日 ]
平成25年 4月 1日
・ 『計算理論の基礎』(共立出版, 2000年, 分担執筆)
・ 『情報セキュリティ事典』(共立出版, 2003年, 分担執筆)
1999年 電子情報通信学会SCIS論文賞 「耐性のあるしきい値付きCramer-Shoup暗号」
International Journal of Applied Cryptography 編集委員(2007年〜)
京都大学 大学院情報学研究科 社会情報学専攻 客員准教授(2013年〜)
東京大学新領域創成科学研究科複雑理工学専攻 非常勤講師(2009年)
電気通信大学 情報通信工学科 非常勤講師(2003年、2012年)
東海大学 開発工学部 情報通信工学科 非常勤講師(2002年)
拓殖大学電子工学科 客員講師(1999年)
国際会議の委員等 ※年次は会議開催年
- 2013(H.25)
- TCC'13, CT-RSA'13, Crypto'13
- 2012(H.24)
- TCC'12, SCN'12
- 2011(H.23)
- PKC'11, Crypto'11, Asiacrypt'11
- 2010(H.22)
- ACISP'10
- 2009(H.21)
- ASIACCS'09, Crypto'09, SAC'09, Asiacrypt'09
- 2008(H.20)
- PKC'08, CT-RSA'08, ACNS'08, ACISP'08, Asiacrypt'08
- 2007(H.19)
- Asiacrypt'07
- 2006(H.18)
- PKC'06, WWW'06, VietCrypt
- 2005(H.17)
- CT-RSA'05, Crypto'05
- 2004(H.16)
- PKC'04, FC'04, ACNS'04
- 2003(H.15)
- PKC'03, ACISP'03, ISC'03, Asiacrypt2003
- 2001(H.13)
- Asiacrypt 2001
国際会議のプログラム委員長・運営委員長等
- 2013(H.25)
- TCC’13
- 2010(H.22)
- Asiacrypt’10
- 2008(H.20)
- IEEE AsiaCCS’08
- 2007(H.19)
- CT-RSA’07
招待講演(国内・国際会議・ワークショップ等)
- 2012(H.24).9.26
- The Sixth International Conference on Provable Security (ProvSec 2012), Chengdu, China, “Cryptographic Tools over Bilinear Groups for Modular Design of Cryptographic Tasks”
- 2012(H.24).2.23
- 5th Workshop on Secure Construction of Public-Key Cryptosystems and its Applications, Akihabara, Japan, “Structure-Preserving Cryptography Part-II: Structure Preserving Commitments”
- 2011(H.23).5.31
- International Workshop on Coding and Cryptology, Qingdao, China, “Signature Scheme with Efficient Proof of Validity”
- 2008(H.20).12.3
- International Conference on Information Security and Cryptography 2008 (ICISC’08, Seoul, Korea), “Provable Security in Public-key Encryption Schemes”
- 2007(H.19).12.13
- 情報処理推進機構(IPA) Cryptography Workshop 2007 Autumn,
“Compact CCA-secure Encryption for Arbitrary Messages”
- 2007(H.19).12.11
- 東京工業大学21 世紀Global COE プログラム ワークショップ, “Compact CCA-secure Encryption”
- 2006(H.18).2.28
- 産業技術総合研究所, 公開鍵暗号の安全な構成とその応用ワークショップ, “Tag-KEM/DEM: A New Framework for Hybrid Encryption”
- 2003(H.15).3.8
- 第3回JST領域探索研究会, “Multi-Party Protocols and Zero-Knowledge Proofs”
- 2001(H.13).9.18
- 電気通信学会関西支部セミナー “ECの動向”
- 2001(H.13).1.15
- ICU, Korea, The Seminar series at the Information and Communications University, “Cryptographic Solution for Electronic Voting”, “Development of Electronic Voting Systems in NTT”
セミナー等講演
New York University (USA, 2005), UC Irvine (USA, 2010), Ecole Normale Superieure (France, 2008), Nanyang Technological University (Singapore, 2011), IBM Zurich (Switzerland, 2012), ETH Zurich (Switzerland 2012), Karlsruhe University (Germany, 2012)
著作論文誌
- M. Abe, “Non-Interactive and Optimally Resilient Distributed Multiplication”, IEICE Trans. Fundamentals, Vol. E83-A, No. 4, pp.598-605, April, 2000
- M. Abe, “Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-servers”, IEICE Trans. Fundamentals, Vol. E83-A, No. 7, pp.1431-1440, July, 2000
- M. Abe and T. Okamoto, “A Signature Scheme with Message Recovery as Secure as Discrete Logarithm”, IEICE Trans. Fundamentals, Vol. E84-A, No. 2, pp.197-204, February, 2001
- M. Ohkubo and M. Abe, “A Length-Invariant Hybrid Mix”, IEICE Trans. Fundamentals, Vol. E84-A, No. 4, pp.931-940, April, 2001
- M. Abe and T. Okamoto, “Delegation Chains Secure up to Constant Length”, IEICE Trans. Fundamentals, Vol. E85-A, No. 1, pp.110-116, January, 2002
- M. Abe and M. Kanda, “A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication”, The Computer Journal, Vol. 45, No. 6, pp.661-671, 2002, British Computer Society, 2002
- F. Hoshino, M. Abe and T. Kobayashi, “Lenient/Strict Batch Verification in Several Groups”, IEICE Trans. Fundamentals, Vol. E86-A, No. 1, pp.64-72, January 2003
- M. Abe and K. Suzuki, “M+1-st Auction Using Homomorphic Encryption”, IEICE Trans. Fundamentals, Vol. E86-A, No. 1, pp.136-141, January 2003
- M. Abe, “Combining Encryption and Proof of Knowledge in the Random Oracle Model”, The Computer Journal, Vol. 47, pp.58-70, No. 1, pp.58-70, 2004
- M. Abe, M. Ohkubo and K. Suzuki, “1-out-of-n Signatures from a Variety of Keys”, IEICE Trans. Fundamentals, Vol. E87-A, No. 1, pp.131-140, January 2004
- M. Abe, M. Ohkubo and K. Suzuki, “Efficient Threshold Signer-Ambiguous Signatures from Variety of Keys” IEICE Trans. Fundamentals, Vol. E87-A, No. 2, pp.471-479, February 2004
- K. Chida and M. Abe, “Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext”, IEICE Trans. Fundamentals, Vol. E88-A, No. 1, pp.211-221, January 2005
- M. Abe, H. Imai, “Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions” IEICE Trans. Fundamentals, Vol. E89-A, No. 1, pp.99-105, January 2006
- M. Abe, R. Gennaro, K. Kurosawa, “Tag-KEM/DEM: A New Framework for Hybrid Encryption” Journal of Cryptology, Vol. 21(1), pp.97-130, January 2008.
- M. Ohkubo and M. Abe, “On the Definitions of Anonymity for Ring Signatures”, IEICE Trans. Fundamentals, Vol. E91-A(1), pp.272-282, January 2008.
- M. Abe, Y. Cui, H. Imai, K. Kurosawa, “Tag-KEM from Set Partial Domain One-Way Per- mutations”, IEICE Trans. Fundamentals, Vol.E92-A(1), pp.42-52, January 2009.
- M. Abe, Y. Cui, H. Imai, E. Kiltz, “Efficient Hybrid Encryption from ID-Based Encryption”, Designs, Codes and Cryptography, Vol.54, No.3, pp.205-240, 2010
- M. Abe, E. Kiltz, T. Okamoto, “Chosen Ciphertext Security with Optimal Ciphertext Over- Head”, IEICE Trans. Fundamentals, Vol.E93-A(1), pp.22-33, 2010.
- M. Abe, M. Ohkubo, “A Framework for Universally Composable Non-Committing Blind Signatures”, International Journal of Applied Cryptography, Vol.2 No.3, pp.229-249, 2012, http://dx.doi.org/10.1504/IJACT.2012.045581
- M. Abe, T. Okamoto, K. Suzuki, “Message Recovery Signature Schemes from Sigma-Protocols”, IEICE Trans. Fundamentals, Vol. E96-A, No.1, 2013
- M. Abe, S.M. Chow, K. Haralambiev, M. Ohkubo, “Double-Trapdoor Anonymous Tags for Traceable Signatures”, International Journal of Information Security, 2013, DOI 10.1007/s10207-012-0184-3
査読付き国際会議
- M. Abe and H. Morita, “Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-Key LSI Architecture with Limited Hardware Resources”, In J. Pieprzyk and R.Safavi-Naini editors, Advances in Cryptology ASIACRYPT'94, Volume 917 of Lecture Notes in Computer Science, pages 365-375. Springer-Verlag, 1995.
- M. Abe and E. Fujisaki, “How to Date Blind Signatures”, In K. Kim and T. Matsumoto editors, Advances in Cryptology ASIACRYPT'96, Volume 1163 of Lecture Notes in Computer Science, pages 244-251. Springer-Verlag, 1996.
- S. Miyazaki, M. Abe and K. Sakurai, “Partially Blind Signature Schemes for the DSS and for the Discrete Log based Message Recovery Signature”, JW-ISC'97, 1997.
- M. Abe, “Universally Verifiable Mix-Net with Verification Work Independent of the Number of Mix-Servers”, In K. Nyberg editor, Advances in Cryptology EUROCRYPT'98, Volume 1403 of Lecture Notes in Computer Science, pages 437-447. Springer-Verlag, 1998.
- M. Abe, “Robust Distributed Multiplication without Interaction”, In M. Wiener editor, Advances in Cryptology CRYPTO '99, Volume 1666 of Lecture Notes in Computer Science, pages 130-147, Springer-Verlag, 1999.
- M. Ohkubo, F. Miura, M. Abe, A. Fujioka and T. Okamoto, “An Improvement on a Practical Secret Voting Scheme”, In M. Mambo and Y. Zheng editors, The second international workshop (ISW '99), Volume 1729 of Lecture Notes in Computer Science, pages 255-264, Springer-Verlag,1999.
- M. Abe and T. Okamoto, “Delegation Chains Secure up to Constant Length”, In V. Varadharajan and Y. Mu editors, Information and Communication Security (ICICS'99), Volume 1726 of Lecture Notes in Computer Science, pages 144-156. Springer-Verlag, 1999.
- M. Abe and T. Okamoto, “A Signature Scheme with Message Recovery as Secure as Discrete Logarithm”, In K. Lam, E. Okamoto and C. Xing editors, Advances in Cryptology ASIACRYPT '99, Volume 1716 of Lecture Notes in Computer Science, pages 378-389, Springer-Verlag, 1999.
- M. Abe, “Mix-Networks on Permutation Networks”, In K. Lam, E. Okamoto and C. Xing editors, Advances in Cryptology ASIACRYPT '99, Volume 1716 of Lecture Notes in Computer Science, pages 258-273, Springer-Verlag, 1999.
- M. Abe and M. Kanda “A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication”, In the proceedings of ACISP2000, Volume 1841 of Lecture Notes in Computer Science, pages 163-177, Springer-Verlag, 2000.
- M. Abe and T. Okamoto, “Provably Secure Partially Blind Signatures”, In Bellare editor, Advances in Cryptology CRYPTO 2000, Volume 1880 of Lecture Notes in Computer Science, pages 271-286, Springer-Verlag, 2000.
- M. Ohkubo and M. Abe “A Length-Invariant Hybrid Mix”, In T. Okamoto editor, Advances in Cryptology, ASIACRYPT 2000, Volume 1976 of Lecture Notes in Computer Science, pages178-191, Springer-Verlag, 2000.
- M. Abe and F. Hoshino, “Remarks on Mix-Network Based on Permutation Network”, In K. Kim editor, Public Key Cryptography PKC 2001, Volume 1992 of Lecture Notes in Computer Science, pages 317{324, Springer-Verlag, 2001.
- M. Abe, “A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures”, In B. Pfitzmann editor, Advances in Cryptology EUROCRYPT 2001, Volume 2045 of Lecture Notes in Computer Science, pages 136-151, Springer-Verlag, 2001.
- F. Hoshino, M. Abe, T. Kobayashi, “Lenient/Strict Batch Verification in Several Groups”, In the proceedings of Information Security, 4th International Conference, ISC 2001, Volume 2200 of Lecture Notes in Computer Science, pages 81-94, Springer-Verlag, 2001.
- M. Abe and M. Ohkubo, “Provably Secure Fair Blind Signatures with Tight Revocation”, In C. Boyd editor, Advances in Cryptology ASIACRYPT 2001, Volume 2248 of Lecture Notes in Computer Science, pages 583-602, Springer-Verlag, 2001.
- M. Abe, “Securing “Encryption + Proof of Knowledge” in the Random Oracle Model”, In B. Preneel editor, Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, Volume 2271 of Lecture Notes in Computer Science, pages 277-289, Springer-Verlag, 2002.
- K. Suzuki and M. Abe, “M+1-st Price Auction using Homomorphic Encryption”, In D. Naccacche editor, Proceedings of Public Key Cryptosystems PKC 2002, Volume 2274 of Lecture Notes in Computer Science, pages 115-124. Springer-Verlag, 2002.
- M. Abe, R. Cramer, and S. Fehr, “Non-Interactive Distributed Verifier Proofs and Proving Relations among Commitments”, In Y. Zheng editor, Advances in Cryptology ASIACRYPT 2002, Volume 2501 of Lecture Notes in Computer Science, pages 206-223, Springer-Verlag, 2002.
- M. Abe, M Ohkubo, and K. Suzuki, “1-out-of-n Signatures from a Variety of Keys”, In Y. Zheng editor, Advances in Cryptology ASIACRYPT 2002, Volume 2501 of Lecture Notes in Computer Science, pages 415-432, Springer-Verlag, 2002.
- M. Abe and K. Suzuki, “Receipt-free Sealed-bid Auction”, In A. H. Chan and V. D. Gligor editors, Information Security 5th International Conference, ISC 2002, Volume 2433 of Lecture Notes in Computer Science, pages 191-199, Springer-Verlag, 2002.
- M. Abe and H. Imai, “Flaws in Some Robust Optimistic Mix-Nets”, In R. Safavi-Naini and J. Seberry editors, Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Volume 2727 of Lecture Notes in Computer Science, pages 39-50, Springer-Verlag, 2003.
- M. Abe and S. Fehr, “Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography”, In M. K. Franklin editor, Advances in Cryptology -CRYPTO 2004, Volume 3152 of Lecture Notes in Computer Science, pages 317-334, Springer-Verlag, 2004.
- M. Abe, R. Gennaro, K. Kurosawa, and V. Shoup, “Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM”, In R. Cramer editor, Advances in Cryptology - EUROCRYPT 2005, Volume 3494 of Lecture Notes in Computer Science, pages 128-146, Springer-Verlag, 2005.
- M. Abe, Y. Cui, H. Imai and K. Kurosawa, “Tag-KEM from Set Partial Domain One-Way Permutations”, In L. M. Batten and R. Safavi-Naini editors, Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Volume 4058 of Lecture Notes in Computer Science, pages 360-370, Springer-Verlag, 2006.
- M. Ohkubo and M. Abe, “On the Definition of Anonymity for Ring Signatures”, In the proceedings of Progress in Cryptology - VIETCRYPT 2006, Volume 4341 of Lecture Notes in Computer Science, pages 157-174, Springer-Verlag, 2006.
- M. Abe and S. Fehr, “Perfect NIZK with Adaptive Soundness”, In the Proceedings of Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Volume 4392 of Lecture Notes in Computer Science, pages 118-136, Springer-Verlag, 2007.
- M. Abe, E. Kiltz, and T. Okamoto, “Chosen-Cipertext Security with Optimal Ciphertext Overhead”, In the proceedings of Advances in Cryptology - ASIACRYPT 2008, Volume 5350 of Lecture Notes in Computer Science, pages 355-371, Springer-Verlag, 2008.
- M. Abe, E. Kiltz, and T. Okamoto, “Compact CCA-Secure Encryption for Messages of Arbitrary Length”, In the proceedings of PKC'09, Volume 5443 of Lecture Notes in Computer Science, pages 377-392, Springer-Verlag, 2009.
- M. Abe, M. Ohkubo, “A Framework for Universally Composable Non-Committing Blind Sig- natures”, In the proceedings of ASIACRYPT 2009, LNCS, Springer-Verlag, 2009
- M. Abe, G. Fuschbauer, J. Groth, K. Haralambiev, M. Ohkubo, “Structure-Preserving Signatures and Commitments to Group Elements”, In the proceedings of Advances in Cryptology -CRYPTO 2010, Volume 6223 of Lecture Notes in Computer Science, pages 209-236, Springer-Verlag, 2010.
- M. Abe, K. Haralambiev, M. Ohkubo, “Efficient Message Space Extension for Automorphic Signatures”, In the proceedings of ISC 2010, Volume 6531 of Lecture Notes in Computer Science, pages 319-330, Springer-Verlag, 2011.
- M. Abe, S. S. M. Chow, K. Haralambiev, M. Ohkubo, “Double-Trapdoor Anonymous Tags for Traceable Signatures”, In the proceedings of Applied Cryptography and Network Security -9th International Conference, ACNS 2011, Volume 6715 of Lecture Notes in Computer Science, pages 183-200, Springer-Verlag, 2011.
- M. Abe, J. Groth, K. Haralambiev, M. Ohkubo, “Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups”, In the proceedings of Advances in Cryptology ? CRYPTO 2011, Volume 6841 of Lecture Notes in Computer Science, pages 649-666, Springer-Verlag, 2011.
- M. Abe, J. Groth, M. Ohkubo, “Separating Short Structure-Preserving Signatures from Non-Interactive Assumptions”, In the proceedings of Advances in Cryptology - ASIACRYPT 2011, Volume 7073 of Lecture Notes in Computer Science, pages 628-646, Springer-Verlag, 2011.
- M. Abe, K. Haralambiev, M. Ohkubo, “Group to Group Commitments Do Not Shrink”, In the proceedings of Advances in Cryptology - EUROCRYPT 2012, Volume 7237 of Lecture Notes in Computer Science, pages 301-317, Springer-Verlag, 2012.
- M. Abe, M. Chase, B. David, M. Kohlweiss, R. Nishimaki, M. Ohkubo, “Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions”, In the proceedings of Advances in Cryptology - ASIACRYPT 2012, Volume 7658 of Lecture Notes in Computer Science, pages 4-24, Springer-Verlag, 2012.
- M. Abe, B. David, M. Kohlweiss, R. Nishimaki, M. Ohkubo, “Tagged One-Time Signatures: Optimal Tag Size and Tight Security”, In the proceedings of Public Key Cryptography 2013, Springer-Verlag, 2013
技術報告
- M. Abe and H. Morita, “Hardware-Oriented Modular-Multiplication Method with Quotient Modification”, Technical Report of IEICE, ISEC 94-1, pages 1-9, May 1994.
- M. Aoyama, H. Morita and M. Abe, “PKC/FEAL LSI and its Applications for Information Security”, NTT R&D, pp.923-930, Vol.44 October, 1995
- K. Ohta, M. Abe, E. Fujisaki and H. Moribatake, “Electronic Money Schemes”, NTT R&D, pp.931-938, Vol.44 October, 1995
- H. Moribatake, M. Abe, A. Fujioka and J. Gohara, “Electronic Cash Scheme”, NTT Review, vol.9 No.3 May, 1997
- M. Abe, “Mix-network on Permutation Networks”, Technical report of IEICE, ISEC99-10, May, 1999
- M. Abe, “On Proxy Signatures and Batch Verification”, Technical report of IEICE, ISEC-2, May, 2000
- M. Ookubo and M. Abe, “A Robust Length-Invariant Hybrid Mix”, Technical report of IEICE, ISEC-1, May, 2000
- M. Abe, K. Suzuki, A. Fujioka and M. Ohkubo, F. Hoshino, ”Electronic Voting Schemes”, NTT R&D, Vol. 49, pp.685-693, November, 2000
- M. Abe and S. Fehr, “Adaptively Secure Feldman VSS and Applications to Universally- Composable Threshold Cryptography”, IACR Cryptology ePrint Archive 2004/119
- M. Abe, R. Gennaro and K. Kurosawa, “Tag-KEM/DEM: A New Framework for Hybrid Encryption”, IACR Cryptology ePrint Archive 2005/027.
- M. Abe and S. Fehr, “Perfect NIZK with Adaptive Soundness”, IACR Cryptology ePrint Archive 2006/423
- M. Abe, Y. Cui, H. Imai and E. Kiltz, “Efficient Hybrid Encryption from ID-Based Encryp- tion”, IACR Cryptology ePrint Archive 2007/023
- M. Abe, T. Okamoto, K. Suzuki, “Message Recovery Signature Schemes from Sigma-Protocols”, NTT Technical Review, Vol.6(1), January 2008.
- M. Abe, E. Kiltz and T. Okamoto, “Chosen Ciphertext Security with Optimal Ciphertext Overhead”, IACR Cryptology ePrint Archive 2008/374
- M. Abe, M. Ohkubo, “A Framework for Universally Composable Non-Committing Blind Sig- natures”, IACR Cryptology ePrint Archive 2009/494
- K. Kumojima, M. Yoshida, M. Abe, M. Ohkubo, T. Fujiwara, “Attack Derivation for Cryptographic Assumptions in the Generic Model with a Computer Algebra System”, Technical Report of IEICE, ISEC 2010-58, Nov. 2010
- M. Abe, K. Haralambiev, M. Ohkubo, “Signing on Elements in Bilinear Groups for Modular Protocol Design”, IACR Cryptology ePrint Archive 2010/133.
- M. Abe, M. Chase, B. David, M. Kohlweiss, R. Nishimaki, M. Ohkubo, “Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions”, IACR Cryptology ePrint Archive 2012/285.
シンポジウム・他
- S. Hangai, M. Abe, K. Miyauchi, “On Selecting Parameters for Speaker Recognition”, ISITA, pp.213-216 (1991)
- M. Abe and H. Morita, Key distribution by software, In proceedings of the 1993 IEICE fall conference, A-202. IEICE, Sept. 1993.
- M. Abe, An LSI implementation technics for public-key schemes, In proceedings of the 1994 IEICE fall conference, A-194. IEICE, Sept. 1994.
- M. Abe and H. Morita, An implementation of public key LSI, The 1995 Symposium on Cryptography and Information Security, (SCIS '95), Jan. 1995.
- M. Abe and J. Camenisch, “Partially blind signatures”, In the 1997 Symposium on Cryptography and Information Security (SCIS '97), SCIS97-33D, 1997.
- M. Abe, M. Kanda, “A Key Escrow Scheme for Real-Time Monitoring”, Symposium on Cryptography and Information Security (SCIS '98), 5.2.D, 1998
- M. Abe, “Robust Threshold Cramer-Shoup Cryptosystem”, 1999 Symposium on Cryptography and Information Security (SCIS '99), T1-1.3, 1999, (in Japanese)
- M. Abe, M. Ohkubo, A. Fujioka and F. Hoshino, “An Electronic Voting Scheme with Revocable Threshold Blind Signatures”, Symposium on Cryptography and Information Security (SCIS '2000), B25, 2000
- F. Hoshino and M. Abe, “More efficient Mix-network on Permutation Networks”, 2000 Symposium on Cryptography and Information Security (SCIS '2000), B23, 2000, (in Japanese)
- A. Fujioka, M. Abe, M. Ohkubo and F. Hoshino, “An Implementation and an Experiment of a Practical and Secure Voting Scheme”, 2000 Symposium on Cryptography and Information Security (SCIS '2000), B23, 2000, (in Japanese)
- M. Ohkubo and M. Abe, “On Public-Key Encryption with Signature in Non-Separable Model”, The 2001 Symposium on Cryptography and Information Security (SCIS 2001), B5, Jan. 2001.
- M. Ohkubo, M. Abe, K. Suzuki, S. Tsujii, “Short 1-out-of-n Proofs”, The 2002 Symposium on Cryptography and Information Security (SCIS2002), 4C-4, IEICE, Jan. 2002
- M. Ohkubo, M. Abe, “Security of Three-Move Blind Signature Schemes Reconsidered”, The 2003 Symposium on Cryptography and Information Security (SCIS2003), 13C-4, IEICE, Jan. 2003
- M. Ohkubo, M. Abe, “Similarity between Anonymity in ring Signatures and Security in Public-key Encryption”, The 2007 Symposium on Cryptography and Information Security (SCIS2007), IEICE, Jan. 2007
- M. Ohkubo, M. Abe, “Security of Universally Composable Blind Signatures Revisited”, The 2009 Symposium on Cryptography and Information Security (SCIS2009), IEICE, Jan. 2009
- M. Ohkubo, M. Abe, “An Efficient Signature for a Message in Group”, The 2010 Symposium on Cryptography and Information Security (SCIS2010), IEICE, Jan. 2010
- N. Okamae, M. Yoshida, K. Kumojima, M. Abe, M. Ohkubo, T. Fujiwara, “Automated Attack Derivation for Cryptographic Problems on Bilinear Groups”, The 2011 Symposium on Cryptography and Information Security (SCIS2011), IEICE, Jan. 2011
- M. Abe, M. Ohkubo, T. Mehdi, “Impossibility of Symmetric Structure-Preserving Signatures with Single Verification Equation”, The 2013 Symposium on Cryptography and Information Security (SCIS2013), IEICE, Jan. 2013