Published papers
Number of published data : 77
No. Classification Refereed paper Title Authorship Author Journal Volume/issue/page Publication date ISSN DOI URL
1 Paper
Yes
Key-Updatable Public-Key Encryption with Keyword Search (Or: How to Realize PEKS with Efficient Key Updates for IoT Environments)
Joint
H. Anada, A. Kanaoka, N. Matsuzaki, and Y. Watanabe
International Journal of Information Security
19, 15-38
2020



2 Paper
Yes
Identity-based Encryption with Hierarchical Key-insulation in the Standard Model
Joint
J. Shikata and Y. Watanabe
Designs, Codes and Cryptography
87/ 5, 1005-1033
2019



3 Paper
Yes
Multi-Party Computation for Modular Exponentiation based on Replicated Secret Sharing
Joint
K. Ohara, Y. Watanabe, M. Iwamoto, and K. Ohta
IEICE Transaction
102-A/ 9, 1079-1090
2019



4 Paper
Yes
Timed-Release Computational Secret Sharing and Threshold Encryption
Joint
Y. Watanabe and J. Shikata
Designs, Codes and Cryptography
86/ 1, 17-54
2018



5 Paper
Yes
Implementation and Analysis of Fully Homomorphic Encryption in Resource-Constrained Devices
Joint
A. Prasitsupparote, Y. Watanabe, J. Sakamoto, J. Shikata, and T. Matsumoto
International Journal of Digital Information and Wireless Communications
8/ 4, 288-303
2018



6 Paper
Yes
CCA-secure Revocable Identity-based Encryption Schemes with Decryption Key Exposure Resistance
Joint
Y. Ishida, J. Shikata, and Y. Watanabe
International Journal of Applied Cryptography (IJACT)
3/ 3, 288-311
2017



7 Paper
Yes
Unconditionally Secure Broadcast Encryption Schemes with Trade-offs between Communication and Storage
Joint
Y. Watanabe and J. Shikata
IEICE Transactions
99-A/ 6, 1097-1106
2016



8 Paper
Yes
Information-Theoretically Secure Timed-Release Secret Sharing Schemes
Joint
Y. Watanabe and J. Shikata
Journal of Information Processing
24/ 4, 680-689
2016



9 Paper
Yes
Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys
Joint
N. Takei, Y. Watanabe, and J. Shikata
Josai Mathematical Monograph
8, 115-133
2015



10 Paper
Yes
Information-Theoretically Secure Anonymous Group Authentication with Arbitration: Formal Definition and Construction
Joint
T. Seito, Y. Watanabe, K. Kinose, and J. Shikata
Josai Mathematical Monograph
7, 85-110
2014



11 Invited paper
No
国際会議参加報告: 4th Heidelberg Laureate Forum
Only
渡邉洋平
Fundamentals Review
10/ 3, 220-221
2017



12 International conference proceedings, etc.
No
フォワード安全かつ検索時通信量が最適な動的検索可能暗号
Only
渡邉洋平
SCIS 2020 予稿集
3B3-2-
2020



13 International conference proceedings, etc.
No
探索問題の困難性に基づく効率的なしきい値公開鍵暗号の構成
Joint
海老名将宏, 渡邉洋平, 四方順司
SCIS 2019 予稿集
2A4-4-
2019



14 International conference proceedings, etc.
No
より効率的で適応的に安全な鍵失効機能付きIDベース暗号の構成
Joint
高安敦, 渡邉洋平, 江村恵太
SCIS 2019 予稿集
2A3-2-
2019



15 International conference proceedings, etc.
No
鍵生成センタに対して安全なIDベース暗号
Joint
江村恵太, 勝又秀一, 渡邉洋平
SCIS 2019 予稿集
2A3-1-
2019



16 International conference proceedings, etc.
No
効率的でフォワード安全な動的検索可能暗号
Joint
渡邉洋平, 岩本貢, 太田和夫
SCIS 2019 予稿集
3C1-3-
2019



17 International conference proceedings, etc.
No
(強) フォワード安全な動的検索可能暗号の効率的な構成
Joint
渡邉洋平, 大原一真, 岩本貢, 太田和夫
CSS 2019 予稿集
1203-1210
2019



18 International conference proceedings, etc.
Yes
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from Lattices
Joint
K. Emura, S. Katsumata, and Y. Watanabe
Proc. of ESORICS 2019
11736, 113-133
2019



19 International conference proceedings, etc.
No
鍵更新機能付き検索可能暗号の一般的構成
Joint
松崎なつめ, 穴田啓晃,金岡晃,渡邉洋平
SCIS 2018 予稿集
4A2-6-
2018



20 International conference proceedings, etc.
No
ダミーエントリの作成方法に着目した共通鍵検索可能暗号CGKO方式の改良
Joint
野島拓也, 渡邉洋平, 岩本貢, 太田和夫
SCIS 2018 予稿集
3C2-2-
2018



21 International conference proceedings, etc.
No
ロバスト秘密分散法CFOR方式における精密な安全性解析
Joint
鈴木慎之介, 渡邉洋平, 岩本貢, 太田和夫
SCIS 2018 予稿集
2A3-3-
2018



22 International conference proceedings, etc.
No
カードを用いた複数人でのマッチングプロトコル
Joint
古賀優太, 鈴木慎之介, 渡邉洋平, 岩本貢, 太田和夫
SCIS 2018 予稿集
3B1-5-
2018



23 International conference proceedings, etc.
No
3枚のカードで実現可能な3 入力多数決プロトコル
Joint
黒木慶久, 古賀優太, 渡邉洋平, 岩本貢, 太田和夫
SCIS 2018 予稿集
3B1-4-
2018



24 International conference proceedings, etc.
No
SXDH仮定に基づく短いパラメータ長を達成する放送型暗号
Only
渡邉洋平
SCIS 2018 予稿集
3A3-3-
2018



25 International conference proceedings, etc.
No
現実的な結託者のもとで最もシェア長の短いロバスト秘密分散法
Joint
渡邉洋平, 大原一真, 岩本貢, 太田和夫
ISEC研究会技報
1-8
2018



26 International conference proceedings, etc.
No
鍵更新機能付き検索可能暗号:効率化に向けた一工夫
Joint
松崎なつめ, 穴田啓晃, 金岡晃, 渡邉洋平
CSS 2018 予稿集
814-821
2018



27 International conference proceedings, etc.
No
CBDH仮定に基づく効率的な閾値公開鍵暗号
Joint
海老名将宏, 渡邉洋平, 四方順司
CSS 2018 予稿集
746-753
2018



28 International conference proceedings, etc.
Yes
Key-updatable Public-key Encryption with Keyword Search: Models and Generic Constructions
Joint
H. Anada, A. Kanaoka, N. Matsuzaki, and Y. Watanabe
Proc. of ACISP 2018
10946, 341-359
2018



29 International conference proceedings, etc.
Yes
Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
Joint
Y. Watanabe, Y. Kuroki, S. Suzuki, Y. Koga, M. Iwamoto, and K. Ohta
Proc. of ISITA 2018
218-222
2018



30 International conference proceedings, etc.
Yes
Implementation and Analysis of Fully Homomorphic Encryption in Wearable Devices
Joint
A. Prasitsupparote, Y. Watanabe, and J. Shikata
Proc. of ISDF 2018
1-14
2018



31 International conference proceedings, etc.
No
推測秘匿性に基づく情報理論的に安全な検索可能暗号
Joint
吉澤貴博, 渡邉洋平, 四方順司
SCIS 2017 予稿集
1D1-1-
2017



32 International conference proceedings, etc.
No
3ラウンド対話型Signcryptionの効率的な構成法
Joint
井田潤一, 渡邉洋平, 四方順司
SCIS 2017 予稿集
3F3-3-
2017



33 International conference proceedings, etc.
No
秘密分散型放送暗号
Joint
岩本貢, 渡邉洋平
SCIS 2017 予稿集
4F2-2-
2017



34 International conference proceedings, etc.
No
放送型暗号における動的かつ効率的な復号権限変更
Only
渡邉洋平
SCIS 2017 予稿集
4F2-1-
2017



35 International conference proceedings, etc.
No
鍵更新可能な検索可能暗号の一提案~検索可能代理人再暗号化の適用について~
Joint
松崎なつめ, 穴田啓晃, 渡邉洋平
ISEC研究会技報
1-6
2017



36 International conference proceedings, etc.
No
鍵更新機能付き検索可能暗号:公開鍵更新モデルによる実現
Joint
松崎なつめ, 穴田啓晃, 渡邉洋平
CSS 2017 予稿集
734-740
2017



37 International conference proceedings, etc.
No
鍵更新機能付き検索可能暗号:鍵隔離モデルによる実現
Joint
渡邉洋平, 穴田啓晃, 松崎なつめ
CSS 2017 予稿集
741-748
2017



38 International conference proceedings, etc.
Yes
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters
Joint
Y. Watanabe, K. Emura, and J.H. Seo
Proc. of CT-RSA 2017
10159, 432-449
2017



39 International conference proceedings, etc.
Yes
Unconditionally Secure Searchable Encryption
Joint
T. Yoshizawa, Y. Watanabe, and J. Shikata
Proc. of CISS 2017
1-6
2017



40 International conference proceedings, etc.
Yes
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance
Joint
A. Takayasu and Y. Watanabe
Proc. of ACISP 2017
10342/ 1, 184-204
2017



41 International conference proceedings, etc.
Yes
Broadcast Encryption with Guessing Secrecy
Only
Y. Watanabe
Proc. of ICITS 2017
10681, 39-57
2017



42 International conference proceedings, etc.
No
情報理論的安全性を持つ検索可能暗号の一般的モデルとその構成法
Joint
吉澤貴博, 渡邉洋平, 四方順司
SCIS 2016 予稿集
2C2-1-
2016



43 International conference proceedings, etc.
No
多人数モデルにおける対話型Signcryptionの安全性概念と構成法
Joint
井田潤一, 渡邉洋平, 四方順司
SCIS 2016 予稿集
2C3-3-
2016



44 International conference proceedings, etc.
No
スタンダードモデルにおけるIDベース階層型鍵隔離暗号の構成法
Joint
渡邉洋平, 四方順司
SCIS 2016 予稿集
2E3-2-
2016



45 International conference proceedings, etc.
No
情報理論的に安全な検索可能暗号の構成法について
Joint
吉澤貴博, 渡邉洋平, 四方順司
CSS 2016 予稿集
556-563
2016



46 International conference proceedings, etc.
No
素数位数群における効率的な鍵失効機能付きIDベース暗号の構成法
Joint
渡邉洋平, 江村恵太
CSS 2016 予稿集
324-331
2016



47 International conference proceedings, etc.
Yes
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Joint
Y. Watanabe and J. Shikata
Proc. of PKC 2016
9614/ 1, 255-279
2016



48 International conference proceedings, etc.
Yes
Sequential Aggregate Authentication Codes with Information Theoretic Security
Joint
S. Tomita, Y. Watanabe, and J. Shikata
Proc. of CISS 2016
192-197
2016



49 International conference proceedings, etc.
Yes
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness
Joint
Y. Watanabe, G. Hanaoka, J. Shikata
Proc. of ICITS 2016
10015, 213-237
2016



50 International conference proceedings, etc.
No
情報理論的に安全な順序検証型多重認証方式
Joint
富田信一朗, 渡邉洋平, 四方順司
SCIS 2015 予稿集
2D1-3-
2015



51 International conference proceedings, etc.
No
Canetti-Halevi-Katz変換による代理人再暗号化方式の一般的構成法
Joint
河西真瑠那, 清藤武暢, 渡邉洋平, 四方順司
SCIS 2015 予稿集
2F2-3-
2015



52 International conference proceedings, etc.
No
CCA安全かつ暗号文長が短い鍵失効機能付きIDベース暗号の構成法
Joint
石田優, 渡邉洋平, 四方順司
SCIS 2015 予稿集
2D3-4-
2015



53 International conference proceedings, etc.
No
暗号文の耐改変性と復号権限の変更機能をもつ情報理論的に安全な放送型暗号
Joint
渡邉洋平, 花岡悟一郎, 四方順司
SCIS 2015 予稿集
2D1-1-
2015



54 International conference proceedings, etc.
No
情報理論的に安全な検索可能暗号
Joint
吉澤貴博, 渡邉洋平, 四方順司
CSS 2015 予稿集
1321-1326
2015



55 International conference proceedings, etc.
No
対話型署名機能付き暗号化方式
Joint
井田潤一, 渡邉洋平, 四方順司
CSS 2015 予稿集
600-607
2015



56 International conference proceedings, etc.
No
暗号文長と秘密鍵長間のトレードオフをもつ情報理論的に安全な放送型暗号の構成法
Joint
渡邉洋平, 四方順司
CSS 2015 予稿集
395-402
2015



57 International conference proceedings, etc.
Yes
Constructions of CCA-secure Revocable Identity-based Encryption
Joint
Y. Ishida, Y. Watanabe, and J. Shikata
Proc. of ACISP 2015
9144, 174-191
2015



58 International conference proceedings, etc.
Yes
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
Joint
K. Emura, L. T. Phong, and Y. Watanabe
Proc. of TrustCom 2015
1, 167-174
2015



59 International conference proceedings, etc.
Yes
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-offs between Communication and Storage
Joint
Y. Watanabe and J. Shikata
Proc. of ProvSec 2015
9451, 489-502
2015



60 International conference proceedings, etc.
No
計算量的に安全なタイムリリース秘密分散法
Joint
渡邉洋平, 四方順司
SCIS 2014 予稿集
3F1-5-
2014



61 International conference proceedings, etc.
No
選択暗号文攻撃に対して安全な鍵失効機能付きIDベース暗号
Joint
石田優, 渡邉洋平, 四方順司
CSS 2014 予稿集
292-299
2014



62 International conference proceedings, etc.
No
受信者集合を変更可能な情報理論的安全性に基づく放送型暗号
Joint
渡邉洋平, 四方順司
CSS 2014 予稿集
920-927
2014



63 International conference proceedings, etc.
Yes
Timed-Release Computational Secret Sharing Scheme and Its Applications
Joint
Y. Watanabe and J. Shikata
Proc. of ProvSec 2014
8782, 326-333
2014



64 International conference proceedings, etc.
Yes
Timed-Release Secret Sharing Schemes with Information Theoretic Security
Joint
Y. Watanabe and J. Shikata
Proc. of BalkanCryptSec 2014
9024, 219-236
2014



65 International conference proceedings, etc.
No
検証者の秘密鍵を必要としない情報理論的に安全なブラインド認証方式
Joint
武井教泰, 渡邉洋平, 四方順司
CSS 2013 予稿集
526-533
2013



66 International conference proceedings, etc.
No
情報理論的に安全なタイムリリース秘密分散法
Joint
渡邉洋平, 四方順司
CSS 2013 予稿集
443-450
2013



67 International conference proceedings, etc.
Yes
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions
Joint
A. Kubai, J. Shikata, and Y. Watanabe
Proc. of CD-ARES Workshops, MoCRySEn 2013
8128, 16-28
2013



68 International conference proceedings, etc.
Yes
Unconditionally Secure Anonymous Group Authentication with an Arbiter
Joint
T. Seito, Y. Watanabe, K. Kinose, and J. Shikata
Proc. of 3rd ISEEE
291-296
2013



69 International conference proceedings, etc.
Yes
Unconditionally Secure Blind Authentication Codes in the Manual Channel Model
Joint
N. Takei, Y. Watanabe, and J. Shikata
Proc. of 3rd ISEEE
297-302
2013



70 International conference proceedings, etc.
Yes
Information-Theoretically Secure Entity Authentication in the Multi-user Setting
Joint
S. Hajime, Y. Watanabe, and J. Shikata
Proc. of ICISC 2013
8565, 400-417
2013



71 International conference proceedings, etc.
No
情報理論的に安全なKey-Insulated Key-AgreementとTimed-Release Key-Agreementの関係性について
Joint
清藤武暢, 渡邉洋平, 四方順司
SCIS 2012 予稿集
4B2-1-
2012



72 International conference proceedings, etc.
No
情報理論的に安全なタイムリリース鍵共有方式のアプリケーションについて
Joint
渡邉洋平, 清藤武暢, 四方順司
SCIS 2012 予稿集
4B2-2-
2012



73 International conference proceedings, etc.
No
グループにおける情報理論的に安全な相手認証方式
Joint
一将吾, 渡邉洋平, 四方順司
CSS 2012 予稿集
595-600
2012



74 International conference proceedings, etc.
No
情報理論的に安全なタイムリリース暗号化方式及びメッセージ認証方式の下界について
Joint
渡邉洋平, 清藤武暢, 四方順司
CSS 2012 予稿集
601-608
2012



75 International conference proceedings, etc.
Yes
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption and Authentication Codes
Joint
Y. Watanabe, T. Seito and J. Shikata
Proc. of ICISTS 2012
7412, 167-186
2012



76 International conference proceedings, etc.
No
時刻情報で制御する情報理論的に安全な鍵共有方式
Joint
渡邉洋平, 清藤武暢, 四方順司
CSS 2011 予稿集
738-743
2011



77 Tutorial
No
情報理論的暗号技術について
Joint
四方順司, 渡邉洋平
情報処理
55/ 3, 260-267
2014