Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperJune 2024
Development of Data-driven Persona Including User Behavior and Pain Point through Clustering with User Log of B2B Software
- Rie Sera,
- Hironori Washizaki,
- Junyan Chen,
- Yoshiaki Fukazawa,
- Masahiro Taga,
- Kazuyuki Nakagawa,
- Yusuke Sakai,
- Kiyoshi Honda
CHASE '24: Proceedings of the 2024 IEEE/ACM 17th International Conference on Cooperative and Human Aspects of Software EngineeringPages 85–90https://doi.org/10.1145/3641822.3641870Persona --- fictional user profiles --- are used to identify user requirements in software engineering. However, methods targeting revisions, especially for existing B2B services, remain sparse. This paper proposes a method that integrates several models,...
- ArticleMarch 2024
Privacy-Preserving Verifiable CNNs
- Nuttapong Attrapadung,
- Goichiro Hanaoaka,
- Ryo Hiromasa,
- Yoshihiro Koseki,
- Takahiro Matsuda,
- Yutaro Nishida,
- Yusuke Sakai,
- Jacob C. N. Schuldt,
- Satoshi Yasuda
AbstractConvolutional neural networks (CNNs) have emerged as one of the most successful deep learning approaches to image recognition and classification. A recent line of research, which includes zkCNN (ACM CCS ’21), vCNN (Cryptology ePrint Archive), and ...
- ArticleDecember 2023
- posterOctober 2023
Sacriface: A Simple and Versatile Support Structure for 3D Printing
UIST '23 Adjunct: Adjunct Proceedings of the 36th Annual ACM Symposium on User Interface Software and TechnologyArticle No.: 9, Pages 1–3https://doi.org/10.1145/3586182.3616649Digital fabrication serves as a potent instrument for facilitating interaction between the real and digital realms. However, the process is becoming increasingly complex amidst its development. We present Sacriface, a simple and versatile support ...
- ArticleDecember 2023
Signature for Objects: Formalizing How to Authenticate Physical Data and More
- Ryuya Hayashi,
- Taiki Asano,
- Junichiro Hayata,
- Takahiro Matsuda,
- Shota Yamada,
- Shuichi Katsumata,
- Yusuke Sakai,
- Tadanori Teruya,
- Jacob C. N. Schuldt,
- Nuttapong Attrapadung,
- Goichiro Hanaoka,
- Kanta Matsuura,
- Tsutomu Matsumoto
AbstractWhile the integrity of digital data can be ensured via digital signatures, ensuring the integrity of physical data, i.e., objects, is a more challenging task. For example, constructing a digital signature on data extracted from an object does not ...
-
- ArticleSeptember 2022
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality
- Ryu Ishii,
- Kyosuke Yamashita,
- Zihao Song,
- Yusuke Sakai,
- Tadanori Teruya,
- Goichiro Hanaoka,
- Kanta Matsuura,
- Tsutomu Matsumoto
Attacks and Defenses for the Internet-of-ThingsPages 51–71https://doi.org/10.1007/978-3-031-21311-3_3AbstractFault-tolerant aggregate signature (FT-AS) is a special type of aggregate signature that is equipped with the functionality for tracing signers who generated invalid signatures in the case an aggregate signature is detected as invalid. In existing ...
- ArticleSeptember 2022
Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic Proofs
AbstractAttribute-based signatures allow fine-grained attribute-based authentication and at the same time keep a signer’s privacy as much as possible. While there are constructions of attribute-based signatures allowing arbitrary circuits or Turing ...
- ArticleJune 2021
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures
- Ryu Ishii,
- Kyosuke Yamashita,
- Yusuke Sakai,
- Takahiro Matsuda,
- Tadanori Teruya,
- Goichiro Hanaoka,
- Kanta Matsuura,
- Tsutomu Matsumoto
Applied Cryptography and Network Security WorkshopsPages 378–396https://doi.org/10.1007/978-3-030-81645-2_22AbstractAggregate signature schemes enable us to aggregate multiple signatures into a single short signature. One of its typical applications is sensor networks, where a large number of users and devices measure their environments, create signatures to ...
- ArticleNovember 2020
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers
AbstractMost aggregate signature schemes are relying on pairings, but high computational and storage costs of pairings limit the feasibility of those schemes in practice. Zhao proposed the first pairing-free aggregate signature scheme (AsiaCCS 2019). ...
- ArticleSeptember 2020
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
AbstractIn this paper we point out an overlooked subtlety in providing proper security definitions of anonymous identity-based encryption (anonymous IBE) and its applications such as searchable encryption. Namely, we find that until now there is no ...
- Work in ProgressSeptember 2019
Effects on user perception of a 'modified' speed experience through in-vehicle virtual reality
AutomotiveUI '19: Proceedings of the 11th International Conference on Automotive User Interfaces and Interactive Vehicular Applications: Adjunct ProceedingsPages 166–170https://doi.org/10.1145/3349263.3351335In order to make the experience of traveling in automated vehicles more enjoyable, Virtual Reality (VR) experiences based on the real-world journey have been proposed. Presenting users with VR content synched to the car's actual movement decreases the ...
- ArticleAugust 2019
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions
Advances in Information and Computer SecurityPages 253–272https://doi.org/10.1007/978-3-030-26834-3_15AbstractReplayable chosen ciphertext (RCCA) security was introduced by Canetti, Krawczyk, and Nielsen (CRYPTO 03) in order to handle an encryption scheme that is “non-malleable except tampering which preserves the plaintext”. RCCA security is a relaxation ...
- ArticleJuly 2019
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation
- Ryo Kikuchi,
- Nuttapong Attrapadung,
- Koki Hamada,
- Dai Ikarashi,
- Ai Ishida,
- Takahiro Matsuda,
- Yusuke Sakai,
- Jacob C. N. Schuldt
AbstractSecure computation enables participating parties to jointly compute a function over their inputs while keeping them private. Secret sharing plays an important role for maintaining privacy during the computation. In most schemes, secret sharing ...
- research-articleJuly 2019
Recent Advances in Attribute-Based Signatures
APKC '19: Proceedings of the 6th on ASIA Public-Key Cryptography WorkshopPage 1https://doi.org/10.1145/3327958.3329545Attribute-based signatures are an advanced signature primitive that allows a signer to prove the possession of attributes with minimum level of disclosure of his privacy. In particular, by issuing a signature, the singer can prove the possession of a ...
- research-articleJuly 2019
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2
Asia CCS '19: Proceedings of the 2019 ACM Asia Conference on Computer and Communications SecurityPages 515–528https://doi.org/10.1145/3321705.3329824In ISO/IEC 20008-2, several anonymous digital signature schemes are specified. Among these, the scheme denoted as Mechanism 6, is the only plain group signature scheme that does not aim at providing additional functionalities. The Intel Enhanced Privacy ...
- research-articleJanuary 2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions
- David Megias,
- Yusuke Sakai,
- Takahiro Matsuda,
- Kazuma Ohara,
- Keita Emura,
- Kazumasa Omote,
- Yutaka Kawai,
- Goichiro Hanaoka
This paper introduces a new capability for group signatures called message-dependent opening. It is intended to weaken the high trust placed on the opener; i.e., no anonymity against the opener is provided by an ordinary group signature scheme. In a ...
- ArticleDecember 2018
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions
AbstractAttribute-based signature (ABS) schemes are advanced signature schemes that simultaneously provide fine-grained authentication while protecting privacy of the signer. Previously known expressive ABS schemes support either the class of ...
- research-articleNovember 2018
SecretSign: A Method of Finding an Off-Line Target Object without Revealing the Target to Observers
2018 21st International Conference on Intelligent Transportation Systems (ITSC)Pages 3651–3656https://doi.org/10.1109/ITSC.2018.8569518In this paper we propose an interactive system that allows only the owner of a target object to secretly find it among other similar or identical objects, which we call SecretSign. Finding a personal object, e.g., an assigned vehicle in a car-sharing ...
- research-articleOctober 2018
A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening
2018 International Symposium on Information Theory and Its Applications (ISITA)Pages 703–706https://doi.org/10.23919/ISITA.2018.8664373Identity-based encryption with non-interactive opening is an extension of identity-based encryption which allows a receiver to prove a given ciphertext will be decrypted to a public message without revealing his decryption key. Fan et al. (J. Shanghai ...
- research-articleOctober 2018
A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO
2018 International Symposium on Information Theory and Its Applications (ISITA)Pages 85–89https://doi.org/10.23919/ISITA.2018.8664347Emura et al. [Int. J. Inf. Sec. 2014] showed that a public key encryption scheme with non-interactive opening (PKENO scheme) can be constructed from a group signature scheme secure in the dynamic setting. By following this construction, it seems that we ...