Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (6): 1346-1355 (2011)Atomos: Constant-Size Path Validation Proof., , , , , and . IEEE Trans. Inf. Forensics Secur., (2020)A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles., , , and . J. Inf. Process., 22 (2): 366-375 (2014)Spending Offline Divisible Coins with Combining Capability., , , and . INDOCRYPT, volume 2551 of Lecture Notes in Computer Science, page 339-353. Springer, (2002)A structured aggregate signature scheme., , and . ISITA, page 795-800. IEEE, (2010)Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points., , and . UCNC, volume 9252 of Lecture Notes in Computer Science, page 215-226. Springer, (2015)A Note on the Relationships among Certified Discrete Log Cryptosystems., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (5): 1198-1202 (2003)Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input and Protocols., , , , and . CANS, volume 14342 of Lecture Notes in Computer Science, page 211-231. Springer, (2023)