NISHIDE Takashi

J-GLOBAL         Last updated: Nov 5, 2019 at 23:24
 
Avatar
Name
NISHIDE Takashi
URL
http://www.cipher.risk.tsukuba.ac.jp/~nishide/index.html
Affiliation
University of Tsukuba
Section
Faculty of Engineering, Information and Systems
Job title
Associate Professor
Degree
Dr.Eng.(the University of Electro-Communications)

Research Areas

 
 

Published Papers

 
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption
Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto
ProvSec Workshop, Journal of Internet Services and Information Security (JISIS)   8(4) 37-56   Oct 2018   [Refereed]
Outsourced Private Function Evaluation with Privacy Policy Enforcement
Noboru Kunihiro, Wen-jie Lu, Takashi Nishide, Jun Sakuma
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)   IEEE 412-423   Aug 2018   [Refereed]
Provably Secure Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E100--A(12) 2991-3006   Dec 2017   [Refereed]
Identity-Based Key-Insulated Aggregate Signatures, Revisited
Nobuaki Kitajima, Naoto Yanai, Takashi Nishide
Inscrypt   LNCS 10726, Springer, 141-156   Nov 2017   [Refereed]
Card-Based Protocols Using Regular Polygon Cards
Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E100--A(9) 1900-1909   Sep 2017   [Refereed]
Improved proxy re-encryption scheme for symmetric key cryptography
Kouichi Sakurai, Takashi Nishide, Syalim Amril
International Workshop on Big Data and Information Security (IWBIS)   IEEE 105-111   Sep 2017   [Refereed]
Network Intrusion Detection based on Semi-Supervised Variational Auto-Encoder
Genki Osada, Kazumasa Omote, Takashi Nishide
ESORICS   LNCS 10493, Springer, 344-361   Sep 2017   [Refereed]
One-time Programs with Cloud Storage and Its Application to Electronic Money
Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide, Eiji Okamoto
ASIA Public-Key Cryptography (APKC)   ACM 25-30   Apr 2017   [Refereed]
APAT: BGPSEC におけるアグリゲート署名の導入
58(2) 544-556   Feb 2017   [Refereed]
A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
International Journal of Applied Cryptography   3(4) 394-406   2017   [Refereed]
Revocable Decentralized Multi-Authority Functional Encryption
Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, Kwangjo Kim
Indocrypt   LNCS 10095, Springer, 248-265   Dec 2016   [Refereed]
Size-Hiding Computation for Multiple Parties
Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
Asiacrypt   LNCS 10032, Springer 937-966   Dec 2016   [Refereed]
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs
Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto
International Conference on Trustworthy Systems (Intrust)   LNCS 9565, Springer 32-48   Dec 2016   [Refereed]
Committed AND Protocol Using Three Cards with More Handy Shuffle
Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
International Symposium on Information Theory and its Application (ISITA)   IEEE 700-702   Nov 2016   [Refereed]
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability
Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto
Journal of Information Processing, Information Processing Society of Japan   24(5) 764-771   Sep 2016   [Refereed]
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards
Fangming Zhao, Takashi Nishide
International Conference on Network and System Security (NSS)   LNCS 9955, Springer 266-282   Sep 2016   [Refereed]
Secure Computation Protocols Using Polarizing Cards
Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E99--A(6) 1122-1131   Jun 2016   [Refereed]
Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions
Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
Journal of Information Processing, Information Processing Society of Japan   24(2) 275-291   Mar 2016   [Refereed]
Character-based Symmetric Searchable Encryption and Its Implementation and Experiment on Mobile Devices
Takanori Suga, Takashi Nishide, Kouichi Sakurai
Wiley Security and Communication Networks   9(12) 1717-1725   2016   [Refereed]
Secure (M+1)st-Price Auction with Automatic Tie-Break
Takashi Nishide, Mitsugu Iwamoto, Atsushi Iwasaki, Kazuo Ohta
International Conference on Trustworthy Systems (Intrust)   LNCS 9473, Springer 422-437   Dec 2015   [Refereed]
Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards
Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
Provable Security (ProvSec)   LNCS 9451, Springer 127-146   Nov 2015   [Refereed]
Software Implementation of a Pairing Function for Public Key Cryptosystems
Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, Eiji Okamoto
International Conference on IT Convergence and Security (ICITCS)   IEEE 1-5   Aug 2015   [Refereed]
Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability
Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, Eiji Okamoto
International Conference on IT Convergence and Security (ICITCS)   IEEE 1-4   Aug 2015   [Refereed]
Secure Multi-Party Computation Using Polarizing Cards
Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
International Workshop on Security (IWSEC)   LNCS 9241, Springer, 281-297   Aug 2015   [Refereed]
Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack
Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, Eiji Okamoto
International Conference on Security and Cryptography (SECRYPT)   SciTePress 39-52   Jul 2015   [Refereed]
Constructions of Fail-Stop Signatures for Multi-signer Setting
Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
Asia Joint Conference on Information Security (AsiaJCIS)   IEEE 112-123   May 2015   [Refereed]
A Short Fail-Stop Signature Scheme from Factoring
Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
Provable Security (ProvSec)   LNCS 8782, Springer 309-316   Oct 2014   [Refereed]
部分的に小さな法を用いたマルチパーティ計算のビット演算効率化
加藤遼,西出隆志,吉浦裕
55(9) 1971-1991   Sep 2014   [Refereed]
A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures
Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)   IEEE 565-574   Sep 2014   [Refereed]
Anonymous Encryption with Partial-order Subset Delegation and Its Application in Privacy Email Systems
Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi
IET Information Security   8(4) 240-249   Jul 2014   [Refereed]
Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus
Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai
Asia Public-Key Cryptography (AsiaPKC)   ACM 33-38   May 2013   [Refereed]
Supporting Secure Provenance Update by Keeping Provenance of the Provenance
Amril Syalim, Takashi Nishide, Kouichi Sakurai
Information and Communicatiaon Technology - International Conference (ICT-EurAsia)   LNCS 7804, Springer 363-372   Mar 2013   [Refereed]
Efficient Implementation for QUAD Stream Cipher with GPUs
Satoshi Tanaka, Takashi Nishide, Kouichi Sakurai
Computer Science and Information Systems Journal (ComSIS)   10(2) 897-911   2013   [Refereed]
Analysis of Methods for Detecting Compromised Nodes and Its Countermeasures
Fangming Zhao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai
International Conference on IT Convergence and Security (ICITCS’12)   LNEE 215, Springer 53-60   2013   [Refereed]
Batch Logical Protocols for Efficient Multi-party Computation
Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, Hiroshi Yoshiura
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E95--A(10) 1718-1728   Oct 2012   [Refereed]
Weakness of Provably Secure Searchable Encryption Against Frequency Analysis
Takanori Suga, Takashi Nishide, Kouichi Sakurai
Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA)   ISSN: 2227-331X 142-147   Oct 2012   [Refereed]
Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs
Ruan Na, Takashi Nishide, Yoshiaki Hori
Journal of Information Processing, Information Processing Society of Japan   20(4) 846-853   2012   [Refereed]
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation
Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, Hiroshi Yoshiura
Journal of Information Processing, Information Processing Society of Japan   20(4) 861-870   2012   [Refereed]
Securing Provenance of Distributed Processes in an Untrusted Environment
Amril Syalim, Takashi Nishide, Kouichi Sakurai
IEICE Transactions on Information and Systems   E95--D(7) 1894-1907   2012   [Refereed]
Security Analysis of Offline E-Cash Systems with Malicious Insider
Takashi Nishide, Shingo Miyazaki, Kouichi Sakurai
Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA)   3(1) 55-71   2012   [Refereed]
Secure Keyword Search Using Bloom Filter with Specified Character Positions
Takanori Suga, Takashi Nishide, and Kouichi Sakurai
6th International Conference on Provable Security (ProvSec)   LNCS 7496, Springer, 235-252   2012   [Refereed]
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs
Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai
6th International Workshop on Advances in Information Security (WAIS)   660-664   2012   [Refereed]
A Method for Embedding Secret Key Information in RSA Public Key and Its Application
Motoki Kitahara, Takashi Nishide, and Kouichi Sakurai
6th International Workshop on Advances in Information Security (WAIS)   665-670   2012   [Refereed]
Differential Fault Analysis of Full LBlock
Liang Zhao, Takashi Nishide, and Kouichi Sakurai
3rd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE’12)   LNCS 7275, Springer, 135-150   2012   [Refereed]
Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai
14th Annual International Conference on Information Security and Cryptology (ICISC’11)   LNCS 7259, Springer, 406-418   2012   [Refereed]
Batching Multiple Protocols to Improve Efficiency of Multi-party Computation
Naoto Kiribuchi, Ryo Kato, Takashi Nishide, and Hiroshi Yoshiura
7th International Conference on Information Security and Cryptology (Inscrypt’11)   LNCS 7537, Springer, 289-308   2012   [Refereed]
Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model
Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai
7th International Conference on Information Security and Cryptology (Inscrypt’11)   LNCS 7537, Springer, 341-362   2012   [Refereed]
Fast Implementation and Experimentation of Multivariate Cryptosystems on GPU
Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai
6th Joint Workshop on Information Security (JWIS)      2011   [Refereed]
Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited
Takashi Nishide, and Kouichi Sakurai
3rd International Workshop on Managing Insider Security Threats (MIST)   IEEE Computer Society, 656-661   2011   [Refereed]
Towards Countermeasure Against Insider Threat on Network Security
Yoshiaki Hori, Takashi Nishide, and Kouichi Sakurai
3rd International Workshop on Managing Insider Security Threats (MIST)   IEEE Computer Society, 634-636   2011   [Refereed]
ElGamal-based Key Management Scheme for Distributed RSUs in VANET
Ruan Na, Takashi Nishide, and Yoshiaki Hori
IEEE International Conference on Selected Topics in Mobile and Wireless Networking (iCOST)   128-133   2011   [Refereed]
Realizing Proxy Re-encryption in the Symmetric World
Amril Syalim, Takashi Nishide, and Kouichi Sakurai
The International Conference on Informatics Engineering & Information Science (ICIEIS)   CCIS 251, Springer, 259-274   2011   [Refereed]
Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols
Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura
12th International Workshop on Information Security Applications (WISA’11)   LNCS 7115, Springer, 187-202   2011   [Refereed]
New Multiple Encryption for Making Double Encryption Secure against Meet-in-the-Middle and Related-Key Attacks
Takashi Nishide, Shinichi Yoshinaga, Rishiraj Bhattacharyya, Mridul Nandi, Bimal Roy, and Kouichi Sakurai
12th International Workshop on Information Security Applications (WISA’11) (short paper track, 6pages)      2011   [Refereed]
Anonymous Encryption with Partial-Order Subset Delegation Functionality
Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi
5th International Conference on Provable Security (ProvSec)   LNCS 6980, Springer, 154-169   2011   [Refereed]
Securing Location-Aware Services Based on Online/Offline Signatures in VANETs
Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, and Kyung Hyune Rhee
International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11)   LNCS 6908, Springer, 271-285   2011   [Refereed]
Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems
Fangming Zhao, Takashi Nishide, and Kouichi Sakurai
7th Information Security Practice and Experience Conference (ISPEC)   LNCS 6672, Springer, 83-97   2011   [Refereed]
Design and Implementation of a Forced Encryption Kernel Module
Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai
5th International Workshop on Advances in Information Security (WAIS)   663-667   2011   [Refereed]
Integrity for the In-flight Web Page Based on A Fragile Watermarking Chain Scheme
Peng Gao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai
5th International Conference on Ubiquitous Information Management and Communication (ICUIMC)   ACM,    2011   [Refereed]
Distributed Paillier Cryptosystem without Trusted Dealer
Takashi Nishide and Kouichi Sakurai
11th International Workshop on Information Security Applications (WISA’10)   LNCS 6513, Springer, 44-60   2011   [Refereed]
Adaptive and Composable Non-committing Encryptions
Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai
15th Australasian Conference on Information Security and Privacy (ACISP)   LNCS 6168, Springer, 135-144   2010   [Refereed]
Adaptive and Composable Non-interactive String-Commitment Protocols,
Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai
International Conference on Security and Cryptography (SECRYPT)   354-361   2010   [Refereed]
Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance
Amril Syalim, Takashi Nishide, and Kouichi Sakurai
24th IFIP WG11.3 Working Conference, Data and Applications Security and Privacy (DBSec)   LNCS 6166, Springer, 311-318   2010   [Refereed]
Model-Based Intrusion Detection by Abstract Interpretation
Jingyu Hua, Takashi Nishide, and Kouichi Sakurai
10th IEEE/IPSJ Annual International Symposium on Applications and the Internet, Workshop on Convergence Security and Privacy (SAINT/CSnP)   359-362   2010   [Refereed]
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries
Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai
International Conference on Security and Cryptography (SECRYPT)   389-398   2010   [Refereed]
Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92--A(1) 22-32   Jan 2009   [Refereed]
Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures
Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
ACNS   LNCS 5037, Springer, 111-129   2008   [Refereed]
Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison
Takashi Nishide, Kazuo Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E90--A(5) 960-968   May 2007   [Refereed]
Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol
Takashi Nishide, Kazuo Ohta
PKC   LNCS 4450, Springer, 343-360   2007   [Refereed]
Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search
Fangming Zhao, Takashi Nishide, Kouichi Sakurai
IEICE Transactions on Information and Systems   E97--D(7) 1790-1803   [Refereed]