2005年度
- 学術論文 --- 3件
- 早稲田篤志,双紙正和,宮地充子,"n次元量子状態を使用した量子コイン投げプロトコル",
情報処理学会論文誌, Vol.46, No.8(2005), 1903-1911.
- A. Miyaji and K. Umeda."Efficient Group Signature Scheme based on a Modified Nyberg-Rueppel Signature",
IPSJ Trans., Vol.46, No.8(2005). 1889-1902.
- A. Miyaji and Y. Sakabe and M. Soshi."Java Obfuscation -- Approaches to Construct Tamper-Resistant Object-Oriented Programs",
IPSJ Trans., vol. 46, No.8(2005), 2107-2119.
menuに戻る
- 国際会議(査読付き) --- 3件
- A. Waseda, M. Soshi, and A. Miyaji. "n-state quantum coin flipping protocol",
International Conference on Information Technology - ITCC2005 ,Volume II, pp.776-777, 2005
- A. Miyaji and Y. Takano. "On the Success Probability of chi^2-attack on RC6",
Proceedings of ACISP 2005, Lecture Notes in Computer Science, 3089(2005), Springer-Verlag, 310-325.
- H. Mamiya and A. Miyaji. "Fixed-Hamming-Weight Representation for Indistinguishable Addition Formulae",
ACNS 2005, to appear.
menuに戻る
- 解説論文・招待講演 --- 3件
- 宮地 充子, 近澤 武, 竜田 敏男, 大塚 玲, 安田 幹 (解説)「情報セキュリティの標準化動向について -ISO/IEC JTC1/SC27/WG2 2005年4月ウィーン会議報告-」,
電子情報通信学会,信学技報 ISEC2005-30(2005), 155-164.
- 宮地 充子, 「ユビキタス社会と情報セキュリティ」,
サイバネティック・フレキシブル・オートメーション (CFA) 研究分科会, 第20回研究例会,2005.
- A.Miyaji."Privacy Rights in the Digital Age Technological,-How to Protect Privacy Right by the technology of Information Security-",
International Forum on Privacy Rights in the Digital Age, Korean National Commission for UNESCO, September 2005.
menuに戻る
- 国内研究会発表論文 --- 5件
- A. Miyaji, "On public-key Broadcast Encryption",
CSEC2005-29(2005-05), 31-38.
- 早稲田篤志,双紙正和,宮地充子, "MSPを使った量子複数秘密分散に関する考察",
IEICE Japan Tech. Rep., ISEC2005-119 (2005-12), 53-60.
- 宮地充子, 清宮健,"Address-bit DPAに強力なBRIPアルゴリズムの改良",
IEICE Japan Tech. Rep., ISEC2005-118 (2005-12), 47-52
- A.Miyaji,"ID-Based encryption scheme with a hierarchical structure and its application",
Symposium on Cryptography and Information Security, SCIS2006-3A1-4, Jan,2006.
- 樋上智彦,宮地充子,"RC6のΧ二乗攻撃の効率化へのアプローチについて",
Symposium on Cryptography and Information Security, SCIS2006-3A1-4, Jan,2006.
menuに戻る
- 賞罰 --- 0件
menuに戻る
2004年度
- 学術論文 --- 3件
- 田村裕子,塩月 徹,宮地充子," 効率的な代理入札システム",
電子情報通信学会誌, Vol. J87-A, No.6(2004), 835-842.
- T. Terada, M. Soshi and A. Miyaji, "Pushback機構の一提案とそのモデル化に向
けて ",
IPSJ Trans, Vol.45, No.8(2004), 1948-1953
- Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji. "On anonymity metrics for practical anonymous communication protocols.",
IPSJ Journal,Vol. 45, No. 8, August 2004.
menuに戻る
- 国際会議(査読付き) --- 4件
- Takashi Matsunaka, Atsuko Miyaji, and Yuuki Takano, "Success probability in $\chi^2$-attacks",
Applied Cryptography and Network Security - ACNS 2004, Lecture Notes in Computer Science 3089, pp.310-325, Springer-Verlag, June 2004.
- H. Mamiya, H. Morimoto A. Miyaji, "Efficient Countermeasures against RPA, DPA, and SPA",
CHES 2004, Lecture Notes in Computer Science, 3156(2004), Springer-Verlag,
343-356.
- T. Terada, M.Soshi and A. Miyaji, "A New Pushback Mechanism Resistant to
DDoS Attacks",
2004 International Symposium on Information Theory and its
Applications - Proceedings of ISITA2004, Wed1-6-4.
- Atsuko Miyaji and Kozue Umeda, "A Fully-Functional group signature scheme over only known-order group",
Applied Cryptography and Network Security - ACNS 2004, Lecture Notes in Computer Science, 3089, pp.164-179, Springer-Verlag, June 2004.
menuに戻る
- 解説論文・招待講演 --- 1件
- 宮地充子, 「双線型写像の公開鍵暗号への応用に関して」,
符号と暗号の代数的数理,京都大学数理解析研講究録, 1420(2005), 117-127.
menuに戻る
- 国内研究会発表論文 --- 6件
- 早稲田篤志,双紙正和,宮地充子, ``n状態量子コイン投げプロトコル'', IEICE
Japan Tech. Rep. , ISEC2004-10 (2004-05), 65-68.
- 金沢史明, 宮地充子, "IDベースブロードキャスト暗号",
Symposium on Cryptography and Information Security, SCIS2005-3F1-1,
Jan, 2005.
- 高野祐輝, 宮地充子, "16ラウンドRC6に適用可能なカイ2乗攻撃について",
Symposium on Cryptography and Information Security, SCIS2005-4D2-3,
Jan, 2005.
- 間宮英世,宮地充子,"固定ハミングウェイト表現によるSPA対策法",
IEICE Japan Tech. Rep. , IT2004-59, ISEC2004-115, WBS2004-174 (2005-03),
55-60.
- 佐々木賢,早稲田篤志,双紙正和,宮地充子,"量子秘密分散に関する検討",
IEICE Japan Tech. Rep. , IT2004-71, ISEC2004-127, WBS2004-186 (2005-03),
7-11.
- 森正行,双紙正和,宮地充子,"モバイルエージェント・セキュリティに関する一考察",
2005-CSEC-28, pp.123-128, March, 2005.
menuに戻る
- 賞罰 --- 3件
- 金沢 史明 --- 平成16年度優秀学生賞受賞 (電子情報通信学会北陸支部)
- 高野 祐輝 --- 平成16年度優秀学生賞受賞 (情報処理学会北陸支部)
- 間宮 英世 --- 平成16年度優秀学生賞受賞 (JAIST)
menuに戻る
2003年度
- 学術論文 --- 2件
- N. Isogai, A. Miyaji, and M. Nonaka,
"Statistical Analysis of chi^2-Attacks",
IEICE Trans., Fundamentals. vol. E86-A,
No.5(2003), 1190-1197.
- Masakazu Soshi, Mamoru Maekawa, and Eiji Okamoto.
"The dynamic-typed access matrix model and decidability of the safety problem",
IEICE Trans., Fundamentals. Vol.E87-A, No.1, 190-203, January 2004.
menuに戻る
- 国際会議(査読付き) --- 6件
- Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung,
"Intrusion-Resilient Public-Key Encryption",
RSA Conference 2003,
Lecture Notes in Computer Science, 2612(2003), 19-32
- Shigeki Kitazawa, Masakazu Soshi, and Atsuko Miyaji,
"Evaluation of anonymity of practical anonymous communication
networks.", The Eighth Australasian Conference on
Information Security and Privacy - ACISP 2003,
volume 2727 of Lecture Notes in Computer Science,
pp.13-26, Springer-Verlag, July 2003.
- Norihisa Isogai, Takashi Matsunaka, and Atsuko Miyaji,
"Optimized $\chi^2$-Attack against RC6", Applied Cryptography and Network
Security - ACNS 2003, Lecture Notes in Computer Science 2846,
pp.16-32, Springer-Verlag, Oct. 2003.
- Yuko Tamura and Atsuko Miyaji,
"Anonymity-enhanced Pseudonym System", Applied Cryptography and Network
Security - ACNS 2003, Lecture Notes in Computer Science 2846
pp.33-47, Springer-Verlag, Oct. 2003.
- Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji.
"Java obfuscation with a theoretical basis for building secure mobile agents",
Seventh IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
(CMS'03), vol. 2828 of LNCS, pp.89-103. Springer-Verlag, October 2003.
- Y. Dodis, M. Franklin, J. Katz, A. Miyaji, and M. Yung , "Generic
construction of Intrusion-Resilient Public-Key Encryption", Topics in
Cryptology - CT-RSA 2004, Lecture Notes in Computer Science, 2964(2004),
Springer-Verlag, 81-98.
menuに戻る
- 解説論文・招待講演 --- 3件
- 20 世紀の名著 R.L.Rivest, A. Shamir, and L.Adelman: A method for obtaining digital signatures and public-key cryptosystems,情報処理学会報,
44巻6号 (2003), 650.
- (招待講演)「楕円曲線の暗号における最近の話題」,
IEICE Japan Tech. Rep. IT2003-4(2003-3), 17-22.
- 解説:楕円曲線暗号の原理と国際規格について,
情報処理学会/情報規格調査会,情報技術標準-Newsletter-
61号(2004),16-17.
menuに戻る
- 国内研究会発表論文 --- 12件
- 松中隆志, 宮地充子, 磯貝典仙, ``RC6に対するχ2乗攻撃の統計的
解析'', IEICE Japan Tech. Rep. ,
ISEC2003-2(2003-05), 7-11.
- 福田明香, 双紙正和, 宮地充子, ``量子コイン投げにおけるバイア
スの考察'', IEICE Japan Tech. Rep. ,
ISEC2003-4(2003-05), 21-24.
- 梅田 梢, 宮地充子, ``匿名性を強化したグループ署名方式''IEICE Japan Tech. Rep. ,
ISEC2003-30(2003-07), 1-8.
- 田村裕子,宮地充子, ``効率のよい代理人入札システム'',IEICE Japan Tech. Rep. ,
ISEC2003-54(2003-09), 29-34.
- 早稲田篤志,双紙正和,宮地充子, ``Knapsack問題に基づいた署名方式の提案'',IEICE Japan Tech. Rep. ,
ISEC2003-58(2003-09), 49-51.
- 田村裕子,宮地充子, ``複数属性認証システム'',IEICE Japan Tech. Rep. ,
ISEC2003-69(2003-11), 23-28.
- 寺田剛陽,双紙正和,宮地充子, ``Pushbackのモデル化とその評価'',IEICE Japan Tech. Rep. ,
ISEC2003-70(2003-11), 29-32.
- Yevgeniy Dodis, Matt Franklin, Jonathan Katz, 宮地充子 and Moti Yung, ``侵入攻撃に強い公開鍵暗号'',IEICE Japan Tech. Rep. ,
ISEC2003-72(2003-11), 41-48.
- 森元寛明,宮地充子, ``効率的な種数2の超楕円曲線上のべき演算に関する考察'',IEICE Japan Tech. Rep. ,
ISEC2003-78(2003-11), 7-14.
- 間宮英世, 宮地充子, "サイドチャネル攻撃を考慮した超楕円曲線暗号の最適化に関する考察",
Symposium on Cryptography and Information Security,
SCIS2004-3A1-4, Jan, 2004.
- 松中隆志, 宮地充子, "RC6に対するカイ2乗攻撃に関する新たな指標",
Symposium on Cryptography and Information Security,
SCIS2004-4A1-2, Jan, 2004.
- 森元寛明,間宮英世,宮地充子, ``ゼロ値電力解析に強い高速楕円曲線暗号'',IEICE Japan Tech. Rep. ,
ISEC2003-103(2004-3), 43-48.
menuに戻る
- 賞罰 --- 3件
- 宮地 充子 --- 2003年度標準化貢献賞 (情報処理学会 情報規格調査会)
- 松中 隆志 --- 平成15年度優秀学生賞受賞 (電子情報通信学会北陸支部)
- 森元 寛明 --- 平成15年度優秀学生賞受賞 (JAIST)
menuに戻る
2002年度
- 学術論文 --- 5件
- K. Kawauchi, H. Minato, A. Miyaji, M. Tada, "Provably secure multi-signature scheme with signers' intentions",
IPSJ Trans., vol. 43, No.8(2002), 2425-2434.
- Kazumasa Omote, Atsuko Miyaji, "A Second-price Sealed-bid Auction with Public Verifiability",
IPSJ Trans., vol. 43, No.8(2002), 2405-2413.
- Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and
Atsuko Miyaji, "Software obfuscation on a
theoretical basis and its implementation", IEICE
Trans., Fundamentals, vol. E86-A,
No. 1(2003), 176-186.
- A.Miyaji and M. Nonaka,
"Cryptanalysis of the reduced-round RC6 without whitening",
IEICE Trans., Fundamentals. vol. E86-A,
No.1(2003),
19-30.
- Kazumasa OMOTE and Atsuko MIYAJI, "A Practical English Auction with Simple Revocation",
IEICE Trans., Fundamentals. vol. E85-A, No.5(2002), 1054-1061.
menuに戻る
- 国際会議(査読付き) --- 6件
- Hiroyuki Nishikawa, Atsuko Miyaji, Masakazu Soshi, and Toshio Omote, "A secure and flexible digital contents building system", In 2002 International Symposium on Information Theory and Applications (ISITA 2002), October 2002.
- Masakazu Soshi and Atsuko Miyaji, "Labeled certificate: Flexible trust management of public key infrastructures", In 2002 International Symposium on Information Theory and Applications (ISITA 2002), October 2002.
- Toshio Ogiso, Yusuke Sakabe, Masakazu Soshi, and Atsuko Miyaji, "Software tamper resistance based on the difficulty of interprocedural analysis", In The Third International Workshop on Information Security Applications (WISA 2002), pp. 437-452, August 2002.
- A. Miyaji and M. Nonaka, "Cryptanalysis of the
reduced-round RC6", International Conference on
Information and Communications Security, ICICS
2002, Lecture Notes in Computer Science,
2513(2002), pp. 480-494, Springer-Verlag."
- Kozue Umeda and Atsuko Miyaji, "A Group Signature with Revocation",
2002 International Symposium on Information Theory and
Applications - Proceedings of ISITA2002, S6-6-2, pp751-754.
- Yuko Tamura and Atsuko Miyaji, "A Signature Scheme with a
Guarantee", 2002 International Symposium on Information Theory
and Applications - Proceedings of ISITA2002, S6-6-5,
pp763-756.
menuに戻る
- 国内研究会発表論文 --- 9件
- 刑部裕介, 双紙正和, 宮地充子, ``オブジェクト指向言語の難読化の提案'', IEICE Japan Tech. Rep. , ISEC2002-6(2002-05), 33-38.
- 双紙正和, 宮地充子, "柔軟で効率のよい公開鍵基盤方式の研究", マルチメディア,分散,協調とモバイル
(DICOMO 2002) シンポジウム論文集, Vol. 2002,
No. 9 in 情報処理学会シンポジウム, pp. 105-108, July 2002.
- Norihisa Isogai and Atsuko Miyaji, "The Security of RC6 against chi square
attack," IEICE Japan Tech. Rep., ISEC 2002-100 (2002-12),
pp27-34.
- 高橋直之, 宮地充子, "効率的な種数2の超楕円曲線暗号に関する考察",
IEICE Japan Tech. Rep.,
ISEC2002-102(2002-12), pp39-44.
- Yuko Tamura and Atsuko Miyaji, "Anonymity-enhanced Pseudonym System",
Symposium on Cryptography and Information Security,
SCIS2003-3C-3, Jan, 2003.
- Kozue Umeda and Atsuko Miyaji, "A Group Signature Scheme based on
Nyberg-Rueppel Signatures",
Symposium on Cryptography and Information Security,
SCIS2003-5C-1, Jan, 2003.
- 福田明香, 双紙正和, 宮地充子, "量子コイン投げにおけるバイアス低
減の考察",
Symposium on Cryptography and Information Security,
SCIS2003-15D-3, Jan, 2003.
- 高橋直之,森元寛明,宮地充子.“効率的な種数2の超楕円曲線暗号に関する考察2”, IEICE
Japan Tech. Rep., ISEC2002-145(2003-3), pp59-64.
- 平井太郎,宮地充子.“任意の埋め込み拡大次数を持つ楕円曲線構成法に関する考察”,
IEICE Japan Tech. Rep., ISEC2002-144(2003-3), pp53-58.
menuに戻る
- 賞罰 --- 2件
- 磯貝 典仙 --- 平成14年度優秀学生賞受賞 (JAIST)
- 宮地 充子 --- 坂井記念特別賞 (情報処理学会)
menuに戻る
2001年度
- 学術論文 --- 5件
- A. Miyaji, M. Nakabayashi and S. Takano
"New explicit conditions of elliptic curve traces for FR-reductions",
IEICE Trans., Fundamentails vol. E84-A, No.5(2001),
1234-1243.
- K. Omote, and A. Miyaji,
"An anonymous sealed-bid auction with a feature of entertainment",
IPSJ Trans., vol. 42, No.8(2001), 2049-2056.
- T. Okamoto, M. Tada and A. Miyaji,
"Proposal of Efficient Signature Schemes based on Factoring",
IPSJ Trans., vol. 42, No.8(2001), 2123-2133(in Japanese).
- S. Mitomi and A. Miyaji,
"A general model of multisignature schemes with message flexibility,
order flexibility, and order verifiability",
IEICE Trans., Fundamentals. vol. E84-A, No.10(2001), 2488-2499.
- A. Miyaji, M. Nonaka, and Y. Takii,
"Improved Correlation Attack on RC5",
IEICE Trans., Fundamentals. vol. E85-A, No.1(2002), 44-57.
menuに戻る
- 国際会議(査読付き) --- 8件
- S. Kitazawa, M. Soshi, and A. Miyaji,
"A Modeling for Anonymous Communication Protocols",
Sixth International Workshop on Enterprise Security,
10th IEEE Int'l Workshops on Enabling Technologies: Infrastructure
for Collaborative Enterprise, 2001, pp177-182.
- K. Omote and A. Miyaji,
"A practical English auction with one-time
registration", Information security and
privacy-Proceedings of ACISP 2001, Lecture Notes in Computer
Science 2119, Springer-Verlag, pp221-235.
- Ayako Maeda, Atsuko Miyaji and Mitsuru Tada,
"Efficient and unconditionally secure verifiable threshold
changeable scheme", Information security and
privacy-Proceedings of ACISP 2001, Lecture Notes in Computer
Science 2119, Springer-Verlag, pp403-416.
- Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji and Mitsuru Tada,
"A Multi-signature Scheme with Signers' Intentions Secure against Active
Attacks",
The 4th International Conference on Information Security and
Cryptology-Proceedings of ICISC 2001,
Lecture Notes in Computer Science 2288, Springer-Verlag, pp328-340.
- T.Okamoto, M.Tada and A.Miyaji,
``Efficient ``on the fly'' signature schemes based on integer
factoring'',
Proceedings of Indocrypt'01, Lecture Notes in Computer Science
2247, Springer-Verlag, 2001, pp275-286.
- Atsuko Miyaji, Masao Nonaka, and Yoshinori Takii,
"Known Plaintext Correlation Attack Against RC5",
RSA Conference 2002,
Lecture Notes in Computer Science 2271(2002),
Springer-Verlag, pp131-148.
- K. Omote, A. Miyaji,
"A Second-price Sealed-bid Auction with the Discriminant of the p-th Root",
Financial Cryptography-Proceedings of FC 2002,
Lecture Notes in Computer Science, XXX(2002), Springer-Verlag, to appear.
- T. Okamoto, M. Tada, A. Miyaji,
"A Fast Signature Scheme without on-line Multiplication",
Financial Cryptography-Proceedings of FC 2002,
Lecture Notes in Computer Science, XXX(2002), Springer-Verlag, to appear.
menuに戻る
- 解説論文・招待講演 --- 1件
- A. Miyaji, S. Hangai, W. Wen,
"Cryptography and Computer Security",
Review of Radio Science 2000-2002,
Edited by W. Ross Stone Oxford University Press, to appear.
menuに戻る
- 国内研究会発表論文 --- 18件
- 岡本健, 多田充, 宮地充子,
``高速な署名を実現する新しいパラダイムの提案''
, IEICE Japan Tech. Rep. ,
ISEC2001-18(2001-5), 59-66.
- 河内恵, 多田充, 宮地充子,
"意思付多重署名についての研究" , IEICE Japan Tech. Rep. ,
ISEC2001-19(2001-7), 59-66.
- Masao Nonaka, Atsuko Miyaji, Yoshinori Takii,
"A Study on Known Plaintext Attack against RC5 by using Correlations",
IEICE Japan Tech. Rep., ISEC 2001-53(2001-9),
61-68.
- Y.Tamura and A.Miyaji,
"A Signature Scheme with a Guarantee",
IEICE Technical Rep., ISEC2001-70 (2001-11), 2001. 1-8.
- K. Omote and A. Miyaji,
"An English Auction with Complete Unlinkability among Plural Auctions " ,
IEICE Technical Rep., ISEC2001-71 (2001-11), 2001. 9-22.
- 早稲田篤志,双紙正和,宮地充子,
“鍵の非共有と共謀関係を考慮した共謀問題のモデル化”,
IEICE Japan Tech. Rep. , ISEC2001-80(2001-11), 9-15.
- T.Okamoto, M.Tada and A.Miyaji,
``Security Analysis of Signature Schemes Based on Fast on-line
Computation,''
IEICE Technical Report, ISEC2001-21 (2001-11), 2001.
- Toshio OGISO,Masakazu SOSHI,Atsuko MIYAJI,
"Software Tamper Resistance and evaluation",
IEICE JAPAN Tech Rep., OFS2001-50(2001-11), 2001(in Japanese).
- 梅田 梢,宮地充子,
"効率よくメンバ削除が可能なグループ署名の提案",
IEICE Japan Tech. Rep., ISEC2001-87(2001-12), 1-8.
- N. Isogai, A. Miyaji, M. Nonaka,
"Cryptanalysis of RC5-64 with improved correlation attack,"
2002 Symposium on Cryptography and Information Security,
SCIS2002-10A1, Jan-Feb. 2002.
- M. Nonaka, A. Miyaji,
"A note on the security of RC6 against correlation attack,",
2002 Symposium on Cryptography and Information Security,
SCIS2002-10A5, Jan-Feb. 2002.
- 小木曽 俊夫, 刑部 裕介, 双紙 正和, 宮地 充子,
"手続き間呼出しの関係に着目した難読化手法の提案とその評価",
2002 Symposium on Cryptography and Information Security,
SCIS2002-6C1, Jan-Feb. 2002.
- 三宅 秀享, 宮地 充子,
”Lucas Chainを用いた効率的な楕円曲線暗号に関する考察”,
2002 Symposium on Cryptography and Information Security,
SCIS2002-8B-5, Jan-Feb. 2002.
- K. Omote and A. Miyaji,
"A Second-price Sealed-bid Auction Scheme with a feature of Public
Verifiability",
2002 Symposium on Cryptography and Information Security,
SCIS2002, pp. 855-860, Jan-Feb. 2002.
- 寺田 剛陽, 多田 充, 宮地 充子, 双紙 正和,
"効率的なサブピクセル数で任意のアクセス構造を満たす視覚復号型秘密分散法",
2002 Symposium on Cryptography and Information Security,
SCIS2002-11A1, Jan-Feb. 2002.
- T. Okamoto, M. Tada, A. Miyaji,
"A Proposal of an Identification Scheme Based on Variant RSA Problems",
2002 Symposium on Cryptography and Information Security,
SCIS2002-6A-1, Jan-Feb. 2002.
- Hideyuki Miyake, Atsuko Miyaji,
"Efficient Exponentiation on Elliptic Curve Cryptosystem",
IEICE Japan Tech. Rep. ,
IT2001-86(2002-3), 69-74.(in japanese)
- Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji,
"An Extension of Collusion Problem and its Application ti Protocol
Analysis",
IEICE Japan Tech. Rep. ,
IT2001-87(2002-3), 75-80.(in japanese)
menuに戻る
- 賞罰 --- 3件
- 面 和成 --- CSS2001学生論文賞受賞 (情報処理学会)
- 瀧井 嘉範 --- SCIS2001論文賞受賞 (電子情報通信学会)
- 野仲 真佐男 --- 平成13年度優秀学生賞受賞 (JAIST)
menuに戻る
2000年度
1999年度
- 学術論文 --- 2件
- 小山 謙二,宮地充子,内山 成憲, 「楕円暗号の数理」,電子情報通信学会論文誌A, Vol.J82-A, No.8(1999), 1212-1222.
- M. Tada and H. Shizuya, "On the Σ1b-definability of
integer factoring", Transactions of IPSJ, vol.40, No.12, pp.4362-4369,1999.
menuに戻る
- 国際会議(査読付き) --- 2件
- T. Okamoto, M. Tada and E. Okamoto, "Extended proxy signature for smart cards", Proceedings of ISW'99, LNCS 1729, pp.247-258, 1999.
- M. Burmester, Y. Desmedt, H. Doi, M. Mambo, E. Okamoto, M. Tada and Y. Yoshifuji, "A structured ElGamal-type multisignature scheme", Proceedings of PKC2000, LNCS 1751, pp.466-483,2000.
menuに戻る
- 解説論文・招待講演 --- 2件
- 宮地 充子, 「楕円曲線暗号」,離散可積分系の応用数理,京都大学数理解析研講究録 1098(1999), 138-146.
- 宮地 充子, 「楕円曲線暗号」, ビット別冊「情報セキュリティ」, 共立出版, pp.228-234,1999.
menuに戻る
- 国内研究会発表論 --- 16件
- Y. Futa and A. Miyaji, ``Efficient Construction of elliptic curves
over optimal extension field'', IEICE Japan Tech. Rep.,
ISEC99-26(1999-07), 1-8.
- A. Miyaji and H. Shizuya, ``Integration of DLP-based cryptosystems'', IEICE Japan Tech. Rep., bf ISEC99-48(1999-09), 73-80.
- 岡本健,多田充,宮地充子、``署名依頼者のメッセージ復元に基づく委任
署名'',情報処理学会コンピュータセキュリティシンポジウム CSS99,
pp.19-24, 1999.
- 長野悟,北澤繁樹,双氏正和,宮地充子、``環状経路を用いた匿名性と位
置情報プライバシの保護'',情報処理学会コンピュータセキュリティシン
ポジウム CSS99, pp.37-42, 1999.
- 小出篤史,広橋浩司,多田充,宮地充子、``オフライン電子マネーに関す
る一考察'',情報処理学会コンピュータセキュリティシンポジウム
CSS99, pp.111-116,1999.
- 西川弘幸,宮地充子,双紙正和,岡本栄司、``インターネットにおける簡易
認証方式の検討'', The 2000 Symposium on Cryptography and
Information Security, SCIS2000-D11, Jan. 2000.
- 双紙正和, "動的な型付きアクセス行列モデルにおける安全性問題の決定可
能性と表現力について", The 2000 Symposium on Cryptography and
Information Security, SCIS2000-A34, Jan. 2000.
- 面和成, 宮地充子, "信頼しなくてよい1つのセンタを仮定した2分木を用
いた匿名オークションプロトコル", The 2000 Symposium on
Cryptography and Information Security, SCIS2000-B48, Jan.
2000.
- Masaki Inamura, Masakazu Soshi and Atsuko Miyaji, "Realizing
Adaptable Service Utilization for Mobile Environment", The 2000
Symposium on Cryptography and Information Security,
SCIS2000-D17, Jan. 2000.
- 高野俊三, 宮地充子, "FR-帰着に弱い楕円曲線", The 2000 Symposium
on Cryptography and
Information
Security,
SCIS2000-B34, Jan.
2000.
- 富永絵美, 多田充, 宮地充子, "電子投票の代数学的考察", The 2000
Symposium on
Cryptography
and
Information
Security,
SCIS2000-B26,
Jan. 2000.
- 見富志朗, 宮地充子, "メッセージ変更可能な多重署名", The 2000
Symposium on
Cryptography and
Information
Security,
SCIS2000-C27,
Jan. 2000.
- Tatsuya Yamada, Atsuko Miyaji and Masakazu Soshi, "The Secure
Renewal of Crypt Modules in the Open Network Architecture", The
2000 Symposium on Cryptography and Information Security,
SCIS2000-C46, Jan. 2000.
- 北澤繁樹, 双紙正和, 宮地充子, "匿名通信を記述するためのフレームワー
クについて", 2000-Computer Security(CSEC) group, Mar.
2000.
- 小出篤史, 多田充, 宮地充子, "関連づけ可能な匿名オフライン電子マネー
", 2000-Computer Security(CSEC) group. Mar. 2000.
- 北澤繁樹, 双紙正和, 宮地充子,"匿名通信フレームワークとその評価",
2000-Computer Security(CSEC) group,May. 2000.
menuに戻る
- 賞罰 --- 1件
- 高野 俊三 -- 平成11年度優秀学生賞受賞 (電子情報通信学会北陸支部)
menuに戻る
|