Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Arisa Fujii.
international conference on cryptology in africa | 2009
Go Ohtake; Arisa Fujii; Goichiro Hanaoka; Kazuto Ogawa
We investigate a theoretical gap between unlinkability of group signature schemes and their other requirements, and show that this gap is significantly large. Specifically, we clarify that if unlinkability is achieved from any other property of group signature schemes, then it becomes possible to construct a chosen-ciphertext secure cryptosystem from any one-way function . This result implies that it would be possible to drastically improve efficiency of group signature schemes if unlinkability is not taken into account. We also demonstrate to construct a significantly more efficient scheme (without unlinkability) than the best known full-fledged scheme.
international conference on knowledge-based and intelligent information and engineering systems | 2007
Arisa Fujii; Go Ohtake; Goichiro Hanaoka; Kazuto Ogawa
In bidirectional broadcasting services via networks, all user operations and actions are controlled with the user ID and are recorded by the service providers. This means the users personal information such as his/her payment method and preferences is disclosed to the providers possibly against the users will. Hence, to preserve privacy, an anonymous authentication scheme for subscription services would seem to be in order. In this paper, we introduce a subscription service model and its system requirements for preserving privacy. Moreover, we propose an efficient group signature scheme having a property of linkability, which is useful for anonymous authentication and a preference subscription service. We show that our authentication scheme is efficient in terms of signature size and that it is suited to subscription services having many members.
systems, man and cybernetics | 2006
Arisa Fujii; Haruyuki Nakamura; Go Ohtake; Keigo Majima; Yoshihiro Fujita; Hiroyuki Imaizumi; Koichi Tanimoto; Takaaki Yamada
With the rapid spread of broadband internet networks, broadcasting services on television using IP networks will soon become a reality. The broadcasting services on television using IP networks will be available, providing variable services in response to individual demands using personal data. We carried out a questionnaire survey, and compiled technological requirements for implementing such services. One of the requirements is that the viewers personal data should be kept secure, and another is that viewers should be able to set their own disclosure rules. We created an experimental broadcasting system that satisfies these requirements and evaluated the transaction speed of the system.
international conference on consumer electronics | 2007
Haruyuki Nakamura; Arisa Fujii; Go Ohtake; Keigo Majima; Hiroyuki Imaizumi; Yoshihiro Fujita; Koichi Tanimoto; Takaaki Yamada
This paper proposes a new method for management of consumers private information on bidirectional broadcasting services using IP networks, based on secure distributed RDB (relational database). We also propose a new protocol for browsing user information that was registered in the database from user terminals securely. We compared the processing times to browse user information between the existing usual encryption method and the proposed method. As a result, we can confirm that the latter method is as practical as the former one.
systems, man and cybernetics | 2006
Koichi Tanimoto; Takaaki Yamada; Haruyuki Nakamura; Arisa Fujii; Go Ohtake; Keigo Majima; Yoshihiro Fujita; Hiroyuki Imaizumi
Individualization of network services will be a key factor attracting users because customer satisfaction with identified services such as location-specific and time-specific news could increased by collecting and analyzing user information. Balancing the trade-off between privacy and individualization, however, will require the use of technical mechanisms we call identified-service support systems (ISSS). Here we describe the basic concept of an ISSS and describe its technical requirements. We propose an ISSS architecture combining user-information analysis for individualization, access control for privacy protection, shuffling data management for preventing the leakage of personal information, and digital signatures for authenticating the integrity of partially disclosed documents. We also describe the protocols, GUIs, and data management implementations of a prototype ISSS developed for personalized broadcasting services. An ISSS could protect user privacy against inside attacks as well as third-party attacks and could support various kinds of identified services.
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2014
Kazuto Ogawa; Go Ohtake; Arisa Fujii; Goichiro Hanaoka
The Journal of The Institute of Image Information and Television Engineers | 2009
Haruyuki Nakamura; Arisa Fujii; Go Ohtake; Keigo Majima; Yoshihiro Fujita; Hiroyuki Imaizumi; Koichi Tanimoto; Takaaki Yamada
The Journal of The Institute of Image Information and Television Engineers | 2016
Arisa Fujii
The Journal of The Institute of Image Information and Television Engineers | 2016
Arisa Fujii
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2011
Arisa Fujii; Go Ohtake; Goichiro Hanaoka; Nuttapong Attrapadung; Hajime Watanabe; Kazuto Ogawa; Hideki Imai
Collaboration
Dive into the Arisa Fujii's collaboration.
National Institute of Advanced Industrial Science and Technology
View shared research outputsNational Institute of Advanced Industrial Science and Technology
View shared research outputsNational Institute of Advanced Industrial Science and Technology
View shared research outputsNational Institute of Advanced Industrial Science and Technology
View shared research outputs