Dan Yamamoto
Hitachi
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Dan Yamamoto.
australasian conference on information security and privacy | 2014
Dan Yamamoto; Hisayoshi Sato; Yasuko Fukuzawa
We present the concept of incrementally executable signcryptions, which is a generalization of traditional on-line/off-line signcryption and facilitates optimizing the sender’s off-line computation. With an incrementally executable signcryption scheme, the sender can activate signcryption process incrementally by its given sequential input: the sender’s key pair, a recipient’s public key, and a plaintext message to be sent to the recipient. Furthermore, we present an efficient generic construction of incrementally executable signcryption scheme. In our construction, the signing process can be done before being given the recipient’s public key as well as the message to be sent. This feature enables us to accelerate the subsequent processes. Moreover, our construction achieves the strongest security notions without relying on random oracles. In addition, it requires a weak assumption for the underlying signature scheme, i.e., the underlying signature scheme is sufficient to be unforgeable under generic chosen message attack. Furthermore, it supports the parallel un-signcryption feature, which allows receivers to perform two potentially expensive computations, i.e., the verification of off-line signature and the key-decapsulation, in parallel.
international conference on model-driven engineering and software development | 2018
Tian Xia; Hironori Washizaki; Takehisa Kato; Haruhiko Kaiya; Shinpei Ogata; Eduardo B. Fernandez; Hideyuki Kanuka; Masayuki Yoshino; Dan Yamamoto; Takao Okubo; Nobukazu Yoshioka; Atsuo Hazeyama
Security and privacy are important in cloud services. Numerous security and privacy patterns as well as nonpattern-based knowledge such as practices and principles exist in cloud services. Selecting and combining the appropriate knowledge is difficult due to numerous options and the nature of the layered cloud stack. Herein we propose a metamodel called the Cloud Security and Privacy Metamodel (CSPM) to handle security and privacy in cloud service development and operations. CSPM can classify and support existing cloud security and privacy patterns and practices in a consistent and uniform manner. Moreover, we propose a security and privacy aware process to develop cloud system utilizing CSPM. Several case studies verify the effectiveness and usability of our approach. As a result, we confirmed effectiveness and usability of CSPM, as well as some possible future work.
international conference on theory and practice of electronic governance | 2013
Hisao Sakazaki; Dan Yamamoto; Akihiro Sugimoto; Shinji Hirata
The Japanese government will adopt the Social Security and Tax Number System. The system is beneficial, but it is necessary to consider how to prevent abuse of the system. To prevent any abuse of the system, we developed a secure device which manages IDs such as Social Security and Tax Number. This secure device safely manages IDs, and can increase efficiency of audit. In this paper, we evaluate the Japanese Social Security and Tax Number System by fault-tree analysis and summarise the proposed ID-management device.
Archive | 2009
Dan Yamamoto; Tadashi Kaji; Takahiro Fujishiro
Archive | 2009
Akifumi Yato; Tadashi Kaji; Dan Yamamoto; Naoki Hayashi
Archive | 2009
Dan Yamamoto; Tadashi Kaji; Takahiro Fujishiro
Archive | 2009
Dan Yamamoto; Tadashi Kaji; Takahiro Fujishiro
Archive | 2009
Dan Yamamoto; Tadashi Kaji; Takahiro Fujishiro
Archive | 2011
Naoki Hayahi; Tadashi Kaji; Dan Yamamoto
Archive | 2010
Naoki Hayashi; Tadashi Kaji; Akifumi Yato; Dan Yamamoto