Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kazue Tanaka is active.

Publication


Featured researches published by Kazue Tanaka.


IEEE Journal on Selected Areas in Communications | 1989

Key distribution system based on identification information

Eiji Okamoto; Kazue Tanaka

A key distribution system (KDS) based on identification information (ID-based KDS) is presented. The system is founded on the Diffie-Hellman public key distribution scheme and has an identity authentication function. It uses an individual users identification information instead of the public file used in the Diffie-Hellman scheme. It does not require any services of a center to distribute work keys or users to keep directories of key-encrypting keys. Therefore, key management in cryptosystems can be simplified by adopting the ID-based KDS. Two kinds of identity-based key distribution system are proposed and applied to actual communication networks. One uses two-way (interactive) communication to distribute work keys, while the other uses one-way communication. Modular exponentiations of large numbers, used in the systems, are implemented with digital signal processors. >


IEEE Journal on Selected Areas in Communications | 1989

Identity-based information security management system for personal computer networks

Eiji Okamoto; Kazue Tanaka

A network information security management system which authenticates and/or encrypts messages is proposed. Both authentication and key distribution are executed in a simple scheme. Once the system is set up, the transactions are done independently by the users involved, yet the amount of information that users must keep is small. The experimental implementation of the system on a personal computer network, using IC cards (smart cards) and digital signal processors, is described. The signal processors shorten calculation time and make the concept practical. >


Computers & Security | 1991

Key distribution system for mail systems using ID-related information directory

Kazue Tanaka; Eiji Okamoto

A key distribution system suitable for mail systems is presented. It realizes a secure cryptosystem that is convenient for users and, moreover, can be easily implemented in present computer networks. The system uses a public directory, which contains each users ID-related information, but is strong against forgery. A sender generates a key and key information which depends on the receiver, and sends the key information along with the encrypted message. Only the intended receiver can obtain the common key from the key information and decrypt the message. He can also convince himself that the sender is authentic. Since a random number is used in generation of a key and its information, keys are different in every mail item. The paper further discusses the implementation of the proposed system on an existing personal computer network. For faster execution, a digital signal processor is adopted. A modular algorithm suitable for the processor is presented.


Systems and Computers in Japan | 1990

Proposal for Cryptographic Key Distribution System Based on Identification Information

Eiji Okamoto; Kazue Tanaka

A key distribution system based on identification information is presented. The system is based on the Diffie-Hellman public key distribution scheme (DH-PKDS) and has an identity authentication function. It uses identification information on individual users instead of a public file employed in the DH-PKDS. The system proposed here does not require any services of a center to distribute work keys, not does it require users to maintain directories of information for the generation of keys. This allows key management for cryptosystems to be simplified. In this paper, two kinds of identity-based key distribution systems are proposed. One uses two-way (interactive) communication to distribute work keys, and the other uses one-way communication. They are applied to communication networks, on-line talk networks and mail networks, for instance. Modular exponentiations of large numbers used in the networks are implemented with digital signal processors.


Archive | 1990

Cipher-key distribution system

Kazue Tanaka


Archive | 1989

Method and apparatus for matching fingerprints

Kazue Tanaka; Naoya Ohta


Archive | 1992

Key distribution system for distributing a cipher key between two subsystems by one-way communication

Kazue Tanaka


Archive | 1989

Verfahren und Vorrichtung zum Vergleichen von Fingerabdrücken

Kazue Tanaka; Naoya Ohta


Archive | 1989

Verfahren und vorrichtung zum vergleichen von fingerabdruecken. Method and device for comparison of fingerprints.

Kazue Tanaka; Naoya Ohta


Archive | 1989

VERFAHREN UND VORRICHTUNG ZUM VERGLEICHEN VON FINGERABDRUECKEN.

Kazue Tanaka; Naoya Ohta

Collaboration


Dive into the Kazue Tanaka's collaboration.

Researchain Logo
Decentralizing Knowledge