Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kengo Mori is active.

Publication


Featured researches published by Kengo Mori.


financial cryptography | 2002

An implementation of a universally verifiable electronic voting scheme based on shuffling

Jun Furukawa; Hiroshi Miyauchi; Kengo Mori; Satoshi Obana; Kazue Sako

This paper discusses the implementation of the voting scheme based on mix-net technology. The advantages of employing this technology are that voters can vote-and-go, and that it is flexible enough to be used for variety of vote-expression methods, while ensuring the privacy of votes and the elimination of faulty players. The most attractive security feature of this scheme is its universal verifiability; anyone can confirm the correctness of the result. Such verifiability is achieved by providing proofs on correct shuffling and decryption. The paper presents a new scheme for generating a single proof for shuffle-and-decrypt process. Compared to the combination of two separate proofs on shuffle and decryption, the new scheme is 150% faster with only 80% of the length. As a result, the system was able to produce results that were verified correct within twenty minutes following a vote participated in by ten thousand voters, with three shuffling centers being used. We believe this is the first implementation report of a voting scheme with universal verifiability.


digital identity management | 2006

Using group signatures for identity management and its implementation

Toshiyuki Isshiki; Kengo Mori; Kazue Sako; Isamu Teranishi; Shoko Yonezawa

We discuss the merits of using group signature technology in Identity Management. We propose a novel model of group signature scheme and introduce a new entity called User-Revocation manager. User-Revocation manager plays an independent role regarding user revocation which was previously covered by either Group manager or Issuing manager. We extend the idea of the Camenisch-Groth scheme and present an efficient revocation scheme where the cost of user revocation is smaller than that of the Camenisch-Groth scheme. We also discuss the details of our implementation.


Towards Trustworthy Elections | 2010

An implementation of a mix-net based network voting scheme and its use in a private organization

Jun Furukawa; Kengo Mori; Kazue Sako

We discuss an implementation of a network voting scheme based on mix-net technology. We employed the scheme presented at Financial Cryptography 2002, but replaced the numeric computations with those on a elliptic curve. As a result, we obtained three times speed up and data length shortening to one third. The system has been employed in a private organization with roughly 20,000 voters since 2004.


international conference on selected areas in cryptography | 2015

Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks

Haruna Higo; Toshiyuki Isshiki; Kengo Mori; Satoshi Obana

This paper proposes a novel secure biometric authentication scheme that hides the biometric features and the distance between the enrolled and authenticated biometric features, and prevent impersonation. To confirm that the proposed scheme has such properties, we formally model secure biometric authentication schemes by generalizing the related and proposed schemes. As far as we know, the proposed scheme is the first one that has been proved to satisfy all the properties. In particular, the proposed scheme achieves security under the decisional Diffie-Hellman assumption.


Archive | 2012

DATABASE ENCRYPTION SYSTEM, METHOD, AND PROGRAM

Kengo Mori; Satoshi Obana; Jun Furukawa; Isamu Teranishi; Toshiyuki Isshiki; Toshinori Araki


Archive | 2005

Anonymous electronic voting system and anonymous electronic voting method

Kengo Mori; Kazue Sako


Archive | 2012

DATABASE APPARATUS, METHOD, AND PROGRAM

Kengo Mori; Satoshi Obana; Jun Furukawa; Isamu Teranishi; Toshiyuki Isshiki; Toshinori Araki


Archive | 2002

Handle deciphering system and handle deciphering method, and program

Kazue Sako; Kengo Mori


Archive | 2002

Anonymous decryption system, anonymous decryption method, and program

Kazue Sako; Kengo Mori


Archive | 2015

Encoded text checking system, method, and program

Satoshi Obana; Toshiyuki Isshiki; Kengo Mori; Toshinori Araki

Researchain Logo
Decentralizing Knowledge