Masaki Kyojima
Fuji Xerox
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Masaki Kyojima.
workshops on enabling technologies infrastracture for collaborative enterprises | 1999
Kil-Ho Shin; Masaki Kyojima
This paper presents a practical method which enables an owner of a private key to entrust the use of the key to an entrustee without exposing the actual key. The following are features of the method: it covers a wide variety of existing public-key cryptographic algorithms; it provides the owner of the private key with a means of preventing the entrustee from abusing the entrusted key beyond the limits which the key owner arbitrarily specifies; it only adds a very small, usually negligible, amount of overhead to calculations required in the base public-key cryptographic algorithm. An outline of our method is as follows. An owner of a private key issues to an entrustee data called a ticket through the cooperation of a trusted third party. With the ticket, the entrustee can execute calculations, which yield the same results as those using the actual private key do.
Archive | 1998
Kenichiro Kigo; Masaki Kyojima; Shunichi Kojima; Kil-Ho Shin
Archive | 1998
Taro Terao; Rumiko Kakehi; Masaki Kyojima
Archive | 1998
Rumiko Kakehi; Masaki Kyojima
Archive | 1999
Toru Aratani; Rumiko Kakehi; Masaki Kyojima
Archive | 1994
Masaki Kyojima; Koji Kusumoto; Makoto Takeoka; Noriyuki Kamibayashi
Archive | 1997
Masaki Kyojima; Kazuya Chiba
Archive | 2000
Masaki Kyojima; Kil-Ho Shin
Archive | 1998
Masaki Kyojima; Rumiko Kakehi; Koji Takeda; Taro Terao
Archive | 2000
Masaki Kyojima; Kil-Ho Shin