Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nasima Begum is active.

Publication


Featured researches published by Nasima Begum.


international symposium on computing and networking | 2015

A Consideration on Crosscorrelation of a Kind of Trace Sequences over Finite Field

Hiroto Ino; Yasuyuki Nogami; Nasima Begum; Satoshi Uehara; Robert Morelos-Zaragoza; Tsuchiya Kazuyoshi

In our previous work, the k-value pseudo random sequence generated by power residue symbol has been researched. The sequence is generated by applying a primitive polynomial over odd characteristics field, trace function, and power residue symbol. And the sequence has some interesting features such as period, periodic autocorrelation, and linear complexity. In this paper, by applying a new step into the process of generating sequence, a new generating method of k-value sequence is derived. As with the previous work, it also has some interesting features such as period, periodic autocorrelation, and periodic crosscorrelation. From the experimental results, these features are examined.


ieee global conference on consumer electronics | 2013

Reducing public-key size in an anonymous credential system for CNF formulas with constant-size proofs

Nasima Begum; Toru Nakanishi; Nobuo Funabiki

To enhance the user privacy at authentications, an anonymous credential system has been designed to allow a user to anonymously convince a verifier of the possession of a certificate issued by the issuing authority. In this system, a user can prove relations on his/her attributes embedded into the certificate. Previously, we have proposed an anonymous credential system with constant-size proofs and faster proof generations for CNF formulas than the existing system. In the system, in the verification, some value should be included in some set Φ. Unfortunately, this system has a problem of requiring long public parameters that is proportional to the size of the set Φ. In this paper, we propose an extension to reduce the public key by separating this set Φ into two sets Φ<sub>1</sub> and Φ<sub>2</sub> with logarithmic sizes such that u<sub>1</sub> ϵ Φ<sub>1</sub> and u<sub>2</sub> ϵΦ<sub>2</sub> if and only if u<sub>1</sub> + u<sub>2</sub> ϵ Φ. Furthermore, we evaluate the efficiency based on the implementation.


Journal of Information Processing | 2017

Accumulator for Monotone Formulas and its Application to Anonymous Credential System

Shahidatul Sadiah; Toru Nakanishi; Nasima Begum; Nobuo Funabiki

An anonymous credential system allows a user to convince a service provider anonymously that he/she owns certified attributes. Previously, a system to prove AND and OR relations simultaneously by CNF formulas was proposed. To achieve a constant-size proof of the formula, this system adopts an accumulator that compresses multiple attributes into a single value. However, this system has a problem: the proof generation requires a large amount of computational time in the case of lots of OR literals in the formula. Therefore, we convert the attribute relation from the CNF formula to a monotone formula to decrease the number of OR literals. The monotone formula is a logic formula that contains any combination of AND and OR relations. In this paper, we propose an extended accumulator to prove the monotone formula, and apply it to the anonymous credential system. Our approach to prove the monotone formula is that the tag assignment in the accumulator is extended to be adapted to the tree expressing the monotone formula. Using this type of formula, the number of public parameters multiplied in the accumulator is decreased, which greatly impacts the reduction of authentication time.


international conference on consumer electronics | 2016

Efficient operation over F(2 4)2 for security technologies

Norito Jitsui; Yasuyuki Nogami; Hwajeong Seo; Nasima Begum

Binary extension field F<sub>2</sub><sup>8</sup> is recently used for AES encryption and IoT (Internet of Things) security with PUF (Physical Unclonable Function). The calculations over tower field such as F<sub>(2</sub><sub>4</sub><sub>)</sub><sup>2</sup> or F<sub>((2</sub><sup>2</sup><sub>)</sub><sup>2</sup><sub>)</sub><sup>2</sup> become more efficient than that of over F<sub>2</sub><sup>8</sup>. This paper focuses on the efficient calculations over F<sub>(2</sub><sup>4</sup><sub>)</sub><sup>2</sup>.


international conference on information systems security | 2015

Examining the Linear Complexity of Multi-Value Sequence Generated by Power Residue Symbol

Hiroto Ino; Yasuyuki Nogami; Nasima Begum; Satoshi Uehara; Robert Morelos-Zaragoza; Kazuyoshi Tsuchiya

In our previous work, k-value pseudo random sequence generated by power residue symbol has been researched. The sequence is generated by applying a primitive polynomial over odd characteristics field, trace function, and power residue symbol. The sequence has some important features such as period, periodic autocorrelation, and linear complexity. In this paper, by applying an additional process to the previous procedure, an extended multi-value sequence is generated. Its features, such as the period, periodic autocorrelation, periodic crosscorrelation, and linear complexity are examined in this paper. According to the results, the new sequence also has some interesting features.


international conference on electrical engineering and information communication technology | 2015

An efficiency improvement in an anonymous credential system for CNF formulas on attributes with constant-size proofs

Nasima Begum; Toru Nakanishi; Yasuyuki Nogami

An anonymous credential system allows a user to convince a service provider anonymously that he/she owns certified attributes. Previously, we proposed a paring-based anonymous credential system with constant size of proofs, where the combinations of logical AND and OR relations on user attributes can be proved as CNF formulas. However, this system has a problem of requiring large online computation time during authentication, which depends on the number of AND relations in the proved formula. In this paper, we propose an efficiency improvement of the computational overhead based on online/offline precomputation technique. In our improvement, all exponentiations that can be used for the accumulator and witness computations are executed in advance in the precomputation algorithm. Thus, exponentiations in the online accumulator and witness computations are excluded, and only multiplications are needed. We implemented the system using a fast pairing library, and measured the processing times, while changing the size of the proved CNF formula. The experimental result shows that the computational costs of the proof generation in the case of using lots of AND relations are greatly reduced than the previous system. Hence, it is practical for mobile users.


international conference on consumer electronics | 2015

Reduction of authentication time in an anonymous credential system with proofs for monotone formulas on attributes

Nasima Begum; Toru Nakanishi; Yasuyuki Nogami

An anonymous credential system allows a user to convince a service provider anonymously that he/she owns certified attributes. Previously, an anonymous credential system was proposed to prove users attributes to satisfy a monotone formula, i.e., a logic relation with any combination of AND/OR relations. However, this system has a problem of requiring large authentication time which depends on the number of attributes in the proved formula. In this paper, we propose methods to accelerate the authentication time by reducing the exponentiation costs for the calculations of accumulator and the witness which are used in the system. We implemented the accelerated system using a fast pairing library, and measured the authentication times, while changing the size of the proved relation.


international conference on networking and computing | 2012

Implementation and Evaluation of an Pairing-Based Anonymous Credential System with Constant-Size Proofs and Efficient Proof Generations

Nasima Begum; Toru Nakanishi; Nobuo Funabiki

To enhance user privacy, anonymous credential systems allow the user to convince a verifier of the possession of a certificate issued by the issuing authority anonymously. In the systems, the user can prove logical relations on his/her attributes embedded into the certificate. Previously, we proposed a pairing-based system with constant-size proofs. In the system, the proof generation needs only multiplications depending on the size of the proved relations, and it is more efficient than other existing system that needs the exponentiations whose costs are much larger than multiplications. However, our efficient system has never been implemented, and thus the practicality is not evaluated. In this study, we implemented the system, and measured the processing times and data size, when changing the parameters describing the size of the proved relation. The verification time is very fast and constant, and the proof size is also constant, from which we can confirm the practicality. However, the proof generation time increases, when the parameters increase. Although we confirm the practicality in case of small relations, we clarify the problems in case of larger relations, which should be solved in our future works.


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2013

Efficient proofs for CNF formulas on attributes in pairing-based anonymous credential system

Nasima Begum; Toru Nakanishi; Nobuo Funabiki


IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences | 2016

A multi-value sequence generated by power residue symbol and trace function over odd characteristic field

Yasuyuki Nogami; Satoshi Uehara; Kazuyoshi Tsuchiya; Nasima Begum; Hiroto Ino; Robert H. Moleros-Zaragoza

Collaboration


Dive into the Nasima Begum's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Satoshi Uehara

University of Kitakyushu

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge