Shoko Yonezawa
NEC
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Shoko Yonezawa.
digital identity management | 2006
Toshiyuki Isshiki; Kengo Mori; Kazue Sako; Isamu Teranishi; Shoko Yonezawa
We discuss the merits of using group signature technology in Identity Management. We propose a novel model of group signature scheme and introduce a new entity called User-Revocation manager. User-Revocation manager plays an independent role regarding user revocation which was previously covered by either Group manager or Issuing manager. We extend the idea of the Camenisch-Groth scheme and present an efficient revocation scheme where the cost of user revocation is smaller than that of the Camenisch-Groth scheme. We also discuss the details of our implementation.
international workshop on security | 2004
Jun Furukawa; Shoko Yonezawa
We propose a new group signature scheme that simultaneously provides the following two properties : (1) the membership authority is able to add a user but not to identify an actual signer, while the tracing authority is able to identify the actual signer but not to add a user, (2) for further decentralization, these two authorities are respectively distributed among multiple entities in a manner efficient enough for practical applications. Previous group signature schemes have only offered one or the other of these two properties. Further, we formalize the security properties.
international conference on information security | 2002
Shoko Yonezawa; Goichiro Hanaoka; Junji Shikata; Hideki Imai
Illegal distribution of signed documents can be considered as one of serious problems of digital signatures. In this paper, to solve the problem, we propose three protocols concerning signature schemes. These schemes achieve not only traceability of an illegal user but also universal verifiability. The first scheme is a basic scheme which can trace an illegal receiver, and the generation and tracing of a signed document are simple and efficient. However, in this scheme, it is assumed that a signer is honest. The second scheme gives another tracing method which does not always assume that a signer is honest. Furthermore, in the method, an illegal user can be traced by an authority itself, hence, it is efficient in terms of communication costs. However, in this scheme it is assumed that there exists only a legal verification algorithm. Thus, in general, this scheme cannot trace a modified signed document which is accepted by a modified verification algorithm. The third one is a scheme which requires no trusted signer and allows a modified verification algorithm. It can trace an illegal receiver or even a signer in such a situation. All of our schemes are constructed by simple combinations of standard signature schemes, consequently, one can flexibly choose suitable building blocks for satisfying requirements for a system.
Archive | 2005
Shoko Yonezawa; Kazue Sako
Archive | 2005
Shoko Yonezawa; Jun Furukawa
NEC journal of advanced technology | 2005
Kazue Sako; Shoko Yonezawa; Isamu Teranishi
Archive | 2006
Shoko Yonezawa; Kazue Sako
Archive | 2006
Shoko Yonezawa; Kazue Sako
Archive | 2006
Shoko Yonezawa; Kazue Sako
Archive | 2006
Shoko Yonezawa; Kazue Sako
Collaboration
Dive into the Shoko Yonezawa's collaboration.
National Institute of Advanced Industrial Science and Technology
View shared research outputs