Yoshito Kanamori
University of Alaska Anchorage
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yoshito Kanamori.
global communications conference | 2005
Yoshito Kanamori; Seong-Moo Yoo; Don A. Gregory; Frederick T. Sheldon
When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have computational power enough to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. We propose an authentication protocol using quantum superposition states instead of quantum entangled particles. Our protocol can be implemented with the current technologies we introduce in this paper.
global communications conference | 2008
Yoshito Kanamori; Bogdan Hoanca; Seong-Moo Yoo
In this paper, a novel three-party quantum authenticated key distribution with a partially trusted third party protocol is proposed. Unlike most classical cryptography, the security of the protocol does not rely on the amount of computations required to find the encryption key, but on physical properties of the transmission medium (i.e., quantum mechanical properties). The session key shared between participants is concealed from the trusted third party while the participants trust the third party regarding the authentication part. Thus, the proposed system will be preferable for network systems in/between institutions, which deal with highly sensitive information (e.g., military bases, research facilities, hospitals).
acm southeast regional conference | 2005
Yoshito Kanamori; Seong-Moo Yoo; Mohammad Al-Shurman
Since classical cryptography relies on difficulty and infeasibility of computation to find the plain text, the cryptography is losing security more and more as computational power is increased by technical innovations. Therefore, unconditionally secure cryptography has been expected. In this paper, we propose a novel, secure, no-key, protocol: Quantum Three-Pass Protocol (QTPP). In this protocol, quantum superposition states are used for transmission instead of classical signals in classical cryptography.
acm southeast regional conference | 2005
Mohammad Al-Shurman; Seong-Moo Yoo; Yoshito Kanamori
Wireless ad hoc networks routing protocols rely on traditional broadcast (flooding) in route establishment. Many nodes will rebroadcast the packet. Valuable network resources (e.g., battery power) can be consumed in flooding. In this paper, we will propose Vectorized Broadcast Routing (VBR) as an enhancement for LAR scheme 1 to reduce the broadcast. In case of discovery phase failure, VBR will enlarge the broadcast region again around the destination, unlike LAR where the network will be flooded with this request again. Simulation results show that VBR can decrease the number of routing packets by about one-third compared to LAR.
arXiv: Cryptography and Security | 2010
Yoshito Kanamori; Seong-Moo Yoo
International Journal of Computers and Applications | 2006
Yoshito Kanamori; Seong-Moo Yoo; Wendi Pan; Frederick T. Sheldon
global communications conference | 2006
Yoshito Kanamori; Seong-Moo Yoo; Frederick T. Sheldon
global communications conference | 2006
Yoshito Kanamori; Seong-Moo Yoo; Frederick T. Sheldon
Archive | 2013
Yoshito Kanamori; Minnie Yi-Miin Yen
Archive | 2006
Seong-Moo Yoo; Yoshito Kanamori