Yutaka Kawai
Mitsubishi Electric
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yutaka Kawai.
the cryptographers track at the rsa conference | 2012
Goichiro Hanaoka; Yutaka Kawai; Noboru Kunihiro; Takahiro Matsuda; Jian Weng; Rui Zhang; Yunlei Zhao
In this paper, we present the first generic construction of a chosen-ciphertext (CCA) secure uni-directional proxy re-encryption (PRE) scheme. In particular, full CCA security (i.e., not relaxed CCA security such as replayable CCA security) of our proposed scheme is proven even against powerful adversaries that are given a more advantageous attack environment than in all previous works, and furthermore, random oracles are not required. To achieve such strong security, we establish a totally novel methodology for designing PRE based on a specific class of threshold encryption. Via our generic construction, we present the first construction that is CCA secure in the standard model.
international conference on pairing based cryptography | 2012
Yusuke Sakai; Keita Emura; Goichiro Hanaoka; Yutaka Kawai; Takahiro Matsuda; Kazumasa Omote
This paper introduces a new capability of the group signature, called message-dependent opening. It is intended to weaken the higher trust put on an opener, that is, no anonymity against an opener is provided by ordinary group signature. In a group signature system with message-dependent opening (GS-MDO), in addition to the opener, we set up the admitter which is not able to open any users identity but admits the opener to open signatures by specifying messages whose signatures should be opened. For any signature whose corresponding message is not specified by the admitter, the opener cannot extract the signers identity from it. In this paper, we present formal definitions and constructions of GS-MDO. Furthermore, we also show that GS-MDO implies identity-based encryption, and thus for designing a GS-MDO scheme, identity-based encryption is crucial. Actually, we propose a generic construction of GS-MDO from identity-based encryption and adaptive NIZK proofs, and its specific instantiation from the Groth-Sahai proof system by constructing a new (k-resilient) identity-based encryption scheme which is compatible to the Groth-Sahai proof.
information security practice and experience | 2009
Yutaka Kawai; Kazuki Yoneyama
Secret handshake allows two members in the same group to authenticate each other secretly. In previous works of secret handshake schemes, two types of anonymities against the group authority (GA) of a group G are discussed: 1)Even GA cannot identify members, namely nobody can identify them (No-Traceability), 2)Only GA can identify members (Traceability). In this paper, first the necessity of tracing of the identification is shown. Second, we classify abilities of GA into the ability of identifying players and that of issuing the certificate to members. We introduce two anonymities Co-Traceability and Strong Detector Resistance . When a more strict anonymity is required ever for GA, the case 2) is unfavorable for members. Then, we introduce Co-Traceability where even if
international conference on pairing based cryptography | 2013
Yutaka Kawai; Katsuyuki Takashima
{\cal A}
the cryptographers’ track at the rsa conference | 2015
Satsuya Ohata; Yutaka Kawai; Takahiro Matsuda; Goichiro Hanaoka; Kanta Matsuura
has GAs ability of identifying members or issuing the certificate,
international workshop on security | 2016
Takato Hirano; Mitsuhiro Hattori; Yutaka Kawai; Nori Matsuda; Mitsugu Iwamoto; Yusuke Sakai; Tatsuji Munaka
{\cal A}
international workshop on security | 2011
Yusuke Sakai; Keita Emura; Goichiro Hanaoka; Yutaka Kawai; Kazumasa Omote
cannot trace members identification. However, if a scheme satisfies Co-Traceability, GA may be able to judge whether handshake players belong to the own group. Then, we introduce Strong Detector Resistance where even if an adversary
cryptology and network security | 2016
Kenichiro Hayasaka; Yutaka Kawai; Yoshihiro Koseki; Takato Hirano; Mitsugu Iwamoto
{\cal A}
european public key infrastructure workshop | 2011
Yutaka Kawai; Noboru Kunihiro
has GAs ability of identifying members,
provable security | 2018
Satoshi Yasuda; Yoshihiro Koseki; Yusuke Sakai; Fuyuki Kitagawa; Yutaka Kawai; Goichiro Hanaoka
{\cal A}
Collaboration
Dive into the Yutaka Kawai's collaboration.
National Institute of Advanced Industrial Science and Technology
View shared research outputsNational Institute of Information and Communications Technology
View shared research outputs