BibTeX records: Takato Hirano

download as .bib file

@inproceedings{DBLP:conf/sacrypt/HiranoKKYWAIO24,
  author       = {Takato Hirano and
                  Yutaka Kawai and
                  Yoshihiro Koseki and
                  Satoshi Yasuda and
                  Yohei Watanabe and
                  Takumi Amada and
                  Mitsugu Iwamoto and
                  Kazuo Ohta},
  editor       = {Maria Eichlseder and
                  S{\'{e}}bastien Gambs},
  title        = {Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates
                  from Symmetric-Key Primitives},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2024 - 31st International Conference,
                  Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  pages        = {105--127},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-82852-2\_5},
  doi          = {10.1007/978-3-031-82852-2\_5},
  timestamp    = {Tue, 08 Apr 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HiranoKKYWAIO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/HiranoKK21,
  author       = {Takato Hirano and
                  Yutaka Kawai and
                  Yoshihiro Koseki},
  title        = {DBMS-Friendly Searchable Symmetric Encryption: Constructing Index
                  Generation Suitable for Database Management Systems},
  booktitle    = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021,
                  Aizuwakamatsu, Japan, January 30 - February 2, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/DSC49826.2021.9346255},
  doi          = {10.1109/DSC49826.2021.9346255},
  timestamp    = {Wed, 17 Feb 2021 11:46:28 +0100},
  biburl       = {https://dblp.org/rec/conf/desec/HiranoKK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmu/MoriHNI21,
  author       = {Ikumi Mori and
                  Takato Hirano and
                  Yoshitaka Nakamura and
                  Hiroshi Inamura},
  title        = {Determination of Parameters Balancing between Security and Search
                  Performance on Searchable Encryption},
  booktitle    = {Thirteenth International Conference on Mobile Computing and Ubiquitous
                  Network, {ICMU} 2021, Tokyo, Japan, November 17-19, 2021},
  pages        = {1--8},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.23919/ICMU50196.2021.9638859},
  doi          = {10.23919/ICMU50196.2021.9638859},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icmu/MoriHNI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/MatsudaHKIHYN20,
  author       = {Nori Matsuda and
                  Takato Hirano and
                  Yutaka Kawai and
                  Takashi Ito and
                  Mitsuhiro Hattori and
                  Tadakazu Yamanaka and
                  Masakatsu Nishigaki},
  title        = {Public-key Searchable Encryption with Index Generation for Shared
                  Database},
  journal      = {J. Inf. Process.},
  volume       = {28},
  pages        = {520--536},
  year         = {2020},
  url          = {https://doi.org/10.2197/ipsjjip.28.520},
  doi          = {10.2197/IPSJJIP.28.520},
  timestamp    = {Tue, 14 Oct 2025 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/MatsudaHKIHYN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaiMHKH19,
  author       = {Yutaka Kawai and
                  Takahiro Matsuda and
                  Takato Hirano and
                  Yoshihiro Koseki and
                  Goichiro Hanaoka},
  title        = {Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted
                  Ciphertexts},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {1},
  pages        = {81--98},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.81},
  doi          = {10.1587/TRANSFUN.E102.A.81},
  timestamp    = {Sun, 19 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaiMHKH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HattoriHMOSW18,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Nori Matsuda and
                  Fumio Omatsu and
                  Rina Shimizu and
                  Ye Wang},
  title        = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation
                  of Smart-Meter Data},
  journal      = {J. Inf. Process.},
  volume       = {26},
  pages        = {648--661},
  year         = {2018},
  url          = {https://doi.org/10.2197/ipsjjip.26.648},
  doi          = {10.2197/IPSJJIP.26.648},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jip/HattoriHMOSW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HiranoKK18,
  author       = {Takato Hirano and
                  Yutaka Kawai and
                  Yoshihiro Koseki},
  editor       = {Chunhua Su and
                  Hiroaki Kikuchi},
  title        = {Efficient Trapdoor Generation from Multiple Hashing in Searchable
                  Symmetric Encryption},
  booktitle    = {Information Security Practice and Experience - 14th International
                  Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {160--175},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-99807-7\_10},
  doi          = {10.1007/978-3-319-99807-7\_10},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HiranoKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AttrapadungHHKK18,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Takato Hirano and
                  Yutaka Kawai and
                  Yoshihiro Koseki and
                  Jacob C. N. Schuldt},
  editor       = {Joonsang Baek and
                  Willy Susilo and
                  Jongkil Kim},
  title        = {Token-Based Multi-input Functional Encryption},
  booktitle    = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
                  South Korea, October 25-28, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {147--164},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01446-9\_9},
  doi          = {10.1007/978-3-030-01446-9\_9},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AttrapadungHHKK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HattoriHMSW17,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Nori Matsuda and
                  Rina Shimizu and
                  Ye Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation
                  of Smart-Meter Data},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_12},
  doi          = {10.1007/978-3-319-59870-3\_12},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HattoriHMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WangRIHHMS17,
  author       = {Ye Wang and
                  Nisarg Raval and
                  Prakash Ishwar and
                  Mitsuhiro Hattori and
                  Takato Hirano and
                  Nori Matsuda and
                  Rina Shimizu},
  title        = {On methods for privacy-preserving energy disaggregation},
  booktitle    = {2017 {IEEE} International Conference on Acoustics, Speech and Signal
                  Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017},
  pages        = {6404--6408},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICASSP.2017.7953389},
  doi          = {10.1109/ICASSP.2017.7953389},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icassp/WangRIHHMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HayasakaKKHOI16,
  author       = {Kenichiro Hayasaka and
                  Yutaka Kawai and
                  Yoshihiro Koseki and
                  Takato Hirano and
                  Kazuo Ohta and
                  Mitsugu Iwamoto},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {Probabilistic Generation of Trapdoors: Reducing Information Leakage
                  of Searchable Symmetric Encryption},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {350--364},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_21},
  doi          = {10.1007/978-3-319-48965-0\_21},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/HayasakaKKHOI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HiranoIKMYM16,
  author       = {Takato Hirano and
                  Takashi Ito and
                  Yutaka Kawai and
                  Nori Matsuda and
                  Takumi Yamamoto and
                  Tatsuji Munaka},
  title        = {A practical attack to AINA2014's countermeasure for cancelable biometric
                  authentication protocols},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {315--319},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840437/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/HiranoIKMYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Yutaka Kawai and
                  Nori Matsuda and
                  Mitsugu Iwamoto and
                  Kazuo Ohta and
                  Yusuke Sakai and
                  Tatsuji Munaka},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Simple, Secure, and Efficient Searchable Symmetric Encryption with
                  Multiple Encrypted Indexes},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {91--110},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_6},
  doi          = {10.1007/978-3-319-44524-3\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KawaiHKM15,
  author       = {Yutaka Kawai and
                  Takato Hirano and
                  Yoshihiro Koseki and
                  Tatsuji Munaka},
  editor       = {Michael K. Reiter and
                  David Naccache},
  title        = {{SEPM:} Efficient Partial Keyword Search on Encrypted Data},
  booktitle    = {Cryptology and Network Security - 14th International Conference, {CANS}
                  2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {75--91},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26823-1\_6},
  doi          = {10.1007/978-3-319-26823-1\_6},
  timestamp    = {Mon, 02 Jan 2023 08:05:35 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/KawaiHKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HattoriHIMMSO13,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Takashi Ito and
                  Nori Matsuda and
                  Takumi Mori and
                  Yusuke Sakai and
                  Kazuo Ohta},
  title        = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {53--67},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.53},
  doi          = {10.1587/TRANSFUN.E96.A.53},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HattoriHIMMSO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHIM13,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Takashi Ito and
                  Nori Matsuda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Cryptographically-Secure and Efficient Remote Cancelable Biometrics
                  Based on Public-Key Homomorphic Encryption},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {183--200},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_12},
  doi          = {10.1007/978-3-642-41383-4\_12},
  timestamp    = {Sun, 04 Aug 2024 19:41:44 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HiranoHIM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HiranoHIMM12,
  author       = {Takato Hirano and
                  Mitsuhiro Hattori and
                  Takashi Ito and
                  Nori Matsuda and
                  Takumi Mori},
  title        = {Homomorphic encryption based cancelable biometrics secure against
                  replay and its related attack},
  booktitle    = {Proceedings of the International Symposium on Information Theory and
                  its Applications, {ISITA} 2012, Honolulu, HI, USA, October 28-31,
                  2012},
  pages        = {421--425},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6400968/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/HiranoHIMM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/HattoriHIMMSO11,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Takashi Ito and
                  Nori Matsuda and
                  Takumi Mori and
                  Yusuke Sakai and
                  Kazuo Ohta},
  editor       = {Liqun Chen},
  title        = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
                  to Searchable Encryption in Multi-user Setting},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {190--209},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_12},
  doi          = {10.1007/978-3-642-25516-8\_12},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/HattoriHIMMSO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiranoT10,
  author       = {Takato Hirano and
                  Keisuke Tanaka},
  title        = {Key Generation for Fast Inversion of the Paillier Encryption Function},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1111--1121},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1111},
  doi          = {10.1587/TRANSFUN.E93.A.1111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiranoT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiranoWT09,
  author       = {Takato Hirano and
                  Koichiro Wada and
                  Keisuke Tanaka},
  title        = {Primitive Power Roots of Unity and Its Application to Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1836--1844},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1836},
  doi          = {10.1587/TRANSFUN.E92.A.1836},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HiranoWT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiranoWT08,
  author       = {Takato Hirano and
                  Koichiro Wada and
                  Keisuke Tanaka},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Public-Key Cryptosystems with Primitive Power Roots of Unity},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_8},
  doi          = {10.1007/978-3-540-70500-0\_8},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}