default search action
BibTeX records: Takato Hirano
@inproceedings{DBLP:conf/sacrypt/HiranoKKYWAIO24,
author = {Takato Hirano and
Yutaka Kawai and
Yoshihiro Koseki and
Satoshi Yasuda and
Yohei Watanabe and
Takumi Amada and
Mitsugu Iwamoto and
Kazuo Ohta},
editor = {Maria Eichlseder and
S{\'{e}}bastien Gambs},
title = {Multi-user Dynamic Searchable Encryption for Prefix-Fixing Predicates
from Symmetric-Key Primitives},
booktitle = {Selected Areas in Cryptography - {SAC} 2024 - 31st International Conference,
Montreal, QC, Canada, August 28-30, 2024, Revised Selected Papers,
Part {I}},
series = {Lecture Notes in Computer Science},
pages = {105--127},
publisher = {Springer},
year = {2024},
url = {https://doi.org/10.1007/978-3-031-82852-2\_5},
doi = {10.1007/978-3-031-82852-2\_5},
timestamp = {Tue, 08 Apr 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/sacrypt/HiranoKKYWAIO24.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/desec/HiranoKK21,
author = {Takato Hirano and
Yutaka Kawai and
Yoshihiro Koseki},
title = {DBMS-Friendly Searchable Symmetric Encryption: Constructing Index
Generation Suitable for Database Management Systems},
booktitle = {{IEEE} Conference on Dependable and Secure Computing, {DSC} 2021,
Aizuwakamatsu, Japan, January 30 - February 2, 2021},
pages = {1--8},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.1109/DSC49826.2021.9346255},
doi = {10.1109/DSC49826.2021.9346255},
timestamp = {Wed, 17 Feb 2021 11:46:28 +0100},
biburl = {https://dblp.org/rec/conf/desec/HiranoKK21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icmu/MoriHNI21,
author = {Ikumi Mori and
Takato Hirano and
Yoshitaka Nakamura and
Hiroshi Inamura},
title = {Determination of Parameters Balancing between Security and Search
Performance on Searchable Encryption},
booktitle = {Thirteenth International Conference on Mobile Computing and Ubiquitous
Network, {ICMU} 2021, Tokyo, Japan, November 17-19, 2021},
pages = {1--8},
publisher = {{IEEE}},
year = {2021},
url = {https://doi.org/10.23919/ICMU50196.2021.9638859},
doi = {10.23919/ICMU50196.2021.9638859},
timestamp = {Wed, 07 Dec 2022 00:00:00 +0100},
biburl = {https://dblp.org/rec/conf/icmu/MoriHNI21.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/MatsudaHKIHYN20,
author = {Nori Matsuda and
Takato Hirano and
Yutaka Kawai and
Takashi Ito and
Mitsuhiro Hattori and
Tadakazu Yamanaka and
Masakatsu Nishigaki},
title = {Public-key Searchable Encryption with Index Generation for Shared
Database},
journal = {J. Inf. Process.},
volume = {28},
pages = {520--536},
year = {2020},
url = {https://doi.org/10.2197/ipsjjip.28.520},
doi = {10.2197/IPSJJIP.28.520},
timestamp = {Tue, 14 Oct 2025 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/jip/MatsudaHKIHYN20.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaiMHKH19,
author = {Yutaka Kawai and
Takahiro Matsuda and
Takato Hirano and
Yoshihiro Koseki and
Goichiro Hanaoka},
title = {Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted
Ciphertexts},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {102-A},
number = {1},
pages = {81--98},
year = {2019},
url = {https://doi.org/10.1587/transfun.E102.A.81},
doi = {10.1587/TRANSFUN.E102.A.81},
timestamp = {Sun, 19 Jan 2025 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/ieicet/KawaiMHKH19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HattoriHMOSW18,
author = {Mitsuhiro Hattori and
Takato Hirano and
Nori Matsuda and
Fumio Omatsu and
Rina Shimizu and
Ye Wang},
title = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation
of Smart-Meter Data},
journal = {J. Inf. Process.},
volume = {26},
pages = {648--661},
year = {2018},
url = {https://doi.org/10.2197/ipsjjip.26.648},
doi = {10.2197/IPSJJIP.26.648},
timestamp = {Tue, 16 Feb 2021 00:00:00 +0100},
biburl = {https://dblp.org/rec/journals/jip/HattoriHMOSW18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HiranoKK18,
author = {Takato Hirano and
Yutaka Kawai and
Yoshihiro Koseki},
editor = {Chunhua Su and
Hiroaki Kikuchi},
title = {Efficient Trapdoor Generation from Multiple Hashing in Searchable
Symmetric Encryption},
booktitle = {Information Security Practice and Experience - 14th International
Conference, {ISPEC} 2018, Tokyo, Japan, September 25-27, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {160--175},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-319-99807-7\_10},
doi = {10.1007/978-3-319-99807-7\_10},
timestamp = {Tue, 14 May 2019 10:00:40 +0200},
biburl = {https://dblp.org/rec/conf/ispec/HiranoKK18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AttrapadungHHKK18,
author = {Nuttapong Attrapadung and
Goichiro Hanaoka and
Takato Hirano and
Yutaka Kawai and
Yoshihiro Koseki and
Jacob C. N. Schuldt},
editor = {Joonsang Baek and
Willy Susilo and
Jongkil Kim},
title = {Token-Based Multi-input Functional Encryption},
booktitle = {Provable Security - 12th International Conference, ProvSec 2018, Jeju,
South Korea, October 25-28, 2018, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {147--164},
publisher = {Springer},
year = {2018},
url = {https://doi.org/10.1007/978-3-030-01446-9\_9},
doi = {10.1007/978-3-030-01446-9\_9},
timestamp = {Tue, 14 May 2019 10:00:45 +0200},
biburl = {https://dblp.org/rec/conf/provsec/AttrapadungHHKK18.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HattoriHMSW17,
author = {Mitsuhiro Hattori and
Takato Hirano and
Nori Matsuda and
Rina Shimizu and
Ye Wang},
editor = {Josef Pieprzyk and
Suriadi Suriadi},
title = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation
of Smart-Meter Data},
booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
series = {Lecture Notes in Computer Science},
pages = {214--234},
publisher = {Springer},
year = {2017},
url = {https://doi.org/10.1007/978-3-319-59870-3\_12},
doi = {10.1007/978-3-319-59870-3\_12},
timestamp = {Fri, 18 Oct 2019 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/acisp/HattoriHMSW17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icassp/WangRIHHMS17,
author = {Ye Wang and
Nisarg Raval and
Prakash Ishwar and
Mitsuhiro Hattori and
Takato Hirano and
Nori Matsuda and
Rina Shimizu},
title = {On methods for privacy-preserving energy disaggregation},
booktitle = {2017 {IEEE} International Conference on Acoustics, Speech and Signal
Processing, {ICASSP} 2017, New Orleans, LA, USA, March 5-9, 2017},
pages = {6404--6408},
publisher = {{IEEE}},
year = {2017},
url = {https://doi.org/10.1109/ICASSP.2017.7953389},
doi = {10.1109/ICASSP.2017.7953389},
timestamp = {Sun, 25 Oct 2020 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/icassp/WangRIHHMS17.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/HayasakaKKHOI16,
author = {Kenichiro Hayasaka and
Yutaka Kawai and
Yoshihiro Koseki and
Takato Hirano and
Kazuo Ohta and
Mitsugu Iwamoto},
editor = {Sara Foresti and
Giuseppe Persiano},
title = {Probabilistic Generation of Trapdoors: Reducing Information Leakage
of Searchable Symmetric Encryption},
booktitle = {Cryptology and Network Security - 15th International Conference, {CANS}
2016, Milan, Italy, November 14-16, 2016, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {350--364},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-48965-0\_21},
doi = {10.1007/978-3-319-48965-0\_21},
timestamp = {Tue, 14 May 2019 10:00:50 +0200},
biburl = {https://dblp.org/rec/conf/cans/HayasakaKKHOI16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HiranoIKMYM16,
author = {Takato Hirano and
Takashi Ito and
Yutaka Kawai and
Nori Matsuda and
Takumi Yamamoto and
Tatsuji Munaka},
title = {A practical attack to AINA2014's countermeasure for cancelable biometric
authentication protocols},
booktitle = {2016 International Symposium on Information Theory and Its Applications,
{ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
pages = {315--319},
publisher = {{IEEE}},
year = {2016},
url = {https://ieeexplore.ieee.org/document/7840437/},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isita/HiranoIKMYM16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHKMIOSM16,
author = {Takato Hirano and
Mitsuhiro Hattori and
Yutaka Kawai and
Nori Matsuda and
Mitsugu Iwamoto and
Kazuo Ohta and
Yusuke Sakai and
Tatsuji Munaka},
editor = {Kazuto Ogawa and
Katsunari Yoshioka},
title = {Simple, Secure, and Efficient Searchable Symmetric Encryption with
Multiple Encrypted Indexes},
booktitle = {Advances in Information and Computer Security - 11th International
Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
2016, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {91--110},
publisher = {Springer},
year = {2016},
url = {https://doi.org/10.1007/978-3-319-44524-3\_6},
doi = {10.1007/978-3-319-44524-3\_6},
timestamp = {Tue, 14 May 2019 10:00:52 +0200},
biburl = {https://dblp.org/rec/conf/iwsec/HiranoHKMIOSM16.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KawaiHKM15,
author = {Yutaka Kawai and
Takato Hirano and
Yoshihiro Koseki and
Tatsuji Munaka},
editor = {Michael K. Reiter and
David Naccache},
title = {{SEPM:} Efficient Partial Keyword Search on Encrypted Data},
booktitle = {Cryptology and Network Security - 14th International Conference, {CANS}
2015, Marrakesh, Morocco, December 10-12, 2015, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {75--91},
publisher = {Springer},
year = {2015},
url = {https://doi.org/10.1007/978-3-319-26823-1\_6},
doi = {10.1007/978-3-319-26823-1\_6},
timestamp = {Mon, 02 Jan 2023 08:05:35 +0100},
biburl = {https://dblp.org/rec/conf/cans/KawaiHKM15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HattoriHIMMSO13,
author = {Mitsuhiro Hattori and
Takato Hirano and
Takashi Ito and
Nori Matsuda and
Takumi Mori and
Yusuke Sakai and
Kazuo Ohta},
title = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {96-A},
number = {1},
pages = {53--67},
year = {2013},
url = {https://doi.org/10.1587/transfun.E96.A.53},
doi = {10.1587/TRANSFUN.E96.A.53},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/HattoriHIMMSO13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HiranoHIM13,
author = {Takato Hirano and
Mitsuhiro Hattori and
Takashi Ito and
Nori Matsuda},
editor = {Kazuo Sakiyama and
Masayuki Terada},
title = {Cryptographically-Secure and Efficient Remote Cancelable Biometrics
Based on Public-Key Homomorphic Encryption},
booktitle = {Advances in Information and Computer Security - 8th International
Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
2013, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {183--200},
publisher = {Springer},
year = {2013},
url = {https://doi.org/10.1007/978-3-642-41383-4\_12},
doi = {10.1007/978-3-642-41383-4\_12},
timestamp = {Sun, 04 Aug 2024 19:41:44 +0200},
biburl = {https://dblp.org/rec/conf/iwsec/HiranoHIM13.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HiranoHIMM12,
author = {Takato Hirano and
Mitsuhiro Hattori and
Takashi Ito and
Nori Matsuda and
Takumi Mori},
title = {Homomorphic encryption based cancelable biometrics secure against
replay and its related attack},
booktitle = {Proceedings of the International Symposium on Information Theory and
its Applications, {ISITA} 2012, Honolulu, HI, USA, October 28-31,
2012},
pages = {421--425},
publisher = {{IEEE}},
year = {2012},
url = {https://ieeexplore.ieee.org/document/6400968/},
timestamp = {Wed, 11 Aug 2021 01:00:00 +0200},
biburl = {https://dblp.org/rec/conf/isita/HiranoHIMM12.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/HattoriHIMMSO11,
author = {Mitsuhiro Hattori and
Takato Hirano and
Takashi Ito and
Nori Matsuda and
Takumi Mori and
Yusuke Sakai and
Kazuo Ohta},
editor = {Liqun Chen},
title = {Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
to Searchable Encryption in Multi-user Setting},
booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
2011, Oxford, UK, December 12-15, 2011. Proceedings},
series = {Lecture Notes in Computer Science},
pages = {190--209},
publisher = {Springer},
year = {2011},
url = {https://doi.org/10.1007/978-3-642-25516-8\_12},
doi = {10.1007/978-3-642-25516-8\_12},
timestamp = {Wed, 18 Mar 2020 16:00:56 +0100},
biburl = {https://dblp.org/rec/conf/ima/HattoriHIMMSO11.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiranoT10,
author = {Takato Hirano and
Keisuke Tanaka},
title = {Key Generation for Fast Inversion of the Paillier Encryption Function},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {93-A},
number = {6},
pages = {1111--1121},
year = {2010},
url = {https://doi.org/10.1587/transfun.E93.A.1111},
doi = {10.1587/TRANSFUN.E93.A.1111},
timestamp = {Mon, 28 Aug 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/HiranoT10.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HiranoWT09,
author = {Takato Hirano and
Koichiro Wada and
Keisuke Tanaka},
title = {Primitive Power Roots of Unity and Its Application to Encryption},
journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
volume = {92-A},
number = {8},
pages = {1836--1844},
year = {2009},
url = {https://doi.org/10.1587/transfun.E92.A.1836},
doi = {10.1587/TRANSFUN.E92.A.1836},
timestamp = {Sun, 22 Oct 2023 01:00:00 +0200},
biburl = {https://dblp.org/rec/journals/ieicet/HiranoWT09.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiranoWT08,
author = {Takato Hirano and
Koichiro Wada and
Keisuke Tanaka},
editor = {Yi Mu and
Willy Susilo and
Jennifer Seberry},
title = {Public-Key Cryptosystems with Primitive Power Roots of Unity},
booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
series = {Lecture Notes in Computer Science},
pages = {98--112},
publisher = {Springer},
year = {2008},
url = {https://doi.org/10.1007/978-3-540-70500-0\_8},
doi = {10.1007/978-3-540-70500-0\_8},
timestamp = {Tue, 14 May 2019 10:00:46 +0200},
biburl = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.