## Publication List

### Book Chapters

- Takeshi Koshiba, "Quantum Cryptography", In, Grzegorz
Rozenberg, Thomas H. W. Back, Joost N. Kok (eds.),
*Handbook of Natural Computing*, pp.1521-1543, Springer (2012). - Akinori Kawachi, Takeshi Koshiba, "Quantum Computational Cryptography", In, Hiroshi Imai and Masahito Hayashi (eds.),
*Quantum Computation and Information: From Theory to Experiment*, Topics in Applied Physics 102, pp.167-184, Springer (2006).

### Invited Papers

- Takeshi Koshiba, Katsuyuki Takashima: "New assumptions on isogenous pairing groups with applications to attribute-based encryption", in
*Proceedings of the 21st International Conference on Information Security and Cryptography*, ICISC 2018, Lecture Notes in Computer Science 11396, pp.3-19, Springer (2019). - Takeshi Koshiba, "Security notions for quantum public-key cryptography",
*IEICE Trasactions on Fundamentals of Electronics, Communications and Computer Sciences,*J90A(5):367-375 (2007), in Japanese. English Version: LANL Archive quant-ph/0702183, 2007. - Akinori Kawachi, Takeshi Koshiba, "Progress in quantum computational cryptography",
*Journal of Universal Computer Science,*12(6):691-709 (2006).

### Peer-Reviewed Papers

- Tushar Kanti Saha, Deevashwer Rathee, Takeshi Koshiba:
Efficient protocols for private wildcards pattern matching,
*Journal of Information Security and Applications*, 55, Article 102609 (2020). - Mehdi Foroozandeh Shahraki, Shohreh Ariaeenejad, Fereshteh Fallah Atanaki, Behrouz Zolfaghari, Takeshi Koshiba, Kaveh Kavousi, Ghasem Hosseini Salekdeh:
MCIC: Automated Identification of Cellulases from Metagenomic data and Characterization Based on Temperature and pH Dependence,
*Frontiers in Microbiology*, 11, Article 567863 (2020). - Takeshi Koshiba: Fourier-based verifiable function secret sharing, to appear
in
*Proceedings of the International Symposium on Information Theory and Its Applications 2020*, ISITA 2020. - Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai: Enhanced secure comparison schemes using homomorphic encryption, in
*Proceedings of the 23rd International Conference on Network-Based Information Systems*, NBiS 2020, Advances in Intelligent Systems and Computing 1264, pp.211-224, Springer (2021). - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation,
*International Journal of Grid and Utility Computing*, 11(5):662-673 (2020). - Behrouz Zolfaghari, Gautam Srivastava, Swapnoneel Roy, Hamid R. Nemati, Fatemeh Afghah, Takeshi Koshiba, Abolfazl Razi, Khodakhast Bibak, Pinaki Mitra, Brijesh Kumar Rai:
Content delivery networks: State of the art, trends and future roadmap,
*ACM Computing Surveys*, 53(2), Article 34 (2020). - Pranab Kumar Dhar, Azizul Hakim Chowdhury, Takeshi Koshiba:
Blind audio watermarking based on parametric-slant Hadamard transform and Hessenberg decomposition,
*Symmetry*, 12(3), Article 333 (2020). - Farhana Shirin Chowdhury, Pranab Kumar Dhar, Kaushik Deb, Takeshi Koshiba:
Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling,
*Symmetry*, 12(2), Article 266 (2020). - Vikrant Singh, Behrouz Zolfaghari, Chunduri Venkata Dheeraj Kumar, Brijesh Kumar Rai, Khodakhast Bibak, Gautam Srivastava, Swapnoneel Roy, Takeshi Koshiba:
Generalized
*M*-network: A case for fixed message dimensions,_{m,r}*IEEE Communications Letters*, 24(1):38-42 (2020). - Tushar Kanti Saha, Mayank Rathee, Takeshi Koshiba: Efficient private database queries using ring-LWE somewhat homomorphic encryption,
*Journal of Information Security and Applications*, 49, Article 102406 (2019). - Go Sato, Takeshi Koshiba, Tomoyuki Morimae:
Arbitrable blind quantum computation,
*Quantum Information Processing*, 18(12), Article 370 (2019). - Kenji Yasunaga, Takeshi Koshiba:
Perfectly secure message transmission against independent rational adversaries,
in
*Proceedings of the 10th Conference on Decision and Game Theory for Security*, GameSec 2019, Lecture Notes in Computer Science 11836, pp.563-582, Springer (2019). - Tomoyuki Morimae, Takeshi Koshiba: Impossibility of perfectly-secure one-round delegated quantum computing for classical client,
*Quantum Information & Computation*, 19(3&4):214-221 (2019). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
A guests managing system with lattice-based verifier-local revocation group signature scheme with time-bound keys,
to appear in
*Proceedings of the 5th International Conferene on Mathematics and Computation*, ICMC 2019, Advances in Intelligent Systems and Computing 1170, pp.??-??, Springer (2020). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving strong security and member registration for lattice-based group signature scheme with verifier-local revocation,
*Journal of Internet Services and Information Security*, 8(4):1-15 (2018). - Tushar Kanti Saha, Takeshi Koshiba:
Outsourcing private equality tests to the cloud,
*Journal of Information Security and Applications*, 43:83-98 (2018). - (Outstanding Paper Award) Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba:
Perfectly secure message transmission against rational timid adversaries,
in
*Proceedings of the 9th Conference on Decision and Game Theory for Security*, GameSec 2018, Lecture Notes in Computer Science 11199, pp.127-144, Springer (2018). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving full security for lattice-based group signatures with verifier-local revocation,
in
*Proceedings of the 20th International Conference on Information and Communications Security*, ICICS 2018, Lecture Notes in Computer Science 11149, pp.287-302, Springer (2018). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Almost-fully secured fully dynamic group signatures with efficient
verifier-local revocation and time-bound keys,
in
*Proceedings of the 11th International Conference on Internet and Distributed Computing Systems*, IDCS 2018, Lecture Notes in Computer Science 11226, pp.134-147, Springer (2018). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation,
in
*Proceedings of the 14th International Conference on Information Security Practice and Experience*, ISPEC 2018, Lecture Notes in Computer Science 11125, pp.229-247, Springer (2018). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Achieving strong security and verifier-local revocation for dynamic group signatures from lattice assumptions,
in
*Proceedings of the 14th International Workshop on Security and Trust Management*, STM 2018, Lecture Notes in Computer Science 11091, pp.3-19, Springer (2018). -
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Zero-knowledge proof for lattice-based group signature schemes with verifier-local revocation,
in
*Proceedings of the 9th International Workshop on Trustworthy Computing and Security*, TwCSec [email protected] 2018, Lecture Notes on Data Engineering and Communications Technologies 22, pp.772-782, Springer (2018). -
Masahito Hayashi, Takeshi Koshiba:
Universal construction of cheater-identifiable secret sharing against rushing cheaters based on message authentication,
in
*Proceedings of 2018 IEEE International Symposium on Information Theory*, ISIT 2018, pp.2614-2618, IEEE (2018). - Ei Mon Cho, Lwin San, Takeshi Koshiba:
Non-transferable proxy re-encryption for multiple groups,
*International Journal of Space-Based and Situated Computing*, 8(1):20-29 (2018). - Takeshi Koshiba:
Fourier-based function secret sharing with general access structure,
in
*Proceedings of the 4th International Conference on Mathematics and Computing*, ICMC 2018, Springer Proceedings in Mathematics and Statistics 253, pp.417-428, Springer (2018). - Maharage Nisansala Sevwandi Perera, Takeshi Koshiba:
Fully dynamic group signature scheme with member registration and verifier-local revocation,
in
*Proceedings of the 4th International Conference on Mathematics and Computing*, ICMC 2018, Springer Proceedings in Mathematics and Statistics 253, pp.399-415, Springer (2018). - Tushar Kanti Saha, Mayank, Deevashwer, Takeshi Koshiba:
Private comparison protocol and its application to range queries,
in
*Proceedings of the 10th International Conference on Internet and Distributed Computing Systems*, IDCS 2017, Lecture Notes in Computer Science 10794, pp.128-141, Springer (2018). - Tushar Kanti Saha, Takeshi Koshiba:
Privacy-preserving equality test towards big data,
in
*Proceedings of the 10th International Symposium on Foundations & Practice of Security*, FPS 2017, Lecture Notes in Computer Science 10723, pp.95-110, Springer (2018). -
Tomohiro Ito, Hayato Koizumi, Nobumitsu Suzuki, Izumi Kakesu, Kento Iwakawa, Atsushi Uchida, Takeshi Koshiba, Jun Muramatsu, Kazuyuki Yoshimura, Masanobu Inubushi, Peter Davis: "Physical implementation of oblivious transfer using optical correlated randomness",
*Scientific Reports*7, 8444 [12 pages], (2017). - Takuya Ohsawa, Naruhiro Kurokawa, Takeshi Koshiba:
"Function secret sharing based on Fourier bases",
in, L. Barolli, T. Enokido, M. Takizawa (eds.),
*Proceedings of the 8th International Workshop on Trustworthy Computing and Security*, TwCSec [email protected] 2017, Lecture Notes on Data Engineering and Communications Technologies 7, pp.865-886, Springer (2017). - Ei Mon Cho, Lwin San, Takeshi Koshiba:
"Secure non-transferable proxy re-encryption for group membership and non-membership",
in, L. Barolli, T. Enokido, M. Takizawa (eds.),
*Proceedings of the 8th International Workshop on Trustworthy Computing and Security*, TwCSec [email protected] 2017, Lecture Notes on Data Engineering and Communications Technologies 7, pp.876-887, Springer (2017). - Tushar Kanti Saha, Takeshi Koshiba:
"An efficient privacy-preserving comparison protocol",
in, L. Barolli, T. Enokido, M. Takizawa (eds.),
*Proceedings of the 20th International Conference on Network-Based Information Systems*, NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies 7, pp.553-565, Springer (2017). -
Tushar Kanti Saha, Mayank, Takeshi Koshiba:
"Efficient protocols for private database queries",
in
*Proceedings of the 31st IFIP WG 11.3 Conference on Data and Applications Security and Privacy*, DBSec 2017, Lecture Notes in Computer Science 10359, pp.337-348, Springer (2017). - Ei Mon Cho, Takeshi Koshiba, "Secure SMS transmission based on verifiable hash convergent group signcryption", in
*Proceedings of the 18th IEEE International Conference on Mobile Data Management*, MDM 2017, pp.332-335, IEEE Computer Society (2017). - Tushar Kanti Saha, Takeshi Koshiba, "Private conjunctive query over encrypted data", in
*Proceedings of AFRICACRYPT 2017*, Lecture Notes in Computer Science 10239, pp.149-164, Springer (2017) - Ei Mon Cho, Takeshi Koshiba, "Big data cloud deduplication based on verifiable hash convergent group signcryption", in
*Proceedings of the 3rd IEEE International Conference on Big Data Computing Service and Applications*, pp.265-270, IEEE Computer Society (2017). - Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba, "Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors",
*Journal of Mathematical Cryptology,*11(1):1-24 (2017). - Ei Mon Cho, Takeshi Koshiba,
"Secure deduplication in a multiple group signature setting",
in
*Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications*, AINA 2017, pp.811-818, IEEE Computer Society (2017). - Tushar Kanti Saha, Takeshi Koshiba,
"Private equality test using ring-LWE somewhat homomorphic encryption",
in
*Proceedings of the 3rd Asia-Pacific World Congress on Computer Science and Engineering*, APWC on CSE 2016, pp.1-9, IEEE Computer Society (2016). - Tushar Kanti Saha, Takeshi Koshiba,
"An enhancement of privacy-preserving wildcards pattern matching",
*Proceedings of the 9th International Symposium on Foundations & Practice of Security*, FPS 2016, Lecture Notes in Computer Science 10128, pp.145-160, Springer (2017). - Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada,
Takashi Shinzaki, Takeshi Koshiba,
"Privacy-preserving fuzzy commitment for biometrics via layered
error-correcting codes", in, J. Garcia-Alfaro, E. Kranakis, G. Bonfante
(eds.),
*Proceedings of the 8th International Symposium on Foundations & Practice of Security*, FPS 2015, Lecture Notes in Computer Science 9482, pp.117-133, Springer (2016). - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Secure statistical analysis using RLWE-based homomorphic encryption",
in, E. Foo and D. Stebila (eds.),
*Proceedings of the 20th Australasian Conference on Information Security and Privacy*, ACISP 2015, Lecture Notes in Computer Science 9144, pp.471-487, Springer (2015). - Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, "Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption", in
*Proceedings of the 3rd International Workshop on Security in Cloud Computing*([email protected] 2015), pp.53-61, ACM (2015). - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "New packing method in somewhat homomorphic encryption and its applications",
*Security and Communication Networks*, 8(13):2194-2213 (2015). - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Privacy-preserving wildcards pattern matching using
symmetric somewhat homomorphic encryption", in, W. Susilo and Y. Mu (eds.),
*Proceedings of the 19th Australasian Conference on Information Security and Privacy*, ACISP 2014, Lecture Notes in Computer Science 8544, pp.338-353, Springer (2014). - Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba, "On the exact decryption range for Gentry-Halevi's Implementation of Fully Homomorphic Encryption",
*Journal of Mathematical Cryptology*, 8(3):305-329 (2014). - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Secure Pattern Matching using Somewhat Homomorphic Encryption", in
*Proceedings of the 2013 ACM Workshop on Cloud Computing Security*(CCSW 2013), pp.65-76, ACM (2013). - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Practical Packing Method in Somewhat Homomorphic Encryption",
In, J. Garcia-Alfaro et al. (eds.),
*Proceedings of the 8th International Workshop on Data Privacy Management*, DPM 2013, Lecture Notes in Computer Science 8247, pp.34-50, Springer (2014). - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Packed Homomorphic Encryption based on Ideal Lattices and its
Application to Biometrics", In, A. Cuzzocrea et al. (eds.),
*Proceedings of CD-ARES Workshops 2013*(The 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013), Lecture Notes in Computer Science 8128, pp.55-74, Springer (2013). - Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae, "Ancilla-Driven Universal Blind Quantum Computation",
*Physical Review A*, 87, 060301 (R) [5 pages], (2013). - Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami, "Computational Indistinguishability between Quantum States and Its Cryptographic
Application",
*Journal of Cryptology*, 25(3):528-555 (2012). Preliminary version: in, Ronald Cramer (ed.),*Advances in Cryptology --- EUROCRYPT 2005*, Lecture Notes in Computer Science 3494, pp.268-284, Springer (2005). - Takeshi Koshiba, Shinya Sawada, "Public Discussion Must be Back and Forth in Secure Message Transmission",
In, K.-H. Rhee and D.-H. Nyang (eds.),
*Proceedings of the 13th International Conference on Information Security and Cryptology*, ICISC 2010. Lecture Notes in Computer Science 6829, pp.325-337, Springer (2011). - Takeshi Koshiba, Takanori Odaira, "Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function", In, A. Childs and M. Mosca (eds.),
*Proceedings of the 4th Workshop on Theory of Quantum Computation, Communication, and Cryptography*, TQC 2009, Lecture Notes in Computer Science 5906, pp.33-46, Springer (2009). - Kai Yuen Cheong, Takeshi Koshiba, "Reducing Complexity Assumptions
for Oblivious Transfer", In, Tsuyoshi Takagi and Masahiro Mambo (eds.),
*Proceedings of the 4th International Workshop on Security*, IWSEC 2009, Lecture Notes in Computer Science 5824, pp.110-124, Springer (2009). - Kai Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama, "Strengthening
the Security of Distributed Oblivious Transfer", In, C. Boyd and J.
Gonzalez Nieto (eds.),
*Proceedings of the 14th Australasian Conference on Information Security and Privacy*, ACISP 2009, Lecture Notes in Computer Science 5594, pp.377-388, Springer (2009). - Kaoru Kurosawa, Takeshi Koshiba, "Simple Direct Reduction of String
(1,2)-OT to Rabin's OT without Privacy Amplification", In, Rei Safavi-Naini
(ed.),
*Proceedings of the 3rd International Conference on Information Theoretic Security*, ICITS 2008, Lecture Notes in Computer Science 5155, pp.199-209, Springer (2008). - Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba, "A Combinatorial
Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer
Reductions",
*IEEE Transactions on Information Theory*, 54(6):2566-2571 (2008). - Kai Yuen Cheong, Takeshi Koshiba, "More on Security of Public-Key Cryptosystems Based on Chebyshev Polynomials",
*IEEE Transactions on Circuits and Systems II*, 54(9):795-799 (2007). - Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama, "Low-Density Attack Revisited",
*Designs, Codes and Cryptography,*43(1):47-59 (2007). - Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Rudy Raymond H. Putra, "Universal Test for Quantum One-Way Permutations",
*Theoretical Computer Science,*345(2-3):370-385 (2005). Preliminary Version: in, Jiri Fiala, Vaclav Koubek, Jan Kratochvil (eds.),*Proceedings of the 29th International Symposium on Mathematical Foundations of Computer Science*, MFCS2004, Lecture Notes in Computer Science 3153, pp.839-850, Springer (2004). - Takeshi Koshiba, Kaoru Kurosawa, "Short Exponent Diffie-Hellman Problems", In, Feng Bao, Robert Deng, Jianying Zhou (eds.),
*Proceedings of the 7th International Workshop on Practice and Theory in Public Key Cryptography*, PKC2004, Lecture Notes in Computer Science 2947, pp.173-186, Springer (2004). - Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba, "Theoretical Analysis of χ
^{2}Attack on RC6",*IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,*E87A(1):28-36 (2004). Preliminary Version: in, Rei Safavi-Naini, Jennifer Seberry (eds.),*Proceedings of the 8th Australasian Conference on Information Security and Privacy*, ACISP2003, Lecture Notes in Computer Science 2727, pp.142-153, Springer (2003). - Takeshi Koshiba, Kunihiko Hiraishi, "A Note on Finding One-Variable Patterns Consistent with Examples and Counterexamples", In, Masami Ito, Teruo Imaoka (eds.),
*Words, Languages and Combinatorics III, Proceedings of the 3rd International Colloquium*, pp.253-265, World Scientific (2003). - Takeshi Koshiba, "On Sufficient Randomness for Secure Public-Key Cryptosystems", In, David Naccache, Pascal Paillier (eds.),
*Proceedings of the 5th international Workshop on Practice and Theory in Public Key Cryptography*, PKC2002, Lecture Notes in Computer Science 2274, pp.34-47, Springer (2002). - Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba, "Multiple Linear Cryptanalysis of a Reduced-Round RC6", In, Joan Daemen, Vincent Rijmen (eds.),
*Proceedings of the 9th International Workshop on Fast Software Encryption*, FSE2002, Lecture Notes in Computer Science 2365, pp.76-88, Springer (2002). - Takeshi Koshiba, "Polynomial-Time Algorithms for the Equivalence for One-Way Quantum Finite Automata", In, Peter Eades, Tadao Takaoka (eds.),
*Proceedings of the 12th Annual International Symposium on Algorithms and Computation*, ISAAC 2001, Lecture Notes in Computer Science 2223, pp.268-278, Springer (2001). - Takeshi Koshiba, "A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes", In, Kwangjo Kim (ed.),
*Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography*, PKC2001, Lecture Notes in Computer Science 1992, pp.87-103, Springer (2001). - Taiichi Saito, Takeshi Koshiba, Akihiro Yamamura,
"The Decision Diffie-Hellman Assumption and the Quadratic Residuosity Assumption",
*IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences*, E84A(1):165-171 (2001). - Takeshi Koshiba,
"A Theory of Randomness for Public Key Cryptosystems: The ElGamal Cryptosystem Case",
*IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,*E83A(4):614-619 (2000). - Takeshi Koshiba, Erkki Mäkinen, Yuji Takada, "Inferring Pure Context-Free Languages from Positive Data",
*Acta Cybernetica,*14(3):469-477 (2000). - Takeshi Koshiba, "A Technique for Boosting the Security of Cryptographic Systems with One-way Hash Functions", In, JooSeok Song (ed.),
*Proceedings of the 2nd International Conference on Information Security and Cryptology*, ICISC'99, Lecture Notes in Computer Science 1787, pp.76-81, Springer (2000). - Kazuo Misue, Kiyoshi Nitta, Kozo Sugiyama, Takeshi Koshiba, Robert Inder, "Enhancing D-ABDUCTOR Towards a Diagrammatic User Interface Platform",
*Proceedings of the 2nd International Conference on Knowledge-Based Intelligent Electronic Systems*, KES'98, Vol.1, pp.359-368, IEEE (1998). - Takeshi Koshiba, "Computational Learning Theoretic Cryptanalysis of
Language Theoretic Cryptosystems", In, Yongfei Han, Tatsuaki Okamoto,
Jianying Zhou (eds.),
*Proceedings of the 1st International Conference on Information and Communications Security*, ICICS'97, Lecture Notes in Computer Science 1334, pp.28-38, Springer (1997). - Takeshi Koshiba,
"On a Hierarchy of Slender Languages Based on Control Sets",
*Fundamenta Informaticae,*31(1):41-47 (1997). - Takeshi Koshiba, Erkki Mäkinen, Yuji Takada, "Learning Deterministic Even Linear Languages from Positive Examples",
*Theoretical Computer Science,*185(1):63-79 (1997). Preliminary Version: "Learning Strongly Deterministic Even Linear Languages from Positive Examples", In, Klaus P. Jantke, Takeshi Shinohara, Thomas Zeugmann (eds.),*Proceedings of the 6th International Workshop on Algorithmic Learning Theory*, ALT'95, Lecture Notes in Artificial Intelligence 997, pp.41-54, Springer (1995). - Yasubumi Sakakibara, Kazuo Misue, Takeshi Koshiba,
"A Machine Learning Approach to Knowledge Acquisitions from Text Databases",
*International Journal of Human-Computer Interaction,*8(3):309-324 (1996). -
Takeshi Koshiba,
"Decision Tree Learning System with Switching Evaluator",
In, Gordon McCalla (ed.),
*Proceedings of the 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence*, AI'96, Lecture Notes in Artificial Intelligence 1081, pp.349-361, Springer (1996). -
Takeshi Koshiba,
"Typed Pattern Languages and Their Learnability",
In, Paul Vitanyi (ed.),
*Proceedings of the 2nd European Conference on Computational Learning Theory*, EuroCOLT'95, Lecture Notes in Artificial Intelligence 904, pp.367-379, Springer (1995). -
Yasubumi Sakakibara, Kazuo Misue, Takeshi Koshiba,
"Text Classification and Keyword Extraction by Learning Decision Trees",
*Proceedings of the 9th Conference on Artificial Intelligence for Applications*, CAIA'93, p.466, IEEE Computer Society (1993).

### Conference Talks (and Posters)

- Maharage Nisansala Sevwandi Perera, Takeshi Koshiba, "Achieving strong security and member registration for lattice-based group signature scheme with verifier-local revocation",
*ProvSec 2018 Workhop*, (Jeju Island, Korea, 2018.10.25) - Takeshi Koshiba, "Secure Message Transmission against Rational Adversaries" (Invited Talk),
*Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling*, IMI workshop of the Joint Research Projects (Fukuoka, 2017.6.13) - Takeshi Koshiba, "Quantum Bloom Filter" (Invited Talk),
*Workshop on Secure Quantum Computing*, (Tokyo, 2015.3.19) - Amit Raj Baral, Takeshi Koshiba, "Data Management over Garbled Bloom
Filter for Private Set Intersection",
*The 13th International Conference on Computer Applications*, ICCA 2015, pp.276-283 (Yangon, Myanmar, 2015.2.5) - Takeshi Koshiba, Shinya Sawada, "On unidirectional public discussion in secure message transmission",
*The 1st International Conference on Energy, Environment and Human Engineering*, ICEEHE 2013, p.53 (Yangon, Myanmar, 2013.12.21) - Tomoyuki Morimae, Takeshi Koshiba, "Composable security of measuring-Alice blind quantum computation",
*The 7th International Conference on Information Theoretic Security*, ICITS 2013 (Singapore, 2013.11.29) - Takeshi Koshiba, "Composable Security of Blind Computation" (Invited Talk),
*Quantum Science Symposium Asia 2013*, QSS-ASIA 2013 (Tokyo, 2013.11.26) - Takeshi Koshiba, Ryuhei Mori, Osamu Watanabe, Masaki Yamamoto, "Analysis of Message Passing Algorithms for the 3XORSAT Problem",
*ELC International Meeting on Inference, Computation and Spin Glasses*, ICSG 2013 (Sapporo, 2013.7.28) - Takeshi Koshiba, "Quantum Oblivious Transfer and Quantum One-Way Functions",
*Japan-Singapore Workshop on Multi-User Quantum Network*(Singapore, 2012.9) - Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae, "Ancilla-Driven Blind Quantum Computation",
*The 2nd Conference on Quantum Cryptography*, QCRYPT 2012 (Singapore, 2012.9) - Takeshi Koshiba, Takanori Odaira, "Non-Interactive Statistically-Hiding Quantum Bit Commitment From Any Quantum One-Way Function",
*The 14th Workshop on Quantum Information Processing*, QIP 2011 (Singapore, 2011.1) - Kai Yuen Cheong, Min-Hsiu Hsieh, Takeshi Koshiba, "A Weak Quantum Oblivious Transfer",
*The 10th Asian Conference on Quantum Information Science*, AQIS 2010, pp.151-152 (Tokyo, 2010.8) - Takeshi Koshiba, "Quantum Bit Commitment from Quantum One-Way Function" (Invited Talk),
*International Conference on Quantum Information and Technology*, (Tokyo, 2009.12). - Takeshi Koshiba, "Security Notions for Quantum Public-Key Cryptography",
*The 10th Workshop on Quantum Information Processing*, QIP 2007 (Brisbane, Australia, 2007.1) - Takeshi Koshiba, "Quantum Public Key Cryptosystem" (Invited Talk),
*Workshop on Theory of Quantum Computation, Communication and Cryptography*, TQC 2006 (Atsugi, 2006.2). - Takeshi Koshiba, "Public-Key Cryptography Withstanding Quantum Adversaries",
*The 2nd Japanese-German Frontiers of Science Symposium*, JGFoS 2005 (Hayama, 2005.11). - David Avis, Kazuo Iwama, Takeshi Koshiba, Rudy Raymond H. Putra, "Semidefinite Programming for the Equivalence of Finite Automata and Quantum Circuits",
*The 11th International Conference on Applications of Computer Algebra*, ACA 2005 (Nara, 2005.8). - Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Rudy Raymond H. Putra,
"Characterizing the Existence of Quantum One-Way Permutations",
*The 7th Workshop on Quantum Information Processing*, QIP 2004 (Waterloo, Canada, 2004.1). -
Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Rudy Raymond H. Putra,
"A Characterization of Quantum One-Way Permutations",
*ERATO Conference on Quantum Information Science 2003*, EQIS 2003, pp.153-154 (Kyoto, 2003.9). -
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami,
"A Quantum Trapdoor One-Way Function that Relies on the Hardness of the Graph Automorphism Problem",
*ERATO Conference on Quantum Information Science 2003*, EQIS 2003, pp.115-116 (Kyoto, 2003.9). -
Takeshi Koshiba,
"Universal Sampling Oracles and 3-Round Zero-Knowledge Protocols",
*Japan-Korea Joint Workshop on Information Security and Cryptology 2000*, JWISC 2000, pp.213-219 (Okinawa, 2000.1). - Yuji Takada, Takeshi Koshiba,
"A Formal Model of Hierarchical Multiple Blackboard Systems",
*The 5th Workshop on Multiagent and Cooperative Computation*, MACC'95, Japan Society for Software Science and Technology (Hakone, 1995.11).

### Preprints

- Takeshi Koshiba, Yoshiharu Seri, "Round-Efficient One-Way Permutation Based Pefectly Concealing Bit Commitment Scheme", Electronic Colloquium on Computational Complexity, TR06-093, 2006.
- Takeshi Koshiba, Osamu Watanabe, "Self-Definable Claw Free Functions", Technical Report No.TR97-0006, Department of Computer Science, Tokyo Institute of Technology, 1997.