Publication List

Book Chapters

  1. Takeshi Koshiba, "Quantum Cryptography", In, Grzegorz Rozenberg, Thomas H. W. Back, Joost N. Kok (eds.), Handbook of Natural Computing, pp.1521-1543, Springer (2012).
  2. Akinori Kawachi, Takeshi Koshiba, "Quantum Computational Cryptography", In, Hiroshi Imai and Masahito Hayashi (eds.), Quantum Computation and Information: From Theory to Experiment, Topics in Applied Physics 102, pp.167-184, Springer (2006).

Invited Papers

  1. Takeshi Koshiba, Katsuyuki Takashima: "New assumptions on isogenous pairing groups with applications to attribute-based encryption", in Proceedings of the 21st International Conference on Information Security and Cryptography, ICISC 2018, Lecture Notes in Computer Science 11396, pp.3-19, Springer (2019).
  2. Takeshi Koshiba, "Security notions for quantum public-key cryptography", IEICE Trasactions on Fundamentals of Electronics, Communications and Computer Sciences, J90A(5):367-375 (2007), in Japanese. English Version: LANL Archive quant-ph/0702183, 2007.
  3. Akinori Kawachi, Takeshi Koshiba, "Progress in quantum computational cryptography", Journal of Universal Computer Science, 12(6):691-709 (2006).

Peer-Reviewed Papers

  1. Tushar Kanti Saha, Deevashwer Rathee, Takeshi Koshiba: Efficient protocols for private wildcards pattern matching, Journal of Information Security and Applications, 55, Article 102609 (2020).
  2. Mehdi Foroozandeh Shahraki, Shohreh Ariaeenejad, Fereshteh Fallah Atanaki, Behrouz Zolfaghari, Takeshi Koshiba, Kaveh Kavousi, Ghasem Hosseini Salekdeh: MCIC: Automated Identification of Cellulases from Metagenomic data and Characterization Based on Temperature and pH Dependence, Frontiers in Microbiology, 11, Article 567863 (2020).
  3. Takeshi Koshiba: Fourier-based verifiable function secret sharing, to appear in Proceedings of the International Symposium on Information Theory and Its Applications 2020, ISITA 2020.
  4. Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai: Enhanced secure comparison schemes using homomorphic encryption, in Proceedings of the 23rd International Conference on Network-Based Information Systems, NBiS 2020, Advances in Intelligent Systems and Computing 1264, pp.211-224, Springer (2021).
  5. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Combined interactive protocol for lattice-based group signature schemes with verifier-local revocation, International Journal of Grid and Utility Computing, 11(5):662-673 (2020).
  6. Behrouz Zolfaghari, Gautam Srivastava, Swapnoneel Roy, Hamid R. Nemati, Fatemeh Afghah, Takeshi Koshiba, Abolfazl Razi, Khodakhast Bibak, Pinaki Mitra, Brijesh Kumar Rai: Content delivery networks: State of the art, trends and future roadmap, ACM Computing Surveys, 53(2), Article 34 (2020).
  7. Pranab Kumar Dhar, Azizul Hakim Chowdhury, Takeshi Koshiba: Blind audio watermarking based on parametric-slant Hadamard transform and Hessenberg decomposition, Symmetry, 12(3), Article 333 (2020).
  8. Farhana Shirin Chowdhury, Pranab Kumar Dhar, Kaushik Deb, Takeshi Koshiba: Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling, Symmetry, 12(2), Article 266 (2020).
  9. Vikrant Singh, Behrouz Zolfaghari, Chunduri Venkata Dheeraj Kumar, Brijesh Kumar Rai, Khodakhast Bibak, Gautam Srivastava, Swapnoneel Roy, Takeshi Koshiba: Generalized Mm,r-network: A case for fixed message dimensions, IEEE Communications Letters, 24(1):38-42 (2020).
  10. Tushar Kanti Saha, Mayank Rathee, Takeshi Koshiba: Efficient private database queries using ring-LWE somewhat homomorphic encryption, Journal of Information Security and Applications, 49, Article 102406 (2019).
  11. Go Sato, Takeshi Koshiba, Tomoyuki Morimae: Arbitrable blind quantum computation, Quantum Information Processing, 18(12), Article 370 (2019).
  12. Kenji Yasunaga, Takeshi Koshiba: Perfectly secure message transmission against independent rational adversaries, in Proceedings of the 10th Conference on Decision and Game Theory for Security, GameSec 2019, Lecture Notes in Computer Science 11836, pp.563-582, Springer (2019).
  13. Tomoyuki Morimae, Takeshi Koshiba: Impossibility of perfectly-secure one-round delegated quantum computing for classical client, Quantum Information & Computation, 19(3&4):214-221 (2019).
  14. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: A guests managing system with lattice-based verifier-local revocation group signature scheme with time-bound keys, to appear in Proceedings of the 5th International Conferene on Mathematics and Computation, ICMC 2019, Advances in Intelligent Systems and Computing 1170, pp.??-??, Springer (2020).
  15. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Achieving strong security and member registration for lattice-based group signature scheme with verifier-local revocation, Journal of Internet Services and Information Security, 8(4):1-15 (2018).
  16. Tushar Kanti Saha, Takeshi Koshiba: Outsourcing private equality tests to the cloud, Journal of Information Security and Applications, 43:83-98 (2018).
  17. (Outstanding Paper Award) Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba: Perfectly secure message transmission against rational timid adversaries, in Proceedings of the 9th Conference on Decision and Game Theory for Security, GameSec 2018, Lecture Notes in Computer Science 11199, pp.127-144, Springer (2018).
  18. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Achieving full security for lattice-based group signatures with verifier-local revocation, in Proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, Lecture Notes in Computer Science 11149, pp.287-302, Springer (2018).
  19. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Almost-fully secured fully dynamic group signatures with efficient verifier-local revocation and time-bound keys, in Proceedings of the 11th International Conference on Internet and Distributed Computing Systems, IDCS 2018, Lecture Notes in Computer Science 11226, pp.134-147, Springer (2018).
  20. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation, in Proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, Lecture Notes in Computer Science 11125, pp.229-247, Springer (2018).
  21. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Achieving strong security and verifier-local revocation for dynamic group signatures from lattice assumptions, in Proceedings of the 14th International Workshop on Security and Trust Management, STM 2018, Lecture Notes in Computer Science 11091, pp.3-19, Springer (2018).
  22. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Zero-knowledge proof for lattice-based group signature schemes with verifier-local revocation, in Proceedings of the 9th International Workshop on Trustworthy Computing and Security, TwCSec [email protected] 2018, Lecture Notes on Data Engineering and Communications Technologies 22, pp.772-782, Springer (2018).
  23. Masahito Hayashi, Takeshi Koshiba: Universal construction of cheater-identifiable secret sharing against rushing cheaters based on message authentication, in Proceedings of 2018 IEEE International Symposium on Information Theory, ISIT 2018, pp.2614-2618, IEEE (2018).
  24. Ei Mon Cho, Lwin San, Takeshi Koshiba: Non-transferable proxy re-encryption for multiple groups, International Journal of Space-Based and Situated Computing, 8(1):20-29 (2018).
  25. Takeshi Koshiba: Fourier-based function secret sharing with general access structure, in Proceedings of the 4th International Conference on Mathematics and Computing, ICMC 2018, Springer Proceedings in Mathematics and Statistics 253, pp.417-428, Springer (2018).
  26. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba: Fully dynamic group signature scheme with member registration and verifier-local revocation, in Proceedings of the 4th International Conference on Mathematics and Computing, ICMC 2018, Springer Proceedings in Mathematics and Statistics 253, pp.399-415, Springer (2018).
  27. Tushar Kanti Saha, Mayank, Deevashwer, Takeshi Koshiba: Private comparison protocol and its application to range queries, in Proceedings of the 10th International Conference on Internet and Distributed Computing Systems, IDCS 2017, Lecture Notes in Computer Science 10794, pp.128-141, Springer (2018).
  28. Tushar Kanti Saha, Takeshi Koshiba: Privacy-preserving equality test towards big data, in Proceedings of the 10th International Symposium on Foundations & Practice of Security, FPS 2017, Lecture Notes in Computer Science 10723, pp.95-110, Springer (2018).
  29. Tomohiro Ito, Hayato Koizumi, Nobumitsu Suzuki, Izumi Kakesu, Kento Iwakawa, Atsushi Uchida, Takeshi Koshiba, Jun Muramatsu, Kazuyuki Yoshimura, Masanobu Inubushi, Peter Davis: "Physical implementation of oblivious transfer using optical correlated randomness", Scientific Reports 7, 8444 [12 pages], (2017).
  30. Takuya Ohsawa, Naruhiro Kurokawa, Takeshi Koshiba: "Function secret sharing based on Fourier bases", in, L. Barolli, T. Enokido, M. Takizawa (eds.), Proceedings of the 8th International Workshop on Trustworthy Computing and Security, TwCSec [email protected] 2017, Lecture Notes on Data Engineering and Communications Technologies 7, pp.865-886, Springer (2017).
  31. Ei Mon Cho, Lwin San, Takeshi Koshiba: "Secure non-transferable proxy re-encryption for group membership and non-membership", in, L. Barolli, T. Enokido, M. Takizawa (eds.), Proceedings of the 8th International Workshop on Trustworthy Computing and Security, TwCSec [email protected] 2017, Lecture Notes on Data Engineering and Communications Technologies 7, pp.876-887, Springer (2017).
  32. Tushar Kanti Saha, Takeshi Koshiba: "An efficient privacy-preserving comparison protocol", in, L. Barolli, T. Enokido, M. Takizawa (eds.), Proceedings of the 20th International Conference on Network-Based Information Systems, NBiS 2017, Lecture Notes on Data Engineering and Communications Technologies 7, pp.553-565, Springer (2017).
  33. Tushar Kanti Saha, Mayank, Takeshi Koshiba: "Efficient protocols for private database queries", in Proceedings of the 31st IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2017, Lecture Notes in Computer Science 10359, pp.337-348, Springer (2017).
  34. Ei Mon Cho, Takeshi Koshiba, "Secure SMS transmission based on verifiable hash convergent group signcryption", in Proceedings of the 18th IEEE International Conference on Mobile Data Management, MDM 2017, pp.332-335, IEEE Computer Society (2017).
  35. Tushar Kanti Saha, Takeshi Koshiba, "Private conjunctive query over encrypted data", in Proceedings of AFRICACRYPT 2017, Lecture Notes in Computer Science 10239, pp.149-164, Springer (2017)
  36. Ei Mon Cho, Takeshi Koshiba, "Big data cloud deduplication based on verifiable hash convergent group signcryption", in Proceedings of the 3rd IEEE International Conference on Big Data Computing Service and Applications, pp.265-270, IEEE Computer Society (2017).
  37. Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba, "Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors", Journal of Mathematical Cryptology, 11(1):1-24 (2017).
  38. Ei Mon Cho, Takeshi Koshiba, "Secure deduplication in a multiple group signature setting", in Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, AINA 2017, pp.811-818, IEEE Computer Society (2017).
  39. Tushar Kanti Saha, Takeshi Koshiba, "Private equality test using ring-LWE somewhat homomorphic encryption", in Proceedings of the 3rd Asia-Pacific World Congress on Computer Science and Engineering, APWC on CSE 2016, pp.1-9, IEEE Computer Society (2016).
  40. Tushar Kanti Saha, Takeshi Koshiba, "An enhancement of privacy-preserving wildcards pattern matching", Proceedings of the 9th International Symposium on Foundations & Practice of Security, FPS 2016, Lecture Notes in Computer Science 10128, pp.145-160, Springer (2017).
  41. Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba, "Privacy-preserving fuzzy commitment for biometrics via layered error-correcting codes", in, J. Garcia-Alfaro, E. Kranakis, G. Bonfante (eds.), Proceedings of the 8th International Symposium on Foundations & Practice of Security, FPS 2015, Lecture Notes in Computer Science 9482, pp.117-133, Springer (2016).
  42. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Secure statistical analysis using RLWE-based homomorphic encryption", in, E. Foo and D. Stebila (eds.), Proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, Lecture Notes in Computer Science 9144, pp.471-487, Springer (2015).
  43. Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, "Secure data devolution: Practical re-encryption with auxiliary data in LWE-based somewhat homomorphic encryption", in Proceedings of the 3rd International Workshop on Security in Cloud Computing ([email protected] 2015), pp.53-61, ACM (2015).
  44. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "New packing method in somewhat homomorphic encryption and its applications", Security and Communication Networks, 8(13):2194-2213 (2015).
  45. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption", in, W. Susilo and Y. Mu (eds.), Proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, Lecture Notes in Computer Science 8544, pp.338-353, Springer (2014).
  46. Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba, "On the exact decryption range for Gentry-Halevi's Implementation of Fully Homomorphic Encryption", Journal of Mathematical Cryptology, 8(3):305-329 (2014).
  47. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Secure Pattern Matching using Somewhat Homomorphic Encryption", in Proceedings of the 2013 ACM Workshop on Cloud Computing Security (CCSW 2013), pp.65-76, ACM (2013).
  48. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Practical Packing Method in Somewhat Homomorphic Encryption", In, J. Garcia-Alfaro et al. (eds.), Proceedings of the 8th International Workshop on Data Privacy Management, DPM 2013, Lecture Notes in Computer Science 8247, pp.34-50, Springer (2014).
  49. Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba, "Packed Homomorphic Encryption based on Ideal Lattices and its Application to Biometrics", In, A. Cuzzocrea et al. (eds.), Proceedings of CD-ARES Workshops 2013 (The 2nd International Workshop on Modern Cryptography and Security Engineering, MoCrySEn 2013), Lecture Notes in Computer Science 8128, pp.55-74, Springer (2013).
  50. Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae, "Ancilla-Driven Universal Blind Quantum Computation", Physical Review A, 87, 060301 (R) [5 pages], (2013).
  51. Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami, "Computational Indistinguishability between Quantum States and Its Cryptographic Application", Journal of Cryptology, 25(3):528-555 (2012). Preliminary version: in, Ronald Cramer (ed.), Advances in Cryptology --- EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp.268-284, Springer (2005).
  52. Takeshi Koshiba, Shinya Sawada, "Public Discussion Must be Back and Forth in Secure Message Transmission", In, K.-H. Rhee and D.-H. Nyang (eds.), Proceedings of the 13th International Conference on Information Security and Cryptology, ICISC 2010. Lecture Notes in Computer Science 6829, pp.325-337, Springer (2011).
  53. Takeshi Koshiba, Takanori Odaira, "Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function", In, A. Childs and M. Mosca (eds.), Proceedings of the 4th Workshop on Theory of Quantum Computation, Communication, and Cryptography, TQC 2009, Lecture Notes in Computer Science 5906, pp.33-46, Springer (2009).
  54. Kai Yuen Cheong, Takeshi Koshiba, "Reducing Complexity Assumptions for Oblivious Transfer", In, Tsuyoshi Takagi and Masahiro Mambo (eds.), Proceedings of the 4th International Workshop on Security, IWSEC 2009, Lecture Notes in Computer Science 5824, pp.110-124, Springer (2009).
  55. Kai Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama, "Strengthening the Security of Distributed Oblivious Transfer", In, C. Boyd and J. Gonzalez Nieto (eds.), Proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, Lecture Notes in Computer Science 5594, pp.377-388, Springer (2009).
  56. Kaoru Kurosawa, Takeshi Koshiba, "Simple Direct Reduction of String (1,2)-OT to Rabin's OT without Privacy Amplification", In, Rei Safavi-Naini (ed.), Proceedings of the 3rd International Conference on Information Theoretic Security, ICITS 2008, Lecture Notes in Computer Science 5155, pp.199-209, Springer (2008).
  57. Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba, "A Combinatorial Approach to Deriving Lower Bounds for Perfectly Secure Oblivious Transfer Reductions", IEEE Transactions on Information Theory, 54(6):2566-2571 (2008).
  58. Kai Yuen Cheong, Takeshi Koshiba, "More on Security of Public-Key Cryptosystems Based on Chebyshev Polynomials", IEEE Transactions on Circuits and Systems II, 54(9):795-799 (2007).
  59. Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama, "Low-Density Attack Revisited", Designs, Codes and Cryptography, 43(1):47-59 (2007).
  60. Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Rudy Raymond H. Putra, "Universal Test for Quantum One-Way Permutations", Theoretical Computer Science, 345(2-3):370-385 (2005). Preliminary Version: in, Jiri Fiala, Vaclav Koubek, Jan Kratochvil (eds.), Proceedings of the 29th International Symposium on Mathematical Foundations of Computer Science, MFCS2004, Lecture Notes in Computer Science 3153, pp.839-850, Springer (2004).
  61. Takeshi Koshiba, Kaoru Kurosawa, "Short Exponent Diffie-Hellman Problems", In, Feng Bao, Robert Deng, Jianying Zhou (eds.), Proceedings of the 7th International Workshop on Practice and Theory in Public Key Cryptography, PKC2004, Lecture Notes in Computer Science 2947, pp.173-186, Springer (2004).
  62. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba, "Theoretical Analysis of χ2 Attack on RC6", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E87A(1):28-36 (2004). Preliminary Version: in, Rei Safavi-Naini, Jennifer Seberry (eds.), Proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP2003, Lecture Notes in Computer Science 2727, pp.142-153, Springer (2003).
  63. Takeshi Koshiba, Kunihiko Hiraishi, "A Note on Finding One-Variable Patterns Consistent with Examples and Counterexamples", In, Masami Ito, Teruo Imaoka (eds.), Words, Languages and Combinatorics III, Proceedings of the 3rd International Colloquium, pp.253-265, World Scientific (2003).
  64. Takeshi Koshiba, "On Sufficient Randomness for Secure Public-Key Cryptosystems", In, David Naccache, Pascal Paillier (eds.), Proceedings of the 5th international Workshop on Practice and Theory in Public Key Cryptography, PKC2002, Lecture Notes in Computer Science 2274, pp.34-47, Springer (2002).
  65. Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba, "Multiple Linear Cryptanalysis of a Reduced-Round RC6", In, Joan Daemen, Vincent Rijmen (eds.), Proceedings of the 9th International Workshop on Fast Software Encryption, FSE2002, Lecture Notes in Computer Science 2365, pp.76-88, Springer (2002).
  66. Takeshi Koshiba, "Polynomial-Time Algorithms for the Equivalence for One-Way Quantum Finite Automata", In, Peter Eades, Tadao Takaoka (eds.), Proceedings of the 12th Annual International Symposium on Algorithms and Computation, ISAAC 2001, Lecture Notes in Computer Science 2223, pp.268-278, Springer (2001).
  67. Takeshi Koshiba, "A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes", In, Kwangjo Kim (ed.), Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC2001, Lecture Notes in Computer Science 1992, pp.87-103, Springer (2001).
  68. Taiichi Saito, Takeshi Koshiba, Akihiro Yamamura, "The Decision Diffie-Hellman Assumption and the Quadratic Residuosity Assumption", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E84A(1):165-171 (2001).
  69. Takeshi Koshiba, "A Theory of Randomness for Public Key Cryptosystems: The ElGamal Cryptosystem Case", IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E83A(4):614-619 (2000).
  70. Takeshi Koshiba, Erkki Mäkinen, Yuji Takada, "Inferring Pure Context-Free Languages from Positive Data", Acta Cybernetica, 14(3):469-477 (2000).
  71. Takeshi Koshiba, "A Technique for Boosting the Security of Cryptographic Systems with One-way Hash Functions", In, JooSeok Song (ed.), Proceedings of the 2nd International Conference on Information Security and Cryptology, ICISC'99, Lecture Notes in Computer Science 1787, pp.76-81, Springer (2000).
  72. Kazuo Misue, Kiyoshi Nitta, Kozo Sugiyama, Takeshi Koshiba, Robert Inder, "Enhancing D-ABDUCTOR Towards a Diagrammatic User Interface Platform", Proceedings of the 2nd International Conference on Knowledge-Based Intelligent Electronic Systems, KES'98, Vol.1, pp.359-368, IEEE (1998).
  73. Takeshi Koshiba, "Computational Learning Theoretic Cryptanalysis of Language Theoretic Cryptosystems", In, Yongfei Han, Tatsuaki Okamoto, Jianying Zhou (eds.), Proceedings of the 1st International Conference on Information and Communications Security, ICICS'97, Lecture Notes in Computer Science 1334, pp.28-38, Springer (1997).
  74. Takeshi Koshiba, "On a Hierarchy of Slender Languages Based on Control Sets", Fundamenta Informaticae, 31(1):41-47 (1997).
  75. Takeshi Koshiba, Erkki Mäkinen, Yuji Takada, "Learning Deterministic Even Linear Languages from Positive Examples", Theoretical Computer Science, 185(1):63-79 (1997). Preliminary Version: "Learning Strongly Deterministic Even Linear Languages from Positive Examples", In, Klaus P. Jantke, Takeshi Shinohara, Thomas Zeugmann (eds.), Proceedings of the 6th International Workshop on Algorithmic Learning Theory, ALT'95, Lecture Notes in Artificial Intelligence 997, pp.41-54, Springer (1995).
  76. Yasubumi Sakakibara, Kazuo Misue, Takeshi Koshiba, "A Machine Learning Approach to Knowledge Acquisitions from Text Databases", International Journal of Human-Computer Interaction, 8(3):309-324 (1996).
  77. Takeshi Koshiba, "Decision Tree Learning System with Switching Evaluator", In, Gordon McCalla (ed.), Proceedings of the 11th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, AI'96, Lecture Notes in Artificial Intelligence 1081, pp.349-361, Springer (1996).
  78. Takeshi Koshiba, "Typed Pattern Languages and Their Learnability", In, Paul Vitanyi (ed.), Proceedings of the 2nd European Conference on Computational Learning Theory, EuroCOLT'95, Lecture Notes in Artificial Intelligence 904, pp.367-379, Springer (1995).
  79. Yasubumi Sakakibara, Kazuo Misue, Takeshi Koshiba, "Text Classification and Keyword Extraction by Learning Decision Trees", Proceedings of the 9th Conference on Artificial Intelligence for Applications, CAIA'93, p.466, IEEE Computer Society (1993).

Conference Talks (and Posters)

  1. Maharage Nisansala Sevwandi Perera, Takeshi Koshiba, "Achieving strong security and member registration for lattice-based group signature scheme with verifier-local revocation", ProvSec 2018 Workhop, (Jeju Island, Korea, 2018.10.25)
  2. Takeshi Koshiba, "Secure Message Transmission against Rational Adversaries" (Invited Talk), Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling, IMI workshop of the Joint Research Projects (Fukuoka, 2017.6.13)
  3. Takeshi Koshiba, "Quantum Bloom Filter" (Invited Talk), Workshop on Secure Quantum Computing, (Tokyo, 2015.3.19)
  4. Amit Raj Baral, Takeshi Koshiba, "Data Management over Garbled Bloom Filter for Private Set Intersection", The 13th International Conference on Computer Applications, ICCA 2015, pp.276-283 (Yangon, Myanmar, 2015.2.5)
  5. Takeshi Koshiba, Shinya Sawada, "On unidirectional public discussion in secure message transmission", The 1st International Conference on Energy, Environment and Human Engineering, ICEEHE 2013, p.53 (Yangon, Myanmar, 2013.12.21)
  6. Tomoyuki Morimae, Takeshi Koshiba, "Composable security of measuring-Alice blind quantum computation", The 7th International Conference on Information Theoretic Security, ICITS 2013 (Singapore, 2013.11.29)
  7. Takeshi Koshiba, "Composable Security of Blind Computation" (Invited Talk), Quantum Science Symposium Asia 2013, QSS-ASIA 2013 (Tokyo, 2013.11.26)
  8. Takeshi Koshiba, Ryuhei Mori, Osamu Watanabe, Masaki Yamamoto, "Analysis of Message Passing Algorithms for the 3XORSAT Problem", ELC International Meeting on Inference, Computation and Spin Glasses, ICSG 2013 (Sapporo, 2013.7.28)
  9. Takeshi Koshiba, "Quantum Oblivious Transfer and Quantum One-Way Functions", Japan-Singapore Workshop on Multi-User Quantum Network (Singapore, 2012.9)
  10. Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae, "Ancilla-Driven Blind Quantum Computation", The 2nd Conference on Quantum Cryptography, QCRYPT 2012 (Singapore, 2012.9)
  11. Takeshi Koshiba, Takanori Odaira, "Non-Interactive Statistically-Hiding Quantum Bit Commitment From Any Quantum One-Way Function", The 14th Workshop on Quantum Information Processing, QIP 2011 (Singapore, 2011.1)
  12. Kai Yuen Cheong, Min-Hsiu Hsieh, Takeshi Koshiba, "A Weak Quantum Oblivious Transfer", The 10th Asian Conference on Quantum Information Science, AQIS 2010, pp.151-152 (Tokyo, 2010.8)
  13. Takeshi Koshiba, "Quantum Bit Commitment from Quantum One-Way Function" (Invited Talk), International Conference on Quantum Information and Technology, (Tokyo, 2009.12).
  14. Takeshi Koshiba, "Security Notions for Quantum Public-Key Cryptography", The 10th Workshop on Quantum Information Processing, QIP 2007 (Brisbane, Australia, 2007.1)
  15. Takeshi Koshiba, "Quantum Public Key Cryptosystem" (Invited Talk), Workshop on Theory of Quantum Computation, Communication and Cryptography, TQC 2006 (Atsugi, 2006.2).
  16. Takeshi Koshiba, "Public-Key Cryptography Withstanding Quantum Adversaries", The 2nd Japanese-German Frontiers of Science Symposium, JGFoS 2005 (Hayama, 2005.11).
  17. David Avis, Kazuo Iwama, Takeshi Koshiba, Rudy Raymond H. Putra, "Semidefinite Programming for the Equivalence of Finite Automata and Quantum Circuits", The 11th International Conference on Applications of Computer Algebra, ACA 2005 (Nara, 2005.8).
  18. Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Rudy Raymond H. Putra, "Characterizing the Existence of Quantum One-Way Permutations", The 7th Workshop on Quantum Information Processing, QIP 2004 (Waterloo, Canada, 2004.1).
  19. Akinori Kawachi, Hirotada Kobayashi, Takeshi Koshiba, Rudy Raymond H. Putra, "A Characterization of Quantum One-Way Permutations", ERATO Conference on Quantum Information Science 2003, EQIS 2003, pp.153-154 (Kyoto, 2003.9).
  20. Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami, "A Quantum Trapdoor One-Way Function that Relies on the Hardness of the Graph Automorphism Problem", ERATO Conference on Quantum Information Science 2003, EQIS 2003, pp.115-116 (Kyoto, 2003.9).
  21. Takeshi Koshiba, "Universal Sampling Oracles and 3-Round Zero-Knowledge Protocols", Japan-Korea Joint Workshop on Information Security and Cryptology 2000, JWISC 2000, pp.213-219 (Okinawa, 2000.1).
  22. Yuji Takada, Takeshi Koshiba, "A Formal Model of Hierarchical Multiple Blackboard Systems", The 5th Workshop on Multiagent and Cooperative Computation, MACC'95, Japan Society for Software Science and Technology (Hakone, 1995.11).

Preprints

  1. Takeshi Koshiba, Yoshiharu Seri, "Round-Efficient One-Way Permutation Based Pefectly Concealing Bit Commitment Scheme", Electronic Colloquium on Computational Complexity, TR06-093, 2006.
  2. Takeshi Koshiba, Osamu Watanabe, "Self-Definable Claw Free Functions", Technical Report No.TR97-0006, Department of Computer Science, Tokyo Institute of Technology, 1997.

テンプレートのpondt