Masayuki ABE

Cryptographer

Publications

Journals

  • M. Abe, S.M. Chow, K. Haralambiev, M. Ohkubo, “Double-Trapdoor Anonymous Tags for Traceable Signatures”, International Journal of Information Security, 2013, DOI 10.1007/s10207-012-0184-3

  • M. Abe, T. Okamoto, K. Suzuki, “Message Recovery Signature Schemes from Sigma-Protocols", IEICE Trans. Fundamentals, Vol. E96-A, No.1, 2013

  • M. Abe, M. Ohkubo, “A Framework for Universally Composable Non-Committing Blind Signatures", International Journal of Applied Cryptography, Vol.2 No.3, pp.229-249, 2012, http://dx.doi.org/10.1504/IJACT.2012.045581

  • M. Abe, E. Kiltz, T. Okamoto, “Chosen Ciphertext Security with Optimal Ciphertext Overhead", IEICE Trans. Fundamentals, Vol.E93-A(1), pp.22-33, 2010

  • M. Abe, Y. Cui, H. Imai, E. Kiltz, “Efficient Hybrid Encryption from ID-Based Encryption", Designs, Codes and Cryptography, Vol.54, No.3, pp.205-240, 2010

  • M. Abe, Y. Cui, H. Imai, K. Kurosawa, “Tag-KEM from Set Partial Domain One-Way Permutations", IEICE Trans. Fundamentals, Vol.E92-A(1), pp.42-52, January 2009

  • M. Ohkubo and M. Abe, “On the Definitions of Anonymity for Ring Signatures", IEICE Trans. Fundamentals, Vol. E91-A(1), pp.272-282, January 2008

  • M. Abe, R. Gennaro, K. Kurosawa, “Tag-KEM/DEM: A New Framework for Hybrid Encryption" Journal of Cryptology, Vol. 21(1), pp.97-130, January 2008.

  • M. Abe, H. Imai, “Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions" IEICE Trans. Fundamentals, Vol. E89-A, No. 1, pp.99-105, January 2006

  • K. Chida and M. Abe, “Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext", IEICE Trans. Fundamentals, Vol. E88-A, No. 1, pp.211-221, January 2005

  • M. Abe, M. Ohkubo and K. Suzuki, “Efficient Threshold Signer-Ambiguous Signatures from Variety of Keys" IEICE Trans. Fundamentals, Vol. E87-A, No. 2, pp.471-479, February 2004

  • M. Abe, M. Ohkubo and K. Suzuki, “1-out-of-n Signatures from a Variety of Keys", IEICE Trans. Fundamentals, Vol. E87-A, No. 1, pp.131-140, January 2004

  • M. Abe, “Combining Encryption and Proof of Knowledge in the Random Oracle Model", The Computer Journal, Vol. 47, pp.58-70, No. 1, pp.58-70, 2004

  • M. Abe and K. Suzuki, “M+1-st Auction Using Homomorphic Encryption", IEICE Trans. Fundamentals, Vol. E86-A, No. 1, pp.136-141, January 2003

  • F. Hoshino, M. Abe and T. Kobayashi, “Lenient/Strict Batch Verification in Several Groups", IEICE Trans. Fundamentals, Vol. E86-A, No. 1, pp.64-72, January 2003

  • M. Abe and M. Kanda, “A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication", The Computer Journal, Vol. 45, No. 6, pp.661-671, 2002, British Computer Society, 2002

  • M. Abe and T. Okamoto, “Delegation Chains Secure up to Constant Length", IEICE Trans. Fundamentals, Vol. E85-A, No. 1, pp.110-116, January, 2002

  • M. Ohkubo and M. Abe, “A Length-Invariant Hybrid Mix", IEICE Trans. Fundamentals, Vol. E84-A, No. 4, pp.931-940, April, 2001

  • M. Abe and T. Okamoto, “A Signature Scheme with Message Recovery as Secure as Discrete Logarithm", IEICE Trans. Fundamentals, Vol. E84-A, No. 2, pp.197-204, February, 2001

  • M. Abe, “Universally Verifiable Mix-net with Verification Work Independent of the Number of Mix-servers", IEICE Trans. Fundamentals, Vol. E83-A, No. 7, pp.1431-1440, July, 2000

  • M. Abe, “Non-Interactive and Optimally Resilient Distributed Multiplication", IEICE Trans. Fundamentals, Vol. E83-A, No. 4, pp.598-605, April, 2000