BibTeX records: Kazuto Ogawa

download as .bib file

@article{DBLP:journals/ieiceta/KajitaOONT23,
  author       = {Kaisei Kajita and
                  Go Ohtake and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  title        = {Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS
                  Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {228--240},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0017},
  doi          = {10.1587/TRANSFUN.2022CIP0017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KajitaOONT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/KimuraEIIOO23,
  author       = {Hayato Kimura and
                  Keita Emura and
                  Takanori Isobe and
                  Ryoma Ito and
                  Kazuto Ogawa and
                  Toshihiro Ohigashi},
  title        = {A Deeper Look into Deep Learning-based Output Prediction Attacks Using
                  Weak {SPN} Block Ciphers},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {550--561},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.550},
  doi          = {10.2197/IPSJJIP.31.550},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/KimuraEIIOO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/KajitaEONO23,
  author       = {Kaisei Kajita and
                  Keita Emura and
                  Kazuto Ogawa and
                  Ryo Nojima and
                  Go Ohtake},
  editor       = {David J. Marchette and
                  Andrew H. Sung and
                  Rakesh M. Verma},
  title        = {Continuous Group Key Agreement with Flexible Authorization and Its
                  Applications},
  booktitle    = {Proceedings of the 9th {ACM} International Workshop on Security and
                  Privacy Analytics, IWSPA@CODASPY 2023, Charlotte, NC, USA, 26 April
                  2023},
  pages        = {3--13},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579987.3586570},
  doi          = {10.1145/3579987.3586570},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/codaspy/KajitaEONO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KimuraEIIOO22,
  author       = {Hayato Kimura and
                  Keita Emura and
                  Takanori Isobe and
                  Ryoma Ito and
                  Kazuto Ogawa and
                  Toshihiro Ohigashi},
  editor       = {Jianying Zhou and
                  Sridhar Adepu and
                  Cristina Alcaraz and
                  Lejla Batina and
                  Emiliano Casalicchio and
                  Sudipta Chattopadhyay and
                  Chenglu Jin and
                  Jingqiang Lin and
                  Eleonora Losiouk and
                  Suryadipta Majumdar and
                  Weizhi Meng and
                  Stjepan Picek and
                  Jun Shao and
                  Chunhua Su and
                  Cong Wang and
                  Yury Zhauniarovich and
                  Saman A. Zonouz},
  title        = {Output Prediction Attacks on Block Ciphers Using Deep Learning},
  booktitle    = {Applied Cryptography and Network Security Workshops - {ACNS} 2022
                  Satellite Workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S{\&}P,
                  SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13285},
  pages        = {248--276},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-16815-4\_15},
  doi          = {10.1007/978-3-031-16815-4\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/KimuraEIIOO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/EmuraKNOO22,
  author       = {Keita Emura and
                  Kaisei Kajita and
                  Ryo Nojima and
                  Kazuto Ogawa and
                  Go Ohtake},
  editor       = {Ilsun You and
                  Taek{-}Young Youn},
  title        = {Membership Privacy for Asynchronous Group Messaging},
  booktitle    = {Information Security Applications - 23rd International Conference,
                  {WISA} 2022, Jeju Island, South Korea, August 24-26, 2022, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13720},
  pages        = {131--142},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-25659-2\_10},
  doi          = {10.1007/978-3-031-25659-2\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/EmuraKNOO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EmuraKNOO22,
  author       = {Keita Emura and
                  Kaisei Kajita and
                  Ryo Nojima and
                  Kazuto Ogawa and
                  Go Ohtake},
  title        = {Membership Privacy for Asynchronous Group Messaging},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {46},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/046},
  timestamp    = {Fri, 18 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/EmuraKNOO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KajitaOONT22,
  author       = {Kaisei Kajita and
                  Go Ohtake and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  title        = {Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/479},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KajitaOONT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KajitaEONO22,
  author       = {Kaisei Kajita and
                  Keita Emura and
                  Kazuto Ogawa and
                  Ryo Nojima and
                  Go Ohtake},
  title        = {Continuous Group Key Agreement with Flexible Authorization and Its
                  Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1768},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1768},
  timestamp    = {Mon, 30 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KajitaEONO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/KajitaOO21,
  author       = {Kaisei Kajita and
                  Go Ohtake and
                  Kazuto Ogawa},
  title        = {Privacy-Preserving System for Enriched-Integrated Service},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {104-D},
  number       = {5},
  pages        = {647--658},
  year         = {2021},
  url          = {http://search.ieice.org/bin/summary.php?id=e104-d\_5\_647},
  timestamp    = {Mon, 17 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/KajitaOO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/0002E0IOO21,
  author       = {Hayato Kimura and
                  Keita Emura and
                  Takanori Isobe and
                  Ryoma Ito and
                  Kazuto Ogawa and
                  Toshihiro Ohigashi},
  title        = {Output Prediction Attacks on {SPN} Block Ciphers using Deep Learning},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {401},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/401},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/0002E0IOO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KajitaOF20,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Eiichiro Fujisaki},
  title        = {A Constant-Size Signature Scheme with a Tighter Reduction from the
                  {CDH} Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {141--149},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_141},
  doi          = {10.1587/TRANSFUN.2019CIP0015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KajitaOF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KajitaONT20,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Short Lattice Signatures in the Standard Model with Efficient Tag
                  Generation},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_5},
  doi          = {10.1007/978-3-030-62576-4\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KajitaONT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/KajitaOO19,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Go Ohtake},
  editor       = {Abbas Moallem},
  title        = {Privacy Preserving System for Real-Time Enriched-Integrated Service
                  with Feedback to Providers},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - First International Conference,
                  {HCI-CPT} 2019, Held as Part of the 21st {HCI} International Conference,
                  {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11594},
  pages        = {385--403},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22351-9\_26},
  doi          = {10.1007/978-3-030-22351-9\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/KajitaOO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/OgawaN19,
  author       = {Kazuto Ogawa and
                  Koji Nuida},
  editor       = {Abbas Moallem},
  title        = {Privacy Preservation for Versatile Pay-TV Services},
  booktitle    = {{HCI} for Cybersecurity, Privacy and Trust - First International Conference,
                  {HCI-CPT} 2019, Held as Part of the 21st {HCI} International Conference,
                  {HCII} 2019, Orlando, FL, USA, July 26-31, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11594},
  pages        = {417--428},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-22351-9\_28},
  doi          = {10.1007/978-3-030-22351-9\_28},
  timestamp    = {Wed, 17 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/OgawaN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Ogawa18,
  author       = {Kazuto Ogawa},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {1--2},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.1},
  doi          = {10.1587/TRANSFUN.E101.A.1},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Ogawa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AttrapadungHOOW18,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Go Ohtake and
                  Hajime Watanabe and
                  Shota Yamada},
  title        = {Attribute-Based Encryption for Range Attributes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {9},
  pages        = {1440--1455},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.1440},
  doi          = {10.1587/TRANSFUN.E101.A.1440},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AttrapadungHOOW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OgawaHI17,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  title        = {How to Make Traitor Tracing Schemes Secure against a Content Comparison
                  Attack in Actual Services},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {34--49},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.34},
  doi          = {10.1587/TRANSFUN.E100.A.34},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OgawaHI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OhtakeOH0KYI17,
  author       = {Go Ohtake and
                  Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Shota Yamada and
                  Kohei Kasamatsu and
                  Takashi Yamakawa and
                  Hideki Imai},
  title        = {Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption
                  and Its Performance Evaluation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1846--1856},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1846},
  doi          = {10.1587/TRANSFUN.E100.A.1846},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OhtakeOH0KYI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/KajitaOF17,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Eiichiro Fujisaki},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {A Constant-Size Signature Scheme with Tighter Reduction from {CDH}
                  Assumption},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {137--154},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_8},
  doi          = {10.1007/978-3-319-69659-1\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/KajitaOF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OgawaTH17,
  author       = {Kazuto Ogawa and
                  Sakurako Tamura and
                  Goichiro Hanaoka},
  editor       = {Giovanni Livraga and
                  Chris J. Mitchell},
  title        = {Key Management for Versatile Pay-TV Services},
  booktitle    = {Security and Trust Management - 13th International Workshop, {STM}
                  2017, Oslo, Norway, September 14-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10547},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68063-7\_1},
  doi          = {10.1007/978-3-319-68063-7\_1},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OgawaTH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KajitaOF17,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Eiichiro Fujisaki},
  title        = {A Constant-Size Signature Scheme with a Tighter Reduction from the
                  {CDH} Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1116},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1116},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KajitaOF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OgawaO16,
  author       = {Kazuto Ogawa and
                  Go Ohtake},
  title        = {Application Authentication System with Efficiently Updatable Signature},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {99-D},
  number       = {1},
  pages        = {69--82},
  year         = {2016},
  url          = {https://doi.org/10.1587/transinf.2015MUP0008},
  doi          = {10.1587/TRANSINF.2015MUP0008},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OgawaO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/AttrapadungHOOW16,
  author       = {Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Go Ohtake and
                  Hajime Watanabe and
                  Shota Yamada},
  editor       = {Vassilis Zikas and
                  Roberto De Prisco},
  title        = {Attribute-Based Encryption for Range Attributes},
  booktitle    = {Security and Cryptography for Networks - 10th International Conference,
                  {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9841},
  pages        = {42--61},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44618-9\_3},
  doi          = {10.1007/978-3-319-44618-9\_3},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/AttrapadungHOOW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2016,
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3},
  doi          = {10.1007/978-3-319-44524-3},
  isbn         = {978-3-319-44523-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tce/OhtakeOS15,
  author       = {Go Ohtake and
                  Kazuto Ogawa and
                  Reihaneh Safavi{-}Naini},
  title        = {Privacy preserving system for integrated broadcast-broadband services
                  using attribute-based encryption},
  journal      = {{IEEE} Trans. Consumer Electron.},
  volume       = {61},
  number       = {3},
  pages        = {328--335},
  year         = {2015},
  url          = {https://doi.org/10.1109/TCE.2015.7298092},
  doi          = {10.1109/TCE.2015.7298092},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tce/OhtakeOS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bmsb/OgawaI15,
  author       = {Kazuto Ogawa and
                  Tomoyuki Inoue},
  title        = {Practically secure update of scrambling scheme},
  booktitle    = {2015 {IEEE} International Symposium on Broadband Multimedia Systems
                  and Broadcasting, {BMSB} 2015, Ghent, Belgium, June 17-19, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/BMSB.2015.7177195},
  doi          = {10.1109/BMSB.2015.7177195},
  timestamp    = {Wed, 16 Oct 2019 14:14:54 +0200},
  biburl       = {https://dblp.org/rec/conf/bmsb/OgawaI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/OgawaO15,
  author       = {Kazuto Ogawa and
                  Go Ohtake},
  title        = {Watermarking for {HEVC/H.265} stream},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2015,
                  Las Vegas, NV, USA, January 9-12, 2015},
  pages        = {102--103},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCE.2015.7066337},
  doi          = {10.1109/ICCE.2015.7066337},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/OgawaO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/OhtakeO15,
  author       = {Go Ohtake and
                  Kazuto Ogawa},
  title        = {Privacy preserving system for integrated broadcast-broadband services},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2015,
                  Las Vegas, NV, USA, January 9-12, 2015},
  pages        = {285--286},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICCE.2015.7066416},
  doi          = {10.1109/ICCE.2015.7066416},
  timestamp    = {Tue, 02 Jan 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/OhtakeO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/OgawaHI15,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Sara Foresti},
  title        = {Content and Key Management to Trace Traitors in Broadcasting Services},
  booktitle    = {Security and Trust Management - 11th International Workshop, {STM}
                  2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9331},
  pages        = {236--252},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24858-5\_15},
  doi          = {10.1007/978-3-319-24858-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/stm/OgawaHI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OgawaOFH14,
  author       = {Kazuto Ogawa and
                  Go Ohtake and
                  Arisa Fujii and
                  Goichiro Hanaoka},
  title        = {Weakened Anonymity of Group Signature and Its Application to Subscription
                  Services},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1240--1258},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1240},
  doi          = {10.1587/TRANSFUN.E97.A.1240},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OgawaOFH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiiOHAWOI11,
  author       = {Arisa Fujii and
                  Go Ohtake and
                  Goichiro Hanaoka and
                  Nuttapong Attrapadung and
                  Hajime Watanabe and
                  Kazuto Ogawa and
                  Hideki Imai},
  title        = {Secure Broadcast System with Simultaneous Individual Messaging},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1328--1337},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1328},
  doi          = {10.1587/TRANSFUN.E94.A.1328},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujiiOHAWOI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/OhtakeO11,
  author       = {Go Ohtake and
                  Kazuto Ogawa},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Application Authentication for Hybrid Services of Broadcasting and
                  Communications Networks},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {171--186},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_15},
  doi          = {10.1007/978-3-642-27890-7\_15},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/OhtakeO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OhtakeHO10,
  author       = {Go Ohtake and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  title        = {Efficient Provider Authentication for Bidirectional Broadcasting Service},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1039--1051},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1039},
  doi          = {10.1587/TRANSFUN.E93.A.1039},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OhtakeHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/OhtakeHO10,
  author       = {Go Ohtake and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Efficient Broadcast Encryption with Personalized Messages},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {214--228},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_15},
  doi          = {10.1007/978-3-642-16280-0\_15},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/OhtakeHO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NuidaFHKWOI09,
  author       = {Koji Nuida and
                  Satoshi Fujitsu and
                  Manabu Hagiwara and
                  Takashi Kitagawa and
                  Hajime Watanabe and
                  Kazuto Ogawa and
                  Hideki Imai},
  title        = {An improvement of discrete Tardos fingerprinting codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {52},
  number       = {3},
  pages        = {339--362},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-009-9285-z},
  doi          = {10.1007/S10623-009-9285-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NuidaFHKWOI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NuidaFHIKOW09,
  author       = {Koji Nuida and
                  Satoshi Fujitsu and
                  Manabu Hagiwara and
                  Hideki Imai and
                  Takashi Kitagawa and
                  Kazuto Ogawa and
                  Hajime Watanabe},
  title        = {An Efficient 2-Secure and Short Random Fingerprint Code and Its Security
                  Evaluation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {197--206},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.197},
  doi          = {10.1587/TRANSFUN.E92.A.197},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NuidaFHIKOW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OhtakeOHI09,
  author       = {Go Ohtake and
                  Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  title        = {A Trade-off Traitor Tracing Scheme},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {859--875},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.859},
  doi          = {10.1587/TRANSINF.E92.D.859},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OhtakeOHI09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/OhtakeFHO09,
  author       = {Go Ohtake and
                  Arisa Fujii and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  editor       = {Bart Preneel},
  title        = {On the Theoretical Gap between Group Signatures with and without Unlinkability},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2009, Second International
                  Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25,
                  2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5580},
  pages        = {149--166},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02384-2\_10},
  doi          = {10.1007/978-3-642-02384-2\_10},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/OhtakeFHO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/OhtakeHO08,
  author       = {Go Ohtake and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  editor       = {Stig Fr. Mj{\o}lsnes and
                  Sjouke Mauw and
                  Sokratis K. Katsikas},
  title        = {An Efficient Strong Key-Insulated Signature Scheme and Its Application},
  booktitle    = {Public Key Infrastructure, 5th European {PKI} Workshop: Theory and
                  Practice, EuroPKI 2008, Trondheim, Norway, June 16-17, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5057},
  pages        = {150--165},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-69485-4\_11},
  doi          = {10.1007/978-3-540-69485-4\_11},
  timestamp    = {Sat, 19 Oct 2019 19:58:51 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/OhtakeHO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HanaokaIOW08,
  author       = {Goichiro Hanaoka and
                  Hideki Imai and
                  Kazuto Ogawa and
                  Hajime Watanabe},
  editor       = {Kanta Matsuura and
                  Eiichiro Fujisaki},
  title        = {Chosen Ciphertext Secure Public Key Encryption with a Simple Structure},
  booktitle    = {Advances in Information and Computer Security, Third International
                  Workshop on Security, {IWSEC} 2008, Kagawa, Japan, November 25-27,
                  2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5312},
  pages        = {20--33},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89598-5\_2},
  doi          = {10.1007/978-3-540-89598-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HanaokaIOW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NuidaFHKWOI08,
  author       = {Koji Nuida and
                  Satoshi Fujitsu and
                  Manabu Hagiwara and
                  Takashi Kitagawa and
                  Hajime Watanabe and
                  Kazuto Ogawa and
                  Hideki Imai},
  title        = {An improvement of discrete Tardos fingerprinting codes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {338},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/338},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NuidaFHKWOI08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OgawaHI07,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  title        = {Traitor Tracing Scheme Secure against Adaptive Key Exposure and its
                  Application to Anywhere {TV} Service},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {5},
  pages        = {1000--1011},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.5.1000},
  doi          = {10.1093/IETFEC/E90-A.5.1000},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OgawaHI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OgawaHI07a,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  title        = {Extension of Broadcasting Service by Using Electronic Tokens},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {90-D},
  number       = {11},
  pages        = {1741--1750},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietisy/e90-d.11.1741},
  doi          = {10.1093/IETISY/E90-D.11.1741},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OgawaHI07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaecc/NuidaFHKWOI07,
  author       = {Koji Nuida and
                  Satoshi Fujitsu and
                  Manabu Hagiwara and
                  Takashi Kitagawa and
                  Hajime Watanabe and
                  Kazuto Ogawa and
                  Hideki Imai},
  editor       = {Serdar Boztas and
                  Hsiao{-}feng Lu},
  title        = {An Improvement of Tardos's Collusion-Secure Fingerprinting Codes with
                  Very Short Lengths},
  booktitle    = {Applied Algebra, Algebraic Algorithms and Error-Correcting Codes,
                  17th International Symposium, AAECC-17, Bangalore, India, December
                  16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4851},
  pages        = {80--89},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77224-8\_12},
  doi          = {10.1007/978-3-540-77224-8\_12},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/aaecc/NuidaFHKWOI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccnc/FujitsuNHKWOI07,
  author       = {Satoshi Fujitsu and
                  Koji Nuida and
                  Manabu Hagiwara and
                  Takashi Kitagawa and
                  Hajime Watanabe and
                  Kazuto Ogawa and
                  Hideki Imai},
  title        = {A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting
                  Codes Strongly Protecting Innocent Users},
  booktitle    = {4th {IEEE} Consumer Communications and Networking Conference, {CCNC}
                  2007, Las Vegas, NV, USA, January 11-13, 2007},
  pages        = {1068--1072},
  publisher    = {{IEEE}},
  year         = {2007},
  url          = {https://doi.org/10.1109/CCNC.2007.215},
  doi          = {10.1109/CCNC.2007.215},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/ccnc/FujitsuNHKWOI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/OgawaOHI07,
  author       = {Kazuto Ogawa and
                  Go Ohtake and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Trade-Off Traitor Tracing},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {331--340},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_25},
  doi          = {10.1007/978-3-540-77026-8\_25},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/OgawaOHI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/FujiiOHO07,
  author       = {Arisa Fujii and
                  Go Ohtake and
                  Goichiro Hanaoka and
                  Kazuto Ogawa},
  editor       = {Bruno Apolloni and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Anonymous Authentication Scheme for Subscription Services},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 11th
                  International Conference, {KES} 2007, {XVII} Italian Workshop on Neural
                  Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4694},
  pages        = {975--983},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74829-8\_119},
  doi          = {10.1007/978-3-540-74829-8\_119},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/FujiiOHO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/OgawaHKMI07,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Kazukuni Kobara and
                  Kanta Matsuura and
                  Hideki Imai},
  editor       = {Bruno Apolloni and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Anonymous Pay-TV System with Secure Revenue Sharing},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 11th
                  International Conference, {KES} 2007, {XVII} Italian Workshop on Neural
                  Networks, Vietri sul Mare, Italy, September 12-14, 2007, Proceedings,
                  Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {4694},
  pages        = {984--991},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74829-8\_120},
  doi          = {10.1007/978-3-540-74829-8\_120},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/OgawaHKMI07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/FujisawaOKIT07,
  author       = {Toshiyuki Fujisawa and
                  Kazuto Ogawa and
                  Takeshi Kimura and
                  Masaki Inamura and
                  Toshiaki Tanaka},
  editor       = {Javier Hernando and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Manu Malek},
  title        = {Anonymous Prepaid Content Viewing System with Mobile Terminal},
  booktitle    = {{SECRYPT} 2007, Proceedings of the International Conference on Security
                  and Cryptography, Barcelona, Spain, July 28-13, 2007, {SECRYPT} is
                  part of {ICETE} - The International Joint Conference on e-Business
                  and Telecommunications},
  pages        = {281--288},
  publisher    = {{INSTICC} Press},
  year         = {2007},
  timestamp    = {Fri, 04 Sep 2009 13:27:09 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/FujisawaOKIT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OgawaHI06,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Adaptively Secure Traitor Tracing Against Key Exposure and Its Application
                  to Anywhere {TV} Service},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {123--135},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_11},
  doi          = {10.1007/11780656\_11},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OgawaHI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/InamuraTFOK06,
  author       = {Masaki Inamura and
                  Toshiaki Tanaka and
                  Toshiyuki Fujisawa and
                  Kazuto Ogawa and
                  Takeshi Kimura},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Flexible License Transfer System Using Mobile Terminal},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {397--404},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/InamuraTFOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/OgawaHI05,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  title        = {A secure traitor tracing scheme against key exposure},
  booktitle    = {Proceedings of the 2005 {IEEE} International Symposium on Information
                  Theory, {ISIT} 2005, Adelaide, South Australia, Australia, 4-9 September
                  2005},
  pages        = {1873--1877},
  publisher    = {{IEEE}},
  year         = {2005},
  url          = {https://doi.org/10.1109/ISIT.2005.1523670},
  doi          = {10.1109/ISIT.2005.1523670},
  timestamp    = {Wed, 16 Oct 2019 14:14:48 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/OgawaHI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-cs-0508011,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  title        = {A Secure Traitor Tracing Scheme against Key Exposure},
  journal      = {CoRR},
  volume       = {abs/cs/0508011},
  year         = {2005},
  url          = {http://arxiv.org/abs/cs/0508011},
  eprinttype    = {arXiv},
  eprint       = {cs/0508011},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-cs-0508011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanaokaOMOMGONI04,
  author       = {Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Itsuro Murota and
                  Go Ohtake and
                  Keigo Majima and
                  Seiichi Gohshi and
                  Kimiyuki Oyamada and
                  Seiichi Namba and
                  Hideki Imai},
  title        = {Managing Encryption and Key Publication Independently in Digital Rights
                  Management Systems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {160--172},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_160\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanaokaOMOMGONI04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaOMOMOGNI03,
  author       = {Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Itsuro Murota and
                  Go Ohtake and
                  Keigo Majima and
                  Kimiyuki Oyamada and
                  Seiichi Gohshi and
                  Seiichi Namba and
                  Hideki Imai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Separating Encryption and Key Issuance in Digital Rights Management
                  Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {365--376},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_31},
  doi          = {10.1007/3-540-45067-X\_31},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanaokaOMOMOGNI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics