Concurrent Post
-
Faculty of Education and Integrated Arts and Sciences Graduate School of Education
Details of a Researcher
Updated on 2022/07/02
My research interest includes Theoretical Computer Science. Especially,
Faculty of Education and Integrated Arts and Sciences Graduate School of Education
データ科学センター 兼任センター員
Tokyo Institute of Technology Graduate School of Information Science and Engineering
Tokyo Institute of Technology Graduate School of Science and Engineering
Tokyo Institute of Technology School of Engineering Department of Computer Science
2001.03 Tokyo Institute of Technology Doctor of Science
Waseda University Faculty of Education and Integrated Arts and Sciences
Saitama University Graduate School of Science and Engineering Professor
Saitama University Graduate School of Science and Engineering Associate Professor
Université de Paris 7 Dederot Laboratoire d'Informatique Algorithmique: Fondements et Applications (LIAFA)
Université de Paris-Sud Laboratoire de Recherche en Informatique (LRI)
The Institute of Statistical Mathematics
株式会社富士通研究所 研究員
Japan Science and Technology Agency
Telecommunications Advancement Organization of Japan
Theory of informatics
Information Security
Theoretical Computer Science
privacy-preserving
Secure Computation
Quantum Information
Quantum Computation
Theory of Cryptography
The Dichotomy of Neural Networks and Cryptography: War and Peace
Behrouz Zolfaghari, Takeshi Koshiba
Applied System Innovation 5 ( 4 ) Article 61 - (28 pages) 2022.06 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Chaotic Image Encryption: State-of-the-Art, Ecosystem, and Future Roadmap
Behrouz Zolfaghari, Takeshi Koshiba
Applied System Innovation 5 ( 3 ) Article 57 - (38 pages) 2022.06 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Guesswork of a quantum ensemble
Michele Dall'Arno, Francesco Buscemi, Takeshi Koshiba
IEEE Transactions on Information Theory 68 ( 5 ) 3139 - 3143 2022.05 [Refereed]
Authorship:Last author
CARAN: A Context-Aware Recency Based Attention Network for Point-of-interest Recommendation
Md. Billal Hossain, Mohammad Shamsul Arefin, Iqbal H. Sarker, Md. Kowsher, Pranab Kumar Dhar, Takeshi Koshiba
IEEE Access 10 36299 - 36310 2022.04 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
An Enhanced Neural Word Embedding Model for Transfer Learning
Md. Kowsher, Md. Shohanur Islam Sobuj, Md. Fahim Shahriar, Nusrat Jahan Prottasha, Mohammad Shamsul Arefin, Pranab Kumar Dhar, Takeshi Koshiba
Applied Sciences 12 ( 6 ) Article 2848 - (16 pages) 2022.03 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
The Odyssey of Entropy: Cryptography
Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba
Entropy 24 ( 2 ) Article 266 - (27 pages) 2022.02 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Cryptography in Hierarchical Coded Caching: System Model and Cost Analysis
Behrouz Zolfaghari, Vikrant Singh, Brijesh Kumar Rai, Khodakhast Bibak, Takeshi Koshiba
Entropy 23 ( 11 ) Article 1459 - (22 pages) 2021.11 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Frequent contiguous pattern mining over biological sequences of protein misfolded diseases
Mohammad Shahedul Islam, Md. Abul Kashem Mia, Mohammad Shamsur Rahman, Mohammad Shamsul Arefin, Pranab Kumar Dhar, Takeshi Koshiba
BMC Bioinformatics 22 ( 1 ) Article 435 - (28 pages) 2021.09 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Anik Sen, Kaushik Deb, Pranab Kumar Dhar, Takeshi Koshiba
Sensors 21 ( 8 ) Article 2846 - (19 pages) 2021.04 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
A Deep Learning Approach to Predict Autism Spectrum Disorder Using Multisite Resting-State fMRI
Faria Zarin Subah, Kaushik Deb, Pranab Kumar Dhar, Takeshi Koshiba
Applied Sciences 11 ( 8 ) Article 3636 - (16 pages) 2021.04 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Plant Leaf Disease Recognition using Depthwise Separable Convolution Based Models
Syed Mohammad, Minhaz Hossain, Kaushik Deb, Pranab Kumar Dhar, Takeshi Koshiba
Symmetry 13 ( 3 ) Article 511 - (29 pages) 2021.03 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Classification of indoor human fall events using deep learning
Arifa Sultana, Kaushik Deb, Pranab Kumar Dhar, Takeshi Koshiba
Entropy 23 ( 3 ) Article 328 - (20 pages) 2021.03 [Refereed] [International coauthorship]
Authorship:Last author
Fourier-based verifiable function secret sharing
Takeshi Koshiba
Proceedings of 2020 International Symposium on Information Theory and Its Applications (ISITA 2020) 442 - 446 2021.03 [Refereed]
Authorship:Lead author, Corresponding author
Traditional Bangladeshi Sports Video Classification Using Deep Learning Method
Moumita Sen Sarma, Kaushik Deb, Pranab Kumar Dhar, Takeshi Koshiba
Applied Sciences 11 ( 5 ) Article 2149 - (20 pages) 2021.02 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Image Defogging Framework Using Segmentation and the Dark Channel Prior
Sabiha Anan, Mohammad Ibrahim Khan, Mir Md Saki Kowsar, Kaushik Deb, Pranab Kumar Dhar, Takeshi Koshiba
Entropy 23 ( 3 ) Article 285 - (21 pages) 2021.02 [Refereed]
Authorship:Last author
A guests managing system with lattice-based verifier-local revocation group signature scheme with time-bound keys
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Advances in Intelligent Systems and Computing (ICMC2019) 1170 81 - 96 2021.02 [Refereed]
Authorship:Last author
Efficient Private Conjunctive Query Protocol Over Encrypted Data
Tushar Kanti Saha, Takeshi Koshiba
Cryptography 5 ( 1 ) Article 2 - (28 pages) 2021.01 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Enhanced Secure Comparison Schemes Using Homomorphic Encryption
Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai
Advances in Intelligent Systems and Computing 1264 211 - 224 2021 [Refereed] [International coauthorship]
Efficient protocols for private wildcards pattern matching
Tushar Kanti Saha, Deevashwer Rathee, Takeshi Koshiba
Journal of Information Security and Applications 55 Article 102609 - (18 pages) 2020.12 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Almost fully secured lattice-based group signatures with verifier-local revocation
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Cryptography 4 ( 4 ) Article 33 - (28 pages) 2020.11 [Refereed] [International journal]
Authorship:Last author
MCIC: Automated Identification of Cellulases from Metagenomic data and Characterization Based on Temperature and pH Dependence
Mehdi Foroozandeh Shahraki, Shohreh Ariaeenejad, Fereshteh Fallah Atanaki, Behrouz Zolfaghari, Takeshi Koshiba, Kaveh Kavousi, Ghasem Hosseini Salekdeh
Frontiers in Microbiology 11 Article 567863 - (10 pages) 2020.10 [Refereed] [International journal] [International coauthorship]
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
International Journal of Grid and Utility Computing 11 ( 5 ) 662 - 673 2020.09 [Refereed] [International journal]
Authorship:Last author
Content delivery networks: State of the art, trends and future roadmap
Behrouz Zolfaghari, Gautam Srivastava, Swapnoneel Roy, Hamid R. Nemati, Fatemeh Afghah, Takeshi Koshiba, Abolfazl Razi, Khodakhast Bibak, Pinaki Mitra, Brijesh Kumar Rai
ACM Computing Surveys 53 ( 2 ) Article 34 - (34 pages) 2020.04 [Refereed] [International journal] [International coauthorship]
Blind audio watermarking based on parametric-slant Hadamard transform and Hessenberg decomposition
Pranab Kumar Dhar, Azizul Hakim Chowdhury, Takeshi Koshiba
Symmetry 12 ( 3 ) Article 333 - (16 pages) 2020.03 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Blind image watermarking in canonical and cepstrum domains based on 4-connected t-o'clock scrambling
Farhana Shirin Chowdhury, Pranab Kumar Dhar, Kaushik Deb, Takeshi Koshiba
Symmetry 12 ( 2 ) Article 266 - (20 pages) 2020.02 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Generalized Mm,r-network: A case for fixed message dimensions
Vikrant Singh, Behrouz Zolfaghari, Chunduri Venkata, Dheeraj Kumar, Brijesh Kumar Rai, Khodakhast Bibak, Gautam Srivastava, Swapnoneel Roy, Takeshi Koshiba
IEEE Communications Letters 24 ( 1 ) 38 - 42 2020.01 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Arbitrable blind quantum computation
Go Sato, Takeshi Koshiba, Tomoyuki Morimae
Quantum Information Processing 18 ( 12 ) Article 370 - (8 pages) 2019.12 [Refereed] [International journal]
Authorship:Corresponding author
Efficient private database queries using ring-LWE somewhat homomorphic encryption
Tushar Kanti Saha, Mayank Rathee, Takeshi Koshiba
Journal of Information Security and Applications 49 Article 102406 - (15 pages) 2019.12 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Perfectly secure message transmission against independent rational adversaries
Kenji Yasunaga, Takeshi Koshiba
Lecture Notes in Computer Science (GameSec 2019) 11836 563 - 582 2019.10 [Refereed]
Authorship:Last author
Impossibility of perfectly-secure one-round delegated quantum computing for classical client
Tomoyuki Morimae, Takeshi Koshiba
Quantum Information & Computation 19 ( 3&4 ) 214 - 221 2019.03 [Refereed] [International journal]
Authorship:Last author
New assumptions on isogenous pairing groups with applications to attribute-based encryption
Takeshi Koshiba, Katsuyuki Takashima
Lecture Notes in Computer Science (ICISC 2018) 11396 3 - 19 2019.01 [Invited]
Outsourcing private equality tests to the cloud
Tushar Kanti Saha, Takeshi Koshiba
Journal of Information Security and Applications 43 83 - 98 2018.12 [Refereed] [International journal] [International coauthorship]
Authorship:Last author
Achieving strong security and member registration for lattice-based group signature scheme with verifier-local revocation
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Journal of Internet Services and Information Security 8 ( 4 ) 1 - 15 2018.11 [Refereed] [International journal]
Authorship:Last author
Achieving strong security and verifier-local revocation for dynamic group signatures from lattice assumptions
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Lecture Notes in Computer Science (STM 2018) 11091 3 - 19 2018.10 [Refereed]
Almost-fully secured fully dynamic group signatures with efficient verifier-local revocation and time-bound keys
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Lecture Notes in Computer Science (IDCS 2018) 11226 134 - 147 2018.10 [Refereed]
Achieving full security for lattice-based group signatures with verifier-local revocation
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Lecture Notes in Computer Science (ICICS 2018) 11149 287 - 302 2018.10 [Refereed]
Perfectly secure message transmission against rational timid adversaries
Maiki Fujita, Kenji Yasunaga, Takeshi Koshiba
Lecture Notes in Computer Science (GameSec 2018) 11199 127 - 144 2018.10 [Refereed]
Fully dynamic group signature scheme with member registration and verifier-local revocation
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Springer Proceedings in Mathematics & Statistics (Mathematics and Computing, ICMC 2018) 253 399 - 415 2018.09 [Refereed]
Fourier-based function secret sharing with general access structure
Takeshi Koshiba
Springer Proceedings in Mathematics & Statistics (Mathematics and Computing, ICMC 2018) 253 417 - 428 2018.09 [Refereed]
Zero-knowledge proof for lattice-based group signature schemes with verifier-local revocation
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Lecture Notes on Data Engineering and Communications Technologies (TwCSec@NBiS 2018) 22 772 - 782 2018.09 [Refereed]
Achieving almost-full security for lattice-based fully dynamic group signatures with verifier-local revocation
Maharage Nisansala Sevwandi Perera, Takeshi Koshiba
Lecture Notes in Computer Science (ISPEC 2018) 11125 229 - 247 2018.09 [Refereed]
Private comparison protocol and its application to range queries
Tushar Kanti Saha, Mayank, Deevashwer, Takeshi Koshiba
Lecture Notes in Computer Science (IDCS 2017) 10794 128 - 141 2018.07 [Refereed]
Universal construction of cheater-identifiable secret sharing against rushing cheaters based on message authentication
Masahito Hayashi, Takeshi Koshiba
Proceedings of 2018 IEEE International Symposium on Information Theory (ISIT 2018) 2614 - 2618 2018.06 [Refereed]
Non-transferable proxy re-encryption for multiple groups
Ei Mon Cho, Lwin San, Takeshi Koshiba
International Journal of Space-Based and Situated Computing 8 ( 1 ) 20 - 29 2018.04 [Refereed]
Privacy-preserving equality test towards big data
Tushar Kanti Saha, Takeshi Koshiba
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10723 95 - 110 2018 [Refereed]
Secure non-transferable proxy re-encryption for group membership and non-membership
Ei Mon Cho, Lwin San, Takeshi Koshiba
Lecture Notes on Data Engineering and Communications Technologies (TwCSec@NBiS 2017) 7 876 - 887 2017.08 [Refereed]
Function secret sharing using Fourier basis
Takuya Ohsawa, Naruhiro Kurokawa, Takeshi Koshiba
Lecture Notes on Data Engineering and Communications Technologies (TwCSec@NBiS 2017) 7 865 - 875 2017.08 [Refereed]
An efficient privacy-preserving comparison protocol
Tushar Kanti Saha, Takeshi Koshiba
Lecture Notes on Data Engineering and Communications Technologies (NBiS 2017) 7 553 - 565 2017.08 [Refereed]
Physical implementation of oblivious transfer using optical correlated randomness
Tomohiro Ito, Hayato Koizumi, Nobumitsu Suzuki, Izumi Kakesu, Kento Iwakawa, Atsushi Uchida, Takeshi Koshiba, Jun Muramatsu, Kazuyuki Yoshimura, Masanobu Inubushi, Peter Davis
SCIENTIFIC REPORTS 7 Article 8444 - (12 pages) 2017.08 [Refereed]
Secure SMS transmission based on verifiable hash convergent group signcryption
Ei Mon Cho, Takeshi Koshiba
Proceedings - 18th IEEE International Conference on Mobile Data Management, MDM 2017 332 - 335 2017.06 [Refereed]
Private Equality Test Using Ring-LWE Somewhat Homomorphic Encryption
Tushar Kanti Saha, Takeshi Koshiba
Proceedings - Asia-Pacific World Congress on Computer Science and Engineering 2016 and Asia-Pacific World Congress on Engineering 2016, APWC on CSE/APWCE 2016 1 - 5 2017.06 [Refereed]
Fully Secure Lattice-based Group Signatures with Verifier-local Revocation
M. Nisansala, S. Perera, Takeshi Koshiba
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) 795 - 802 2017 [Refereed]
An Enhancement of Privacy-Preserving Wildcards Pattern Matching
Tushar Kanti Saha, Takeshi Koshiba
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2016 10128 145 - 160 2017 [Refereed]
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba
J. Mathematical Cryptology 11 ( 1 ) 1 - 24 2017 [Refereed] [International journal]
Authorship:Last author
Secure Deduplication in a Multiple Group Signature Setting
Ei Mon Cho, Takeshi Koshiba
2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA) 811 - 818 2017 [Refereed]
Private conjunctive query over encrypted data
Tushar Kanti Saha, Takeshi Koshiba
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10239 149 - 164 2017 [Refereed]
Big Data Cloud Deduplication based on Verifiable Hash Convergent Group Signcryption
Ei Mon Cho, Takeshi Koshiba
2017 THIRD IEEE INTERNATIONAL CONFERENCE ON BIG DATA COMPUTING SERVICE AND APPLICATIONS (IEEE BIGDATASERVICE 2017) 265 - 270 2017 [Refereed]
Efficient protocols for private database queries
Tushar Kanti Saha, Mayank, Takeshi Koshiba
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 10359 337 - 348 2017 [Refereed]
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes
Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015) 9482 117 - 133 2016 [Refereed]
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama
Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, SCC 2015 53 - 61 2015 [Refereed]
New packing method in somewhat homomorphic encryption and its applications.
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Security and Communication Networks 8 ( 13 ) 2194 - 2213 2015 [Refereed] [International journal]
Authorship:Last author
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption.
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Lecture Notes in Computer Science (ACISP 2015) 9144 471 - 487 2015 [Refereed]
Practical Packing Method in Somewhat Homomorphic Encryption
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 2013 8247 34 - 50 2014 [Refereed]
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
INFORMATION SECURITY AND PRIVACY, ACISP 2014 8544 338 - 353 2014 [Refereed]
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba
J. Mathematical Cryptology 8 ( 3 ) 305 - 329 2014 [Refereed] [International journal]
Authorship:Last author
Ancilla-driven universal blind quantum computation
Takahiro Sueki, Takeshi Koshiba, Tomoyuki Morimae
PHYSICAL REVIEW A 87 ( 6 ) Article 060301(R) - (5 pages) 2013.06 [Refereed] [International journal]
Secure pattern matching using somewhat homomorphic encryption.
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Proceedings of the ACM Conference on Computer and Communications Security (2013 ACM Cloud Computing Security Workshop, CCSW 2013) 65 - 76 2013 [Refereed]
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Lecture Notes in Computer Science (MoCrySEn 2013) 8128 55 - 74 2013 [Refereed]
Computational Indistinguishability Between Quantum States and Its Cryptographic Application
Akinori Kawachi, Takeshi Koshiba, Harumichi Nishimura, Tomoyuki Yamakami
JOURNAL OF CRYPTOLOGY 25 ( 3 ) 528 - 555 2012.07 [Refereed] [International journal]
Public Discussion Must Be Back and Forth in Secure Message Transmission
Takeshi Koshiba, Shinya Sawada
INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2010 6829 325 - 337 2011 [Refereed]
Statistically-Hiding Quantum Bit Commitment from Approximable-Preimage-Size Quantum One-Way Function
Takeshi Koshiba, Takanori Odaira
THEORY OF QUANTUM COMPUTATION, COMMUNICATION, AND CRYPTOGRAPHY 5905 33 - 46 2009 [Refereed]
Strengthening the Security of Distributed Oblivious Transfer
K. Y. Cheong, Takeshi Koshiba, Shohei Nishiyama
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS 5594 377 - 388 2009 [Refereed]
Reducing Complexity Assumptions for Oblivious Transfer
K. Y. Cheong, Takeshi Koshiba
ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS 5824 110 - 124 2009 [Refereed]
A combinatorial approach to deriving lower bounds for perfectly secure oblivious transfer reductions
Kaoru Kurosawa, Wataru Kishimoto, Takeshi Koshiba
IEEE Transactions on Information Theory 54 ( 6 ) 2566 - 2571 2008.06 [Refereed] [International journal]
Authorship:Last author
Simple direct reduction of string (1,2)-OT to Rabin's OT without privacy, amplification
Kaoru Kurosawa, Takeshi Koshiba
INFORMATION THEORETIC SECURITY, PROCEEDINGS 5155 199 - + 2008 [Refereed]
More on security of public-key cryptosystems based on Chebyshev polynomials
Kai Y. Cheong, Takeshi Koshiba
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS 54 ( 9 ) 795 - 799 2007.09 [Refereed] [International journal]
Authorship:Last author
Low-density attack revisited
Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
DESIGNS CODES AND CRYPTOGRAPHY 43 ( 1 ) 47 - 59 2007.04 [Refereed] [International journal]
Progress in quantum computational cryptography
Akinori Kawachi, Takeshi Koshiba
JOURNAL OF UNIVERSAL COMPUTER SCIENCE 12 ( 6 ) 691 - 709 2006 [Refereed] [Invited]
Universal test for quantum one-way permutations
A Kawachi, H Kobayashi, T Koshiba, RH Putra
THEORETICAL COMPUTER SCIENCE 345 ( 2-3 ) 370 - 385 2005.11 [Refereed]
Computational indistinguishability between quantum states and its cryptographic application
A Kawachi, T Koshiba, H Nishimura, T Yamakami
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS 3494 268 - 284 2005 [Refereed]
Theoretical analysis of (2)(X) attack on RC6
M Takenaka, T Shimoyama, T Koshiba
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E87A ( 1 ) 28 - 36 2004.01 [Refereed]
Universal test for quantum one-way permutations
A Kawachi, H Kobayashi, T Koshiba, RH Putra
MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2004, PROCEEDINGS 3153 839 - 850 2004 [Refereed]
Short exponent Diffie-Hellman problems
T Koshiba, K Kurosawa
PUBLIC KEY CRYPTOGRAPHY - PKC 2004, PROCEEDINGS 2947 173 - 186 2004 [Refereed]
Theoretical analysis of x(2) attack on RC6
M Takenaka, T Shimoyama, T Koshiba
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS 2727 142 - 153 2003 [Refereed]
Multiple linear cryptanalysis of a reduced round RC6
T Shimoyama, M Takenaka, T Koshiba
FAST SOFTWARE ENCRYPTION (REVISED PAPERS) 2365 76 - 88 2002 [Refereed]
On sufficient randomness for secure public-key cryptosystems
Takeshi Koshiba
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 2274 34 - 47 2002 [Refereed]
The Decision Diffie-Hellman assumption and the Quadratic Residuosity assumption
T Saito, T Koshiba, A Yamamura
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E84A ( 1 ) 165 - 171 2001.01 [Refereed]
A new aspect for security notions: Secure randomness in public-key encryption schemes
T Koshiba
PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS 1992 87 - 103 2001 [Refereed]
Polynomial-time algorithms for the equivalence for one-way quantum finite automata
T Koshiba
ALGORITHMS AND COMPUTATION, PROCEEDINGS 2223 268 - 278 2001 [Refereed]
A theory of randomness for public key cryptosystems: The ElGamal cryptosystem case
T Koshiba
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E83A ( 4 ) 614 - 619 2000.04 [Refereed]
A technique for boosting the security of cryptographic systems with one-way hash functions
T Koshiba
INFORMATION SECURITY AND CRYPTOLOGY - ICISC'99 1787 76 - 81 2000 [Refereed]
Inferring pure context-free languages from positive data
Takeshi Koshiba, Erkki Mäkinen, Yuji Takada
Acta Cybernetica 14 ( 3 ) 469 - 477 2000 [Refereed] [International journal] [International coauthorship]
Authorship:Lead author, Corresponding author
Enhancing D-ABDUCTOR towards a diagrammatic user interface platform
K Misue, K Nitta, K Sugiyama, T Koshiba, R Inder
1998 SECOND INTERNATIONAL CONFERENCE ON KNOWLEDGE-BASED INTELLIGENT ELECTRONIC SYSTEMS, KES'98 PROCEEDINGS, VOL 1 359 - 368 1998 [Refereed]
Learning deterministic even linear languages from positive examples
T Koshiba, E Makinen, Y Takada
THEORETICAL COMPUTER SCIENCE 185 ( 1 ) 63 - 79 1997.10 [Refereed] [International journal] [International coauthorship]
Authorship:Lead author, Corresponding author
On a hierarchy of slender languages based on control sets
Takeshi Koshiba
Fundamenta Informaticae 31 ( 1 ) 41 - 47 1997 [Refereed] [International journal]
Authorship:Lead author, Corresponding author
Computational learning theoretic cryptanalysis of language theoretic cryptosystems
Takeshi Koshiba
Lecture Notes in Computer Science (ICICS 1997) 1334 28 - 38 1997 [Refereed]
A machine learning approach to knowledge acquisitions from text databases
Y Sakakibara, K Misue, T Koshiba
INTERNATIONAL JOURNAL OF HUMAN-COMPUTER INTERACTION 8 ( 3 ) 309 - 324 1996.07 [Refereed] [International journal]
Decision tree learning system with switching evaluator
Takesih Koshiba
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 1081 349 - 361 1996 [Refereed]
Typed pattern languages and their learnability
Takeshi Koshiba
Lecture Notes in Computer Science (EUROCOLT 1995) 904 367 - 379 1995 [Refereed]
TEXT CLASSIFICATION AND KEYWORD EXTRACTION BY LEARNING DECISION TREES
Y SAKAKIBARA, K MISUE, T KOSHIBA
NINTH CONFERENCE ON ARTIFICIAL INTELLIGENCE FOR APPLICATIONS : PROCEEDINGS 466 - 466 1993 [Refereed]
Statistical Trend Analysis of Physically Unclonable Functions: An Approach via Text Mining
Behrouz Zolfaghari, Khodakhast Bibak, Takeshi Koshiba, Hamid R. Nemati, Pinaki Mitra( Part: Joint author)
CRC Press 2021.02 ISBN: 036775455X
観測に基づく量子計算
小柴健史, 藤井啓祐, 森前智行
コロナ社 2017.02 ISBN: 9784339028706
乱数生成と計算量理論
小柴健史
岩波書店 2014.11 ISBN: 9784000069755
Michael Mitzenmacher, Eli Upfal, 小柴健史, 河内亮周( Part: Joint translator)
共立出版 2009.04 ISBN: 4320122291
量子暗号理論の展開
小芦雅斗, 小柴健史
サイエンス社 2008.11
物理乱数生成の理論的側面
小柴健史
電子情報通信学会誌 1072 - 1076 2011.12 [Invited]
Article, review, commentary, editorial, etc. (other)
暗号論的擬似乱数
小柴健史
数理科学 519 21 - 25 2006.09
Quantum Computational Cryptography
Akinori Kawachi, Takeshi Koshiba
H. Imai, M. Hayashi, eds., Quantum Computation and Information From Theory to Experiment (Topics in Applied Physics 102) 167 - 184 2006.07
Article, review, commentary, editorial, etc. (other)
現代暗号への量子アルゴリズムによる攻撃
小柴健史
数理科学 492 31 - 36 2004.06
ARMADA
小柴健史 Software
Award for Outstanding Research Achievement
2018.12 Asia Pacific Society for Computing and Information Technology
Outstanding paper award
2018.10 GameSec 2018 (Conference on the Decision and Game Theory for Security)
基礎・境界ソサイエティ編集活動感謝状
2011.09 電子情報通信学会
Construction of Quantum Computaional Infrastracture towards Quantum Information Society
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A)
Project Year :
Establishment of Fourier-based secure function secret sharing
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Research (Exploratory)
Project Year :
Constructions for Cryptographic Primitives with Incentives
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)
Project Year :
Interpolative Expansion of Quantum Protocol Theory
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A)
Project Year :
Communication Complexity based on Blind Quantum Computation
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Exploratory Research
Project Year :
KOSHIBA Takeshi
Exploring the Limits of Computation from the Statistical Physics
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research on Innovative Areas (Research in a proposed research area)
Project Year :
Watanabe Osamu, KABASHIMA Yoshiyuki, HUKUSHIMA Koji, Krzakala Florent, Zdeborova Lenka, Zhou Haijun
Deepening Theory of Quantum Protocols
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A)
Project Year :
KOSHIBA Takeshi
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (A)
Project Year :
HAYASHI Masahito
Interchangeable techniques between classical and quantum cryptography
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Challenging Exploratory Research
Project Year :
KOSHIBA Takeshi
Advances in crossover between quantum information theory and quantum computational complexity theory
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)
Project Year :
KOSHIBA Takeshi, MATSUMOTO Keiji, KOBAYASHI Hirotada, TANAKA Keisuke, KAWACHI Akinori
脱量子化手法の確立と暗号理論応用
日本学術振興会 科学研究費助成事業 挑戦的萌芽研究
Project Year :
小柴 健史
Crossover between Quantum Information Theory and Quantum Computational Complexity Theory
Japan Society for the Promotion of Science Grants-in-Aid for Scientific Research Grant-in-Aid for Scientific Research (B)
Project Year :
KOSHIBA Takeshi, MATSUMOTO Keiji, KOBAYASHI Hirotada, KAWACHI Akinori
Guesswork of a quantum ensemble
Michele Dall'Arno, Francesco Buscemi, Takeshi Koshiba
25th Annual Conference on Quantum Information Processing (QIP 2022)
Non-Interactive Statistically-Hiding Quantum Bit Commitment from any Quantum One-way Function
Takeshi Koshiba [Invited]
The 2nd Kyoto Workshop on Quantum Information, Computation and Foundation, QICF 2021 (Online) the Quantum Information Unit and the Yukawa Institute for Theoretical Physics, Kyoto University
Presentation date: 2021.09
Guesswork of a quantum ensemble
Michele Dall'Arno, Francesco Buscemi, Takeshi Koshiba
The 21st Asian Quantum Information Science Conference, AQIS 2021 (Online)
Presentation date: 2021.09
On Public Verifiability for Secure Delegated Quantum Computation
Takeshi Koshiba [Invited]
The 1st Kyoto Workshop on Quantum Information, Computation, and Foundation, QICF 2020 (Online) the Quantum Information Unit and Yukawa Institute for Theoretical Physics, Kyoto University
Presentation date: 2020.09
Recent Progress in Quantum Computational Cryptography
Takeshi Koshiba [Invited]
The 6th IEEE Conference on Computer Science and Data Engineering (Melbourne)
Presentation date: 2019.12
On Public Verifiability for Secure Delegated Quantum Computation
Takeshi Koshiba [Invited]
Quantum computation, post-quantum cryptography and quantum codes (Fukuoka, Japan) Institute for Mathematics for Industry, Kyushu University
Presentation date: 2019.11
Homomorphic Encrypion and Its Applications
Takeshi Koshiba [Invited]
The 2018 International Conference for Top and Emerging Computer Scientists (IC-TECS 2018) (Taipei) Asia Pacific Society for Computing and Information Technology
Presentation date: 2018.12
安全な代理量子計算
小柴健史 [Invited]
情報理論研究会「若手研究者のための講演会」@第41回情報理論とその応用シンポジウム(SITA 2018) (スパリゾートハワイアンズ, いわき市) 電子情報通信学会 情報理論とその応用サブソサイエティ
Presentation date: 2018.12
観測に基づく量子計算と量子優位性
小柴健史 [Invited]
CREST暗号数理 平成30年度第2回全体会議 チュートリアルワークショップ (九州大学マスフォアインダストリ研究所, 福岡市)
Presentation date: 2018.12
Pseudorandom Generation in Post Quantum Era
Takeshi Koshiba [Invited]
Small-workshop on Communications between Academia and Industry for Security (SCAIS 2018) (Niigata, Japan) Osaka Univ. & AIST
Presentation date: 2018.01
Secure Message Transmission : Possibilities and Limitations
Takeshi Koshiba [Invited]
Presentation date: 2017.09
Secure Message Transmission against Rational Adversaries
Takeshi Koshiba [Invited]
Cryptographic Technologies for Securing Network Storage and Their Mathematical Modeling Institute of Mathematics for Industry, Kyushu University
Presentation date: 2017.06
Composable Security of Blind Computation
Takeshi Koshiba [Invited]
Quantum Science Symposium Asia 2013 (QSS-ASIA 2013) (Tokyo Univ.)
Presentation date: 2013.11
Quantum Oblivious Transfer and Quantum One-Way Functions
Takeshi Koshiba [Invited]
Japan-Singapore Workshop on Multi-User Quantum Network (National University of Singapore)
Presentation date: 2012.09
Interactive Hashing and BB84 States
Takeshi Koshiba [Invited]
Quatum Information in Paris (Telecom Paris Tech)
Presentation date: 2010.05
On the Computational Power of BB84 States
Takeshi Koshiba [Invited]
2010 International Workshop on Quantum Information Science (Tokyo Univ.)
Presentation date: 2010.03
Quantum Bit Commitment from Quantum One-Way Function
Takeshi Koshiba [Invited]
International Conference on Quantum Information and Technology (Tokyo Univ.)
Presentation date: 2009.12
一方向性関数からの擬似乱数生成器の構成法について
小柴健史 [Invited]
第3回公開鍵暗号の安全な構成とその応用ワークショップ (秋葉原) 産業技術総合研究所・情報セキュリティーセンター
Presentation date: 2009.09
An Unusual Short Introduction to Quantum Computing
Takeshi Koshiba [Invited]
(Selangor) Universiti Putra Malaysia
Presentation date: 2009.06
Quantum Computational Bit Commitments
Takeshi Koshiba [Invited]
(Kuala Lumper) International Islamic University Malaysia
Presentation date: 2009.06
An Old and New Direction to Quantum Cryptography
Takeshi Koshiba [Invited]
(Kuala Lumper) MIMOS Berhad
Presentation date: 2009.06
On Quantum Oblivious Transfer
Takeshi Koshiba [Invited]
JST-CNRS Joint Workshop on Quantum Computation: Theory and Feasibility (Institut Henri Poincare (IHP), Paris)
Presentation date: 2008.09
量子計算入門
小柴健史 [Invited]
非線形問題勉強会 (東京理科大学) 東京理科大学
Presentation date: 2007.12
擬似乱数のつくりかた
小柴健史 [Invited]
第312回情報科学セミナー 東京電機大学
Presentation date: 2007.06
計算量理論的な量子暗号の進展
小柴健史 [Invited]
第16回量子情報技術研究会 (QIT 16) (NTT厚木)
Presentation date: 2007.05
暗号理論における一方向性関数とその周辺の進展
小柴健史 [Invited]
科学研究費特定領域研究「新世代の計算限界-その解明と打破-」Complexity研究集会 (東京工業大学)
Presentation date: 2006.12
Quantum Public Key Cryptosystem
Takeshi Koshiba [Invited]
Theory of Quantum Computation, Communication and Cryptography (TQC 2006)
Presentation date: 2006.02
量子メカニズムと暗号通信
小柴健史 [Invited]
第3回情報科学技術フォーラム (FIT2004) (同志社大学)
Presentation date: 2004.09
2021
2019 安永憲司
2018 安永憲司
2018 森前智行
2017 Go Sato, Tomoyuki Morimae
プライバシー保護可能な構造化クエリを許容する暗号化データベース
2017 Saha Tushar Kanti, Mayank
Information Mathematics 3&4 [Algorithms and Data Structures]
Waseda University
Applied Mathematics 6 [Computability Theory]
Waseda University
Applied Mathematics 5 [Formal Language Theory]
Waseda University
Advances in Information Mathematics I-2 [Foundations of Cryptography || Analysis of Boolean Functions]
Waseda University
Advances in Information Mathematics I-1 [Quantum Computation]
Waseda University
Computer Mathematics 2 [Approximation Algorithms]
Waseda University
Computer Mathematics 1 [Computational Complexity Theory]
Waseda University
Information Mathematics 6
Waseda University
Information Mathematics 5
Waseda University
Applied Mathematics 3&4 [Discrete Mathematics]
Waseda University
量子コンピューター時代の情報セキュリティ
会津大学 夢の科学技術を子供たちの手に−シンポジウム2006 (会津大学)
未来の情報化社会を守る
Newspaper, magazine
Author: Other
埼玉新聞
サイ・テクこらむ
2014.04
[Future Story] 絶対に破れない量子暗号
Promotional material
Author: Other
三機工業株式会社広報部 Harmony
No.44, pp.12-13
2009.03