Author pages are created from data sourced from our academic publisher partnerships and public sources.

- Publications
- Influence

Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

- H. Cohen, A. Miyaji, Takatoshi Ono
- Mathematics, Computer Science
- ASIACRYPT
- 18 October 1998

Elliptic curve cryptosystems, proposed by Koblitz ([12]) and Miller ([16]), can be constructed over a smaller field of definition than the ElGamal cryptosystems ([6]) or the RSA cryptosystems ([20]).… Expand

A ciphertext-policy attribute-based encryption scheme with constant ciphertext length

- K. Emura, A. Miyaji, K. Omote, Akito Nomura, M. Soshi
- Computer Science
- Int. J. Appl. Cryptogr.
- 1 July 2010

An Attribute-Based Encryption (ABE) is an encryption scheme where users with some attributes can decrypt ciphertexts associated with these attributes. The length of the ciphertext depends on the… Expand

Elliptic Curves over Fp Suitable for Cryptosystems

- A. Miyaji
- Computer Science
- AUSCRYPT
- 13 December 1992

Koblitz ([5]) and Miller ([6]) proposed a method by which the group of points on an elliptic curve over a finite field can be used for the public key cryptosystems instead of a finite field. To… Expand

Efficient Countermeasures against RPA, DPA, and SPA

- H. Mamiya, A. Miyaji, H. Morimoto
- Computer Science
- CHES
- 11 August 2004

In the execution on a smart card, side channel attacks such as simple power analysis (SPA) and the differential power analysis (DPA) have become serious threat [15]. Side channel attacks monitor… Expand

A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length

- K. Emura, A. Miyaji, Akito Nomura, K. Omote, M. Soshi
- Computer Science
- ISPEC
- 2 April 2009

An Attribute-Based Encryption (ABE) is an encryption scheme, where users with some attributes can decrypt ciphertexts associated with these attributes. However, the length of the ciphertext depends… Expand

Dynamic attribute-based signcryption without random oracles

- K. Emura, A. Miyaji, Mohammad Shahriar Rahman
- Computer Science
- Int. J. Appl. Cryptogr.
- 1 February 2012

In SCN2010, Gagne, Narayan, and Safavi-Naini proposed attribute-based signcryption (ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE), an encryptor can… Expand

A Dynamic Attribute-Based Group Signature Scheme and its Application in an Anonymous Survey for the Collection of Attribute Statistics

- K. Emura, A. Miyaji, K. Omote
- Computer Science
- International Conference on Availability…
- 1 September 2009

Recently, cryptographic schemes based on the user's attributes have been proposed. An Attribute-Based Group Signature (ABGS) scheme is a kind of group signature schemes, where a user with a set of… Expand

Intrusion-Resilient Public-Key Encryption

- Yevgeniy Dodis, M. Franklin, Jonathan Katz, A. Miyaji, M. Yung
- Computer Science
- CT-RSA
- 13 April 2003

This paper provides a comprehensive treatment of forward-security in the context of shared-key based cryptographic primitives, as a practical means to mitigate the damage caused by key-exposure. We… Expand

Efficient elliptic curve exponentiation

- A. Miyaji, Takatoshi Ono, H. Cohen
- Engineering, Mathematics
- ICICS
- 18 July 1997

Elliptic curve cryptosystems, proposed by Koblitz([8]) and Miller([11]), can be constructed over a smaller definition field than the ElGamal cryptosystems([5]) or the RSA cryptosystems( [16]). This… Expand

Software Obfuscation on a Theoretical Basis and Its Implementation

- T. Ogiso, Yusuke Sakabe, M. Soshi, A. Miyaji
- Computer Science
- 2003

- 88
- 5
- Open Access