Author of the publication

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.

, , , , and . IEICE Transactions, 92-A (1): 53-66 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Imai, Hideki
add a person with the name Imai, Hideki
 

Other publications of authors with the same name

New security layer for overlay networks., , and . Journal of Communications and Networks, 11 (3): 211-228 (2009)Unconditionally Secure Anonymous Encryption and Group Authentication., , , and . Comput. J., 49 (3): 310-321 (2006)Efficient Oblivious Transfer Protocols Achieving a Non-zero Rate from Any Non-trivial Noisy Correlation., , and . ICITS, volume 4883 of Lecture Notes in Computer Science, page 183-194. Springer, (2007)Improvements on Security Proofs of Some Identity Based Encryption Schemes., and . CISC, volume 3822 of Lecture Notes in Computer Science, page 28-41. Springer, (2005)An Efficient Compiler from Sigma-Protocol to 2-Move Deniable Zero-Knowledge., , and . ICALP (2), volume 4052 of Lecture Notes in Computer Science, page 46-57. Springer, (2006)Rates for bit commitment and coin tossing from noisy correlation., , , and . ISIT, page 45. IEEE, (2004)On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems., , , , and . Trans. Data Hiding and Multimedia Security, (2008)On Channel Capacity and Modulation of Watermarks in Digital Still Images., and . Financial Cryptography, volume 1648 of Lecture Notes in Computer Science, page 125-139. Springer, (1999)A Lower-Bound of Complexity for RSA-Based Password-Authenticated Key Exchange., , and . EuroPKI, volume 3545 of Lecture Notes in Computer Science, page 191-205. Springer, (2005)Cryptography with information theoretic security., , , , and . ITW, page 73. IEEE, (2002)