Publications
Journal Papers
Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
Dynamic Group Signatures with Message Dependent Opening and Non-Interactive Signing
International Journal of Networking and Computing, 13(2), 173-194, 2023.
DOI: https://doi.org/10.15803/ijnc.13.2_173Masayuki Fukumitsu, Shingo Hasegawa
On Multi-user Security of Schnorr Signature in Algebraic Group Model
International Journal of Networking and Computing, 13(2), 118-130, 2023.
DOI: https://doi.org/10.15803/ijnc.13.2_118Masayuki Fukumitsu, Shingo Hasegawa
Toward Tight Security of the Galindo-Garcia Identity-based Signature
Interdisciplinary Information Sciences, 29(2), 99 - 108, 2023.
DOI: https://doi.org/10.4036/iis.2022.R.04Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
Group Signatures with Designated Traceability over Openers’ Attributes
International Journal of Networking and Computing, 12(2), 493-508, 2022.
DOI: https://doi.org/10.15803/ijnc.12.2_493Masayuki Fukumitsu, Shingo Hasegawa
Linear and Lossy Identification Schemes derive Tightly Secure Multisignatures
Journal of Internet Technology, vol. 22, no. 5 , pp. 1159-1170, 2021.
DOI: https://doi.org/10.53106/160792642021092205018Masayuki Fukimitsu, Shingo Hasegawa
A Tightly Secure DDH-based Multisignature with Public Key Aggregation
International Journal of Networking and Computing, 11(2), 319-337, 2021.
DOI: https://doi.org/10.15803/ijnc.11.2_319Shingo Hasegawa, Masashi Hisai, Hiroki Shizuya
Public-Key Projective Arithmetic Functional Encryption
International Journal of Networking and Computing, 11(2), 299-318, 2021.
DOI: https://doi.org/10.15803/ijnc.11.2_299Masayuki Fukumitsu, Shingo Hasegawa
Tighter Reduction for Lattice-Based Multisignature
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,
E104-A(12), 1685 - 1697, 2021.
DOI: https://doi.org/10.1587/transfun.2020EAP1131Masayuki Fukumitsu, Shingo Hasegawa
Impossibility on the Schnorr Signature from the One-more DL Assumption in the Non-programmable Random Oracle Model
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications,
E104-A(9), 1163 - 1174, 2021.
DOI: https://doi.org/10.1587/transfun.2020DMP0008Philipp Stratil, Shingo Hasegawa, Hiroki Shizuya
Supersingular Isogeny-based Cryptography: A Survey
Interdisciplinary Information Sciences, 27(1), 1 - 23, 2021.
DOI: https://doi.org/10.4036/iis.2020.R.02Shingo Hasegawa, Shuji Isobe
Lossy Identification Schemes from Decisional RSA
Interdisciplinary Information Sciences, 25(1), 59 - 66, 2019.
DOI: https://doi.org/10.4036/iis.2019.R.01Masayuki Fukumitsu, Shingo Hasegawa
Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,
E101-A(1), 77 - 87, 2018.
DOI: https://doi.org/10.1587/transfun.E101.A.77Takashi Mitsuishi, Fumiko Konno, Shingo Hasegawa
Study on Possibility of Video Streaming of Chalk and Talk Lectures via LMS as Review Materials (in Japanese)
Japanese Journal of Society for Information and Systems in Education, 34(2), 144 - 154, 2017.
DOI: https://doi.org/10.14926/jsise.34.144Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya
A Rigorous Security Proof for the Enhanced Version of Password-Protected Secret Sharing Scheme
Interdisciplinary Information Sciences, 22(1), 31 - 54, 2016.
DOI: https://doi.org/10.4036/iis.2015.R.04Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya
A Strengthened Security Notion for Password-Protected Secret Sharing Schemes
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,
E98-A(1), 203 - 212, 2015.
DOI: https://doi.org/10.1587/transfun.E98.A.203Shingo Hasegawa, Shuji Isobe
A Lossy Identification Scheme Using the Subgroup Decision Assumption
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications ,
E97-A(6), 1296 - 1306, 2014.
DOI: https://doi.org/10.1587/transfun.E97.A.1296Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
The RSA Group Is Adaptive Pseudo-Free under the RSA Assumption
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,
E97-A(1), 200 - 214, 2014.
DOI: https://doi.org/10.1587/transfun.E97.A.200Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
NP-Complete Sets for Computing Discrete Logarithms and Integer Factorization
Interdisciplinary Information Sciences, 19(2), 129 - 134, 2013.
DOI: https://doi.org/10.4036/iis.2013.129Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya, Katsuhiro Tashiro
On the Pseudo-Freeness and the CDH Assumption
International Journal of Information Security, 8(5), 347 - 355, 2009.
DOI: https://doi.org/10.1007/s10207-009-0087-0Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
NPMV-Complete Functions that Compute Discrete Logarithms and Integer Factorization
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,
E91-A(1), 342 - 344, 2008.
DOI: https://doi.org/10.1093/ietfec/e91-a.1.342Shingo Hasegawa, Hiroyuki Hatanaka, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
Making Cryptographic Primitives Harder
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security,
E91-A(1), 330 - 337, 2008.
DOI: https://doi.org/10.1093/ietfec/e91-a.1.330Shingo Hasegawa, Shuji Isobe, Masahiro Mambo, Hiroki Shizuya, Yuichi Futa, Motoji Ohmori
A Countermeasure for Protecting NTRUSign against the Transcript Attack
Interdisciplinary Information Sciences, 13(2), 181 - 188, 2007.
DOI: https://doi.org/10.4036/iis.2007.181
Conference Proceedings
Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
Accountable Ring Signatures from Symmetric-Key Primitives
Proceedings of 2023 Eleventh International Symposium on Computing and Networking (CANDAR'23), 86-92, 2023.
DOI: https://doi.org/10.1109/CANDAR60563.2023.00018Anaëlle Le Dévéhat, Shingo Hasegawa, Hiroki Shizuya
Preimage Sampling in the Higher-bit Approximate Setting With a Non-spherical Gaussian Sampler
Information Security and Cryptology – ICISC 2022. ICISC 2022. LNCS 13849, 472 - 490, 2022
DOI: https://doi.org/10.1007/978-3-031-29371-9_23Kyoya Anzai, Masayuki Fukumitsu, Hiroaki Anada, Shingo Hasegawa
Group Signatures with Equality Test on Signers
Proceedings of 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW'22), 276-282, 2022.
DOI: https://doi.org/10.1109/CANDARW57323.2022.00072Masayuki Fukumitsu, Shingo Hasegawa
On Multi-user Security of Schnorr Signature in Algebraic Group Model
Proceedings of 2022 Tenth International Symposium on Computing and Networking Workshops (CANDARW'22), 295-301, 2022.
DOI: https://doi.org/10.1109/CANDARW57323.2022.00014Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
Dynamic Group Signatures with Message Dependent Opening and Non-Interactive Signing
Proceedings of 2022 Tenth International Symposium on Computing and Networking (CANDAR'22), 76-82, 2022.
DOI: https://doi.org/10.1109/CANDAR57322.2022.00017Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups
Information Security Applications. WISA 2022. LNCS 13720, 29-43, 2023.
DOI: https://doi.org/10.1007/978-3-031-25659-2_3Anaëlle Le Dévéhat, Hiroki Shizuya, Shingo Hasegawa
On the Higher-bit Version of Approximate Inhomogeneous Short Integer Solution Problem
20th International Conference on Cryptology And Network Security (CANS2021), LNCS 13099, 253-272, 2021.
DOI: https://doi.org/10.1007/978-3-030-92548-2_14Hiroaki Anada, Masayuki Fukumitsu, Shingo Hasegawa
Group Signatures with Designated Traceability
Proceedings of 2021 Ninth International Symposium on Computing and Networking (CANDAR'21), 74-80, 2021.
DOI: https://doi.org/10.1109/CANDAR53791.2021.00017Masayuki Fukumitsu, Shingo Hasegawa
An Aggregate Signature with Pre-Communication in the Plain Public Key Model
The 17th International Workshop on Security and Trust Management (STM2021), LNCS 13075, 3-19, 2021.
DOI: https://doi.org/10.1007/978-3-030-91859-0_1Shingo Hasegawa, Masashi Hisai, Hiroki Shizuya
Public-key Projective Arithmetic Functional Encryption
Proceedings of 2020 Eighth International Symposium on Computing and Networking (CANDAR'20), 115-121, 2020.
DOI: https://doi.org/10.1109/CANDAR51075.2020.00022Masayuki Fukimitsu, Shingo Hasegawa
A Tightly Secure DDH-based Multisignature with Public Key Aggregation
Proceedings of 2020 Eighth International Symposium on Computing and Networking Workshops (CANDARW'20), 321-327, 2020.
DOI: https://doi.org/10.1109/CANDARW51189.2020.00069Masayuki Fukimitsu, Shingo Hasegawa
A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model
Provable and Practical Security. ProvSec 2020. LNCS 12505, 45-64, 2020.
DOI: https://doi.org/10.1007/978-3-030-62576-4_3Masayuki Fukumitsu, Shingo Hasegawa
Linear Lossy Identification Scheme derives Tightly-Secure Multisignature
Proceedings of 2020 15th Asia Joint Conference on Information Security (AsiaJCIS 2020), 24 - 31, 2020.
DOI: https://doi.org/10.1109/AsiaJCIS50894.2020.00016Masayuki Fukumitsu, Shingo Hasegawa
One-More Assumptions Do Not Help Fiat-Shamir-type Signature Schemes in NPROM
Topics in Cryptology -- CT-RSA 2020, LNCS 12006, 586 - 609, 2020.
DOI: https://doi.org/10.1007/978-3-030-40186-3_25Masayuki Fukumitsu, Shingo Hasegawa
A Tightly-Secure Lattice-Based Multisignature
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop (APKC ’19) , 3 - 11, 2019.
DOI: https://doi.org/10.1145/3327958.3329542Masayuki Fukumitsu, Shingo Hasegawa
A Galindo-Garcia-like Identity-based Signature with Tight Security Reduction, Revisited
Proceedings of 2018 Sixth International Symposium on Computing and Networking (CANDAR'18), 92 - 98, 2018.
DOI: https://doi.org/10.1109/CANDAR.2018.00019Masayuki Fukumitsu, Shingo Hasegawa
A Generic Construction of an Identity-based Signature from a Sigma Protocol
Proceedings of 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), 75 - 79, 2018.Masayuki Fukumitsu, Shingo Hasegawa
A Galindo-Garcia-like Identity-Based Signature with Tight Security Reduction
Proceedings of 2017 Fifth International Symposium on Computing and Networking (CANDAR'17), 87 - 93, 2017.
DOI: https://doi.org/10.1109/CANDAR.2017.79Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Masao Sakai
A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability
Proceedings of 4th International Workshop on Information and Communication Security (WICS`17) , 439 - 444, 2017.
DOI: https://doi.org/10.1109/CANDAR.2017.67Masayuki Fukumitsu, Shingo Hasegawa
Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption in the Non-programmable Random Oracle Model
International Conference on Provable Security 2017 (ProvSec 2017), LNCS 10592, 201 - 218, 2017.
DOI: https://doi.org/10.1007/978-3-319-68637-0_12Masayuki Fukumitsu, Shingo Hasegawa, Jun-ya Iwazaki, Masao Sakai, Daiki Takahashi
A Proposal of a Secure P2P-type Storage Scheme by using the Secret Sharing and the Blockchain
Proceedings of 2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA 2017), 803 - 810, 2017.
DOI: https://doi.org/10.1109/AINA.2017.11Masayuki Fukumitsu, Shingo Hasegawa
A Generic Construction of Tight Security Signatures in the Non-Programmable Random Oracle Model
Proceedings of 2016 International Symposium on Information Theory and Its Applications (ISITA 2016), 96 - 100, 2016.Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya, Ryo Takahashi
A Construction of Attribute-based Aggregate Signatures
Proceedings of 2016 International Symposium on Information Theory and Its Applications (ISITA 2016), 76 - 80, 2016.Masayuki Fukumitsu, Shingo Hasegawa
Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model
International Conference on Information Security 2016 (ISC 2016), LNCS 9866, 389 - 407, 2016.
DOI: https://doi.org/10.1007/978-3-319-45871-7_23Masayuki Fukumitsu, Shingo Hasegawa, Jun-ya Iwazaki, Masao Sakai, Daiki Takahashi
A Proposal of a Password Manager Satisfying Security and Usability by Using the Secret Sharing and a Personal Server
Proceedings of 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA 2016), 661 - 668, 2016.
DOI: https://doi.org/10.1109/AINA.2016.45Masayuki Fukumitsu, Shingo Hasegawa
Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model
International Conference on Information Security 2015 (ISC 2015), LNCS 9290, 3 - 20, 2015.
DOI: https://doi.org/10.1007/978-3-319-23318-5_1Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption
Australasian Conference on Information Security and Privacy 2014 (ACISP 2014), LNCS 8544, 290 - 305, 2014.
DOI: https://doi.org/10.1007/978-3-319-08344-5_19Shingo Hasegawa, Shuji Isobe, Jun-ya Iwazaki, Eisuke Koizumi, Hiroki Shizuya
Password-protected Secret-sharing Schemes without Random Oracles
Proceedings of 2014 International Symposium on Information Theory and Its Applications (ISITA 2014), 566 - 570, 2014.Shingo Hasegawa, Shuji Isobe
On the Security Notions of Signcryption
Proceedings of 2014 International Symposium on Information Theory and Its Applications (ISITA 2014), 231 - 235, 2014.Shingo Hasegawa, Shuji Isobe
Lossy Identification Schemes from Decisional RSA
Proceedings of 2014 International Symposium on Information Theory and Its Applications (ISITA 2014), 143 - 147, 2014.Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption
Australasian Conference on Information Security and Privacy 2013 (ACISP 2013), LNCS 7959, 72 - 87, 2013.
DOI: https://doi.org/10.1007/978-3-642-39059-3_6