Login / Signup
Hiroshi Doi
Publication Activity (10 Years)
Years Active: 1984-2021
Publications (10 Years): 7
Top Topics
Secret Sharing Scheme
Privacy Preserving
Small Number
Visual Cryptography
Top Venues
J. Inf. Process.
AsiaJCIS
Financial Cryptography Workshops
IWSEC
</>
Publications
</>
Koji Shima
,
Hiroshi Doi
) Threshold Secret Sharing Schemes.
J. Inf. Process.
29 (2021)
Koji Shima
,
Hiroshi Doi
A Hierarchical Secret Sharing Scheme Based on Information Dispersal Techniques.
ICISC
(2018)
Koji Shima
,
Hiroshi Doi
XOR-Based Hierarchical Secret Sharing Scheme.
IWSEC
(2018)
Koji Shima
,
Hiroshi Doi
A Hierarchical Secret Sharing Scheme over Finite Fields of Characteristic 2.
J. Inf. Process.
25 (2017)
Koji Shima
,
Hiroshi Doi
({1, 3}, n) Hierarchical Secret Sharing Scheme Based on XOR Operations for a Small Number of Indispensable Participants.
AsiaJCIS
(2016)
Makoto Sato
,
Masami Mohri
,
Hiroshi Doi
,
Yoshiaki Shiraishi
Partially Doubly-Encrypted Identity-Based Encryption Constructed from a Certain Scheme for Content Centric Networking.
J. Inf. Process.
24 (1) (2016)
Koji Tomida
,
Hiroshi Doi
,
Masami Mohri
,
Yoshiaki Shiraishi
Ciphertext Divided Anonymous HIBE and Its Transformation to Identity-Based Encryption with Keyword Search.
J. Inf. Process.
23 (5) (2015)
Shigeo Tsujii
,
Hiroshi Doi
,
Ryou Fujita
,
Masahito Gotaishi
,
Yukiyasu Tsunoo
,
Takahiko Syouji
Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.
Financial Cryptography Workshops
(2013)
Takeo Mizuno
,
Hiroshi Doi
Secure and Efficient IBE-PKE Proxy Re-Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2011)
Daisuke Moriyama
,
Hiroshi Doi
A Fully Secure Spatial Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2011)
Jean-Luc Beuchat
,
Hiroshi Doi
,
Kaoru Fujita
,
Atsuo Inomata
,
Piseth Ith
,
Akira Kanaoka
,
Masayoshi Katouno
,
Masahiro Mambo
,
Eiji Okamoto
,
Takeshi Okamoto
,
Takaaki Shiga
,
Masaaki Shirase
,
Ryuji Soga
,
Tsuyoshi Takagi
,
Ananda Vithanage
,
Hiroyasu Yamamoto
pairing in characteristic three.
Comput. Electr. Eng.
36 (1) (2010)
Takeo Mizuno
,
Hiroshi Doi
Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption.
Inscrypt
(2009)
Wataru Senga
,
Hiroshi Doi
On the Security of Adding Confirmers into Designated Confirmer Signatures.
SECRYPT
(2009)
Genta Iha
,
Hiroshi Doi
An Implementation of the Binding Mechanism in the Web Browser for Preventing XSS Attacks: Introducing the Bind-Value Headers.
ARES
(2009)
Jean-Luc Beuchat
,
Hiroshi Doi
,
Kaoru Fujita
,
Atsuo Inomata
,
Piseth Ith
,
Akira Kanaoka
,
Masayoshi Katouno
,
Masahiro Mambo
,
Eiji Okamoto
,
Takeshi Okamoto
,
Takaaki Shiga
,
Masaaki Shirase
,
Ryuji Soga
,
Tsuyoshi Takagi
,
Ananda Vithanage
,
Hiroyasu Yamamoto
Pairing in Characteristic Three.
IACR Cryptol. ePrint Arch.
2008 (2008)
Takeo Mizuno
,
Hiroshi Doi
Efficient IBE-PKE Proxy Re-Encryption.
SECRYPT
(2008)
Lihua Wang
,
Eiji Okamoto
,
Ying Miao
,
Takeshi Okamoto
,
Hiroshi Doi
An ID-SP-M4M Scheme and Its Security Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2007)
Takayuki Tobita
,
Hironori Yamamoto
,
Hiroshi Doi
,
Keigo Majima
Privacy-Enhanced Content Distribution and Charging Scheme Using Group Signature.
WISA
(2006)
Lihua Wang
,
Eiji Okamoto
,
Ying Miao
,
Takeshi Okamoto
,
Hiroshi Doi
ID-Based Series-Parallel Multisignature Schemes for Multi-Messages from Bilinear Maps.
WCC
(2005)
Yoon Cheol Lee
,
Hiroshi Doi
On the Security of Condorcet Electronic Voting Scheme.
CIS (2)
(2005)
Mike Burmester
,
Yvo Desmedt
,
Hiroshi Doi
,
Masahiro Mambo
,
Eiji Okamoto
,
Mitsuru Tada
,
Yuko Yoshifuji
A Structured ElGamal-Type Multisignature Scheme.
Public Key Cryptography
(2000)
Hiroshi Doi
,
Masahiro Mambo
,
Eiji Okamoto
On the Security of the RSA-Based Multisignature Scheme for Various Group Structures.
ACISP
(2000)
Youji Fukada
,
Hiroshi Doi
,
Keiji Nagemine
,
Takahiko Inari
Relationships-based recognition of structural industrial parts stacked in a bin.
Robotica
2 (3) (1984)