Login / Signup
Ken Naganuma
Publication Activity (10 Years)
Years Active: 2011-2020
Publications (10 Years): 8
Top Topics
Order Preserving
Ring Signature
Signature Scheme
Diffie Hellman
Top Venues
AsiaJCIS
ISITA
IET Biom.
ProvSec
</>
Publications
</>
Ken Naganuma
,
Masayuki Yoshino
,
Atsuo Inoue
,
Yukinori Matsuoka
,
Mineaki Okazaki
,
Noboru Kunihiro
Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs.
AsiaJCIS
(2020)
Masayuki Yoshino
,
Ken Naganuma
,
Noboru Kunihiro
,
Hisayoshi Sato
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption.
AsiaJCIS
(2020)
Ken Naganuma
,
Takayuki Suzuki
,
Masayuki Yoshino
,
Kenta Takahashi
,
Yosuke Kaga
,
Noboru Kunihiro
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
AsiaJCIS
(2020)
Masayuki Yoshino
,
Takayuki Suzuki
,
Ken Naganuma
,
Hisayoshi Sato
Definition and Efficient Construction of Encrypted k-anonymization Scheme.
ICISSP
(2019)
Ken Naganuma
,
Masayuki Yoshino
,
Hisayoshi Sato
,
Nishio Yamada
,
Takayuki Suzuki
,
Noboru Kunihiro
Decentralized Netting Protocol over Consortium Blockchain.
ISITA
(2018)
Sota Onozawa
,
Noboru Kunihiro
,
Masayuki Yoshino
,
Ken Naganuma
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem.
IWSEC
(2018)
Yosuke Kaga
,
Masakazu Fujio
,
Ken Naganuma
,
Kenta Takahashi
,
Takao Murakami
,
Tetsushi Ohki
,
Masakatsu Nishigaki
A Secure and Practical Signature Scheme for Blockchain Based on Biometrics.
ISPEC
(2017)
Ken Naganuma
,
Masayuki Yoshino
,
Hisayoshi Sato
,
Takayuki Suzuki
Auditable Zerocoin.
EuroS&P Workshops
(2017)
Ken Naganuma
,
Hisayoshi Sato
,
Masayuki Yoshino
,
Yoshinori Sato
How to Evaluate Contents Popularity over Oblivious Transfer.
SITIS
(2013)
Masayuki Yoshino
,
Noboru Kunihiro
,
Ken Naganuma
,
Hisayoshi Sato
Symmetric Inner-Product Predicate Encryption Based on Three Groups.
ProvSec
(2012)
Kenta Takahashi
,
Ken Naganuma
Unconditionally provably secure cancellable biometrics based on a quotient polynomial ring.
IET Biom.
1 (1) (2012)
Ken Naganuma
,
Masayuki Yoshino
,
Hisayoshi Sato
Upper bound of the shortest vector coefficients and its applications.
ISITA
(2012)
Masayuki Yoshino
,
Ken Naganuma
,
Hisayoshi Satoh
Symmetric Searchable Encryption for Database Applications.
NBiS
(2011)