Selected Publications of WATANABE Hajime
Articles in LNCS
are © Springer-Verlag.
Most papers are available in Web sites of publishers but
only for those members. My DBLP entry is here.
-
PAKE-based Mutual HTTP Authentication for Preventing Phishing Attacks
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki,
Proceedings of 18th International World Wide Web Conference (WWW 2009), pp. 1143-1144, ACM, Madrid, Spain, April 2009.
-
An Efficient 2-Secure and Short Random Fingerprint Code and its Security Evaluation
Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe,
IEICE Transactions on Fundamentals,
vol.E92-A, no.1, pp.197–206, Jan. 2009.
-
Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe,
Proceedings of IWSEC2008,
LNCS 5312, pp.20–33, Takamatsu, Japan, Nov. 2008.
-
An Improvement of Tardos's Collusion-secure Fingerprinting Codes with Very Short Lengths
Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, and Hideki Imai,
Proceedings of 17th AAECC Symposium (Applied Algebra, Algebraic Algorithms, and Error Correcting Codes),
LNCS 4851, pp. 80–89, Bangalore, India, Dec. 2007.
-
New Variant for an Attack Against RSA Signature Verification Using Parameter Field
Yutaka Oiwa, Kazukuni Kobara and Hajime Watanabe,
Proceedings of EuroPKI 2007 (4th European PKI Workshop: Theory and Practice),
LNCS 4582, pp.143–153, Palma de Mallorca, Spain, June 2007.
-
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount
Koji Nuida, Manabu Hagiwara, Hajime Watanabe and Hideki Imai,
Proceedings of 9th Information Hiding (IH'07),
LNCS 4567, pp.279–293, Saint Malo, France, June 2007.
-
A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users
Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Satoshi Fujitsu and Hideki Imai,
Proceedings of IEEE CCNC 2007 (4th Annual IEEE Consumer Communications and Networking Conference)
DRM Workshop (3rd IEEE International Workshop on Digital Rights Management Impact on Consumer Communications),
pp.1068–1072, Las Vegas, USA, Jan. 2007.
-
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: the Cases of FOpkc and REACT
Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura and Hideki Imai,
Proceedings of ACISP 2006 (11th Australasian Conference on Information Security and Privacy),
LNCS 4058, pp.348–359, Melbourne, Australia, July 2006.
-
Unconditionally Secure Chaffing-and-Winnowing: A Relationship between Encryption and Authentication
Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, and Hideki Imai
Proceedings of 16th AAECC Symposium (Applied Algebra, Algebraic Algorithms, and Error Correcting Codes),
LNCS 3857,pp.154–162, Las Vegas, USA, Feb. 2006.
-
A Random-Error-Resilient Collusion-Secure Fingerprinting Code,
Randomized c-Secure CRT Code
Hajime Watanabe and Takashi Kitagawa,
IEICE Transactions on Fundamentals,
vol.E86-A, no.10, pp.2589–2595, Oct. 2003.
-
An ID Coding Scheme for Fingerprintng, Randomized
c-Secure CRT Code
Hajime Watanabe and Takashi Kitagawa,
Proceedings of ICICS2002 (4th International Conference on Information and Communications Security),
LNCS 2513, pp.173–183, Singapore, Dec. 2002.
-
An Attack for a Fingerprinting Code and its Success Probability
Hajime Watanabe and Takashi Kitagawa,
Proceedings of ISITA2002 (2002 International Symposium on Information Theory and Its Applications),
pp.555–558, Xi'an, P.R. China, Oct. 2002.
-
Relations among Security Goals of Probabilistic Public-Key Cryptosystems
Ako Suzuki, Yuichi Kaji and Hajime Watanabe,
IEICE Transactions on Fundamentals,
vol.E84-A, no.1, pp.172–178, Jan. 2001.
-
An Auction Protocol which Hides Losers and Their Prices
Takashi Kitagawa and Hajime Watanabe,
Proceedings of ISITA2000 (2000 International Symposium on Information Theory and Its Applications),
pp.509–512, Hawaii, USA, Nov. 2000.
-
Relations among Security Goals of Probabilistic
Public-Key Cryptosystems
Ako Suzuki, Yuichi Kaji and Hajime Watanabe,
Proceedings of ISITA2000 (2000 International Symposium on Information Theory and Its Applications),
pp.657–660, Hawaii, USA, Nov. 2000.
-
An Anonymous Bidding Protocol without any Reliable
Center
Toru Nakanishi, Toru Fujiwara and Hajime Watanabe,
IPSJ Journal, vol.41, no.8, pp.2161–2169, Aug. 2000.
-
A Linkable Group Signature and Its Application to
a Secret Voting
Toru Nakanishi, Toru Fujiwara and Hajime Watanabe,
IPSJ Journal, vol.40, no.7, pp.3085–3096, July. 1999.
Please get full article from first author's page.
-
A Watermarking System with Two Servers which can Detect Server's Corruption
Hajime Watanabe and Tadao Kasami,
Proceedings of JWIS'98 (First Japan-Singapore Joint Workshop on Information Security),
pp.15–20, Singapore, Dec. 1998.
-
Security Verification of Real-Time Cryptographic
Protocols Using a Rewriting Approach
Takehiko Tanaka, Yuichi Kaji, Hajime Watanabe, Toyoo Takata and T.Kasami,
IEICE Transactions on Information and Systems,
vol.E81-D, no.4, pp.355–363, Apr. 1998.
-
A Secure Code for Recipient Watermarking against
Conspiracy Attacks by All Users
Hajime Watanabe and Tadao Kasami,
Proceedings of ICICS'97(First International Conference on Information and Communications Security),
LNCS 1334, pp.414–423, Beijing, P.R.China, Nov. 1997.
-
A Linkable Group Signature and Its Application to a Fair Secret Voting
Toru Nakanishi, Toru Fujiwara and Hajime Watanabe,
Proceedings of ISCTA'97(4th International Symposium on Communication Theory and Applications),
UK, July 1997.
-
An Improved Method for Formal Security Verification of Cryptographic Protocols
Hajime Watanabe, Toru Fujiwara and T.Kasami,
IEICE Transactions on Fundamentals,
vol.E79-A, no.7, pp.1089–1096, July 1996.
-
A System for Deciding the Security of Cryptographic Protocols
Hajime Watanabe, Toru Fujiwara and T.Kasami,
IEICE Transactions on Fundamentals,
vol.E76-A, no.1, pp.96–103, Jan. 1993.