Selected Publications

AIST > CPSEC > WATANABE Hajime

Selected Publications of WATANABE Hajime

Articles in LNCS are © Springer-Verlag. Most papers are available in Web sites of publishers but only for those members. My DBLP entry is here.


  • PAKE-based Mutual HTTP Authentication for Preventing Phishing Attacks
    Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hirofumi Suzuki,
    Proceedings of 18th International World Wide Web Conference (WWW 2009), pp. 1143-1144, ACM, Madrid, Spain, April 2009.
  • An Efficient 2-Secure and Short Random Fingerprint Code and its Security Evaluation
    Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe,
    IEICE Transactions on Fundamentals,
    vol.E92-A, no.1, pp.197–206, Jan. 2009.
  • Chosen Ciphertext Secure Public Key Encryption with a Simple Structure
    Goichiro Hanaoka, Hideki Imai, Kazuto Ogawa, Hajime Watanabe,
    Proceedings of IWSEC2008,
    LNCS 5312, pp.20–33, Takamatsu, Japan, Nov. 2008.
  • An Improvement of Tardos's Collusion-secure Fingerprinting Codes with Very Short Lengths
    Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, and Hideki Imai,
    Proceedings of 17th AAECC Symposium (Applied Algebra, Algebraic Algorithms, and Error Correcting Codes),
    LNCS 4851, pp. 80–89, Bangalore, India, Dec. 2007.
  • New Variant for an Attack Against RSA Signature Verification Using Parameter Field
    Yutaka Oiwa, Kazukuni Kobara and Hajime Watanabe,
    Proceedings of EuroPKI 2007 (4th European PKI Workshop: Theory and Practice),
    LNCS 4582, pp.143–153, Palma de Mallorca, Spain, June 2007.
  • Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount
    Koji Nuida, Manabu Hagiwara, Hajime Watanabe and Hideki Imai,
    Proceedings of 9th Information Hiding (IH'07),
    LNCS 4567, pp.279–293, Saint Malo, France, June 2007.
  • A Tracing Algorithm for Short 2-Secure Probabilistic Fingerprinting Codes Strongly Protecting Innocent Users
    Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Satoshi Fujitsu and Hideki Imai,
    Proceedings of IEEE CCNC 2007 (4th Annual IEEE Consumer Communications and Networking Conference)
    DRM Workshop (3rd IEEE International Workshop on Digital Rights Management Impact on Consumer Communications),
    pp.1068–1072, Las Vegas, USA, Jan. 2007.
  • Generic Transforms to Acquire CCA-Security for Identity Based Encryption: the Cases of FOpkc and REACT
    Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura and Hideki Imai,
    Proceedings of ACISP 2006 (11th Australasian Conference on Information Security and Privacy),
    LNCS 4058, pp.348–359, Melbourne, Australia, July 2006.
  • Unconditionally Secure Chaffing-and-Winnowing: A Relationship between Encryption and Authentication
    Goichiro Hanaoka, Yumiko Hanaoka, Manabu Hagiwara, Hajime Watanabe, and Hideki Imai
    Proceedings of 16th AAECC Symposium (Applied Algebra, Algebraic Algorithms, and Error Correcting Codes),
    LNCS 3857,pp.154–162, Las Vegas, USA, Feb. 2006.
  • A Random-Error-Resilient Collusion-Secure Fingerprinting Code, Randomized c-Secure CRT Code
    Hajime Watanabe and Takashi Kitagawa,
    IEICE Transactions on Fundamentals,
    vol.E86-A, no.10, pp.2589–2595, Oct. 2003.

  • An ID Coding Scheme for Fingerprintng, Randomized c-Secure CRT Code
    Hajime Watanabe and Takashi Kitagawa,
    Proceedings of ICICS2002 (4th International Conference on Information and Communications Security),
    LNCS 2513, pp.173–183, Singapore, Dec. 2002.

  • An Attack for a Fingerprinting Code and its Success Probability
    Hajime Watanabe and Takashi Kitagawa,
    Proceedings of ISITA2002 (2002 International Symposium on Information Theory and Its Applications),
    pp.555–558, Xi'an, P.R. China, Oct. 2002.

  • Relations among Security Goals of Probabilistic Public-Key Cryptosystems
    Ako Suzuki, Yuichi Kaji and Hajime Watanabe,
    IEICE Transactions on Fundamentals,
    vol.E84-A, no.1, pp.172–178, Jan. 2001.

  • An Auction Protocol which Hides Losers and Their Prices
    Takashi Kitagawa and Hajime Watanabe,
    Proceedings of ISITA2000 (2000 International Symposium on Information Theory and Its Applications),
    pp.509–512, Hawaii, USA, Nov. 2000.

  • Relations among Security Goals of Probabilistic Public-Key Cryptosystems
    Ako Suzuki, Yuichi Kaji and Hajime Watanabe,
    Proceedings of ISITA2000 (2000 International Symposium on Information Theory and Its Applications),
    pp.657–660, Hawaii, USA, Nov. 2000.

  • An Anonymous Bidding Protocol without any Reliable Center
    Toru Nakanishi, Toru Fujiwara and Hajime Watanabe,
    IPSJ Journal, vol.41, no.8, pp.2161–2169, Aug. 2000.

  • A Linkable Group Signature and Its Application to a Secret Voting
    Toru Nakanishi, Toru Fujiwara and Hajime Watanabe,
    IPSJ Journal, vol.40, no.7, pp.3085–3096, July. 1999.
    Please get full article from first author's page.

  • A Watermarking System with Two Servers which can Detect Server's Corruption
    Hajime Watanabe and Tadao Kasami,
    Proceedings of JWIS'98 (First Japan-Singapore Joint Workshop on Information Security),
    pp.15–20, Singapore, Dec. 1998.

  • Security Verification of Real-Time Cryptographic Protocols Using a Rewriting Approach
    Takehiko Tanaka, Yuichi Kaji, Hajime Watanabe, Toyoo Takata and T.Kasami,
    IEICE Transactions on Information and Systems,
    vol.E81-D, no.4, pp.355–363, Apr. 1998.

  • A Secure Code for Recipient Watermarking against Conspiracy Attacks by All Users
    Hajime Watanabe and Tadao Kasami,
    Proceedings of ICICS'97(First International Conference on Information and Communications Security),
    LNCS 1334, pp.414–423, Beijing, P.R.China, Nov. 1997.

  • A Linkable Group Signature and Its Application to a Fair Secret Voting
    Toru Nakanishi, Toru Fujiwara and Hajime Watanabe,
    Proceedings of ISCTA'97(4th International Symposium on Communication Theory and Applications),
    UK, July 1997.

  • An Improved Method for Formal Security Verification of Cryptographic Protocols
    Hajime Watanabe, Toru Fujiwara and T.Kasami,
    IEICE Transactions on Fundamentals,
    vol.E79-A, no.7, pp.1089–1096, July 1996.

  • A System for Deciding the Security of Cryptographic Protocols
    Hajime Watanabe, Toru Fujiwara and T.Kasami,
    IEICE Transactions on Fundamentals,
    vol.E76-A, no.1, pp.96–103, Jan. 1993.