Rchr
J-GLOBAL ID:200901057404000594   Update date: Mar. 01, 2019

SHIKATA Junji

シカタ ジュンジ | SHIKATA Junji
Affiliation and department:
Homepage URL  (1): http://www.slab.ynu.ac.jp/
Research field  (2): Theory of informatics ,  Foundations of mathematics/Applied mathematics
Papers (49):
  • N. Takei, Y. Watanabe and J. Shikata. Information-Theoretically Secure Blind Authentication Codes without Verifier's Secret Keys. Proc. of Annual Workshop on Statisitcal Science and Related Topics (Josai Mathematical Monograph 8), Tokyo, Japan. 2014
  • Y. Watanabe and J. Shikata. Timed-Release Secret Sharing Schemes with Information Theoretic Security. Proc. of the 1st International Conference on Cryptography and Information Security in Balkans (BalkanCryptSec2014), Istanbul, Turkey. 2014. 9024. 219-236
  • Y. Watanabe and J. Shikata. Timed-Release Computational Secret Sharing Scheme and Its Applications. Proc. of the 8th International Conference on Provable Security (ProvSec2014), LNCS 8782, Springer, Hong Kong. 2014. 326-333
  • M. Iwamoto and J. Shikata. Secret Sharing Schemes Based on Min-Entropies. Proc. of IEEE International Symposium on Information Theory (ISIT 2014), Honolulu, HI, USA. 2014
  • T. Seito, Y. Watanabe, K. Kinose, and J. Shikata. Information-Theoretically Secure Anonymous Group Authentication with Arbitration: Formal Definition and Construction. Josai Mathematical Monograph 7. 2014. 85-110
more...
MISC (60):
  • S. Sato, S. Hirose, J. Shikata. Generic Construction of Sequential Aggregate MACs from Any MACs. Proceedings of The 12th International Conference on Provable Security (ProvSec 2018). 2018. LNCS 11192. 295-312
  • S. Sato, J. Shikata. Signcryption with Quantum Random Oracles. Proceedings of The 12th International Conference on Provable Security (ProvSec 2018). 2018. LNCS 11192. 406-414
  • S. Hirose and J. Shikata. Non-adaptive Group-Testing Aggregate MAC Schemes. Proceedings of The 14th International Conference on Information Security Practice and Experience (ISPEC 2018). 2018. LNCS 11125. 357-372
  • Amonrat Prasitsupparote, Norio Konno, Junji Shikata. Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences. Entropy. 2018. 20. 10
  • Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata. Lower Bounds on Lattice Enumeration with Extreme Pruning. Proceedings of CRYPTO 2018. 2018. LNCS 10992. 608-637
more...
Lectures and oral presentations  (7):
  • 情報理論的安全性を有する暗号システムの構築理論
    (情報・物理セキュリティ研究ワークショップ 2009)
  • 情報理論的安全性を有する暗号プロトコル
    (北陸先端科学技術大学院大学 2010)
  • Information-Theoretic Cryptography: Survey and Challenge
    (JSPS-DST Asian Academic Seminar 2013 (AAS 2013: 日印アジアアカデミックセミナー) 2013)
  • 数理科学の理論の先にみる世界-数学的思考と宗教の関わり
    (本願寺文化財団特別講 2013)
  • 情報理論的暗号技術について:理論と応用
    (情報ネットワーク科学研究会 2014)
more...
Education (3):
  • - 1994 Kyoto University Faculty of Science
  • - 1997 Kyoto University Graduate School, Division of Natural Science
  • - 2000 Osaka University Graduate School, Division of Natural Science
Professional career (1):
  • Ph.D. (Osaka University)
Work history (2):
  • 2000/04 - 2002/03 Institute of Industrial Science, University of Tokyo
  • 2002/04 - 現在 Graduate School of Environment and Information Sciences, Yokohama National University
Awards (4):
  • 2014/08 - The 9th International Workshop on Securty (IWSEC2014) The 9th International Workshop on Securty (IWSEC2014), The Best Poster Award
  • 2010/04 - The Young Scientists' Prize, the Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology
  • 2007/05 - The British Computer Society The Wilkes Award 2006
  • 2004/03 - TELECOM System Technology Award from The Telecommunications Advancement Foundation
※ Researcher’s information displayed in J-GLOBAL is based on the information registered in researchmap. For details, see here.

Return to Previous Page