Publications - 研究業績のリスト

Overview - 概要

研究業績の概要です.全業績はこちら→[pdfファイル]

  • 投稿中: 0件
  • 学術論文誌: 12件
  • 査読付きの国際会議: 30件
  • 学会誌解説: 1件
  • 招待講演: 9件
  • 受賞: 5件
  • 査読の無い国際会議: 3件
  • 査読の無い国内会議: 62件

投稿中

Journal Articles - 学術論文誌

  1. Maki Yoshida and Toru Fujiwara, ``Toward Digital Watermarking for Cryptographic Data,'' IEICE Transactions on Fundamentals, Vol.E94-A, No.1, pp.270-272 (2011-01).
  2. 山中 広明, 岡村 真吾, 藤原 融, 吉田 真紀, 石原 靖哲, 秋山 豊和, 加藤 精一, 下條 真司, ``評価者間類似度計算の改善による汚染コンテンツダウンロード抑制効果向上,'' 情報処理学会論文誌, Vol.51 No.8, pp.1428--1442 (2010-08).
  3. Maki Yoshida and Toru Fujiwara, ``Expiration Dated Fingerprinting,'' IJICIC, Vol.6, No.3, pp.1271--1278 (2010-03). (Impact factor:2008:2.79)
  4. 鈴木 斎輝,吉田 真紀,藤原 融, ``公理的安全性の枠組みにおける汎用的結合可能な相互認証と鍵交換の記号的安全性,'' 日本応用数理学会論文誌, 第20巻, 第1号, pp.11-32 (2010-03).
  5. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, ``The Vector Decomposition Problem,'' IEICE Transactions on Fundamentals, Vol.E93-A, No.1, pp.188--193 (2010-01). Best paper award
  6. Maki Yoshida and Toru Fujiwara, ``Flexible Timed-release Encryption,'' IEICE Transactions on Fundamentals, Vol.E92-A, No.1, pp.222--225 (2009-01).
  7. 北村 至, 吉田 真紀, 藤原 融, ``画素空間へのパッチワーク法と相関型電子透かし法の検出誤り確率の比較,'' 電子情報通信学会論文誌(D), Vol.J91-D, No.11, pp.2605-2615 (2008-11).
  8. Satoshi Nakayama, Maki Yoshida, Shingo Okamura, and Toru Fujiwara, ``A Private and Consistent Data Retrieval Scheme with Log-Squared Communication,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.1, pp.204--215 (2007-01).
  9. Takaaki Fujita, Maki Yoshida, and Toru Fujiwara, ``A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E90-A, No.1, pp.216--225 (2007-01).
  10. Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida, and Toru Fujiwara, ``Unlinkable Delivery System for Interactive Dramas,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E88-A, No.1, pp.262--269 (2005-01).
  11. Maki Yoshida and Toru Fujiwara, ``Analysis and Optimization of Coding Constructions for Blacklisting Problem,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E84-A, No.9, pp.2338--2345 (2001-09).
  12. Maki Yoshida and Toru Fujiwara, ``A Subscriber-Excluding and Traitor-Tracing Broadcast Distribution System,'' IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.E84-A, No.1, pp.247--255 (2001-01).

Articles in refereed conferences and workshops

  1. Itsuki Suzuki, Maki Yoshida, and Toru Fujiwara, ``Generic Construction of GUC Secure Commitment in the KRK Model,'' the 7th International Workshop on Security (IWSEC2012), LNCS 7631, pp.244--260 (2012-11).
  2. Seigo Ikeda, Maki Yoshida, and Toru Fujiwara, ``New Hybrid Additive-Multiplicative Watermarking with Better Tradeoff between Image Quality and Detection Accuracy,'' 2012 International Symposium on Information Theory and its Applications (ISITA2012), accepted (2012-10).
  3. Maki Yoshida, Toru Fujiwara, and Marc P.C. Fossorier, ``Optimum General Threshold Secret Sharing,'' the 6th International Conference on Information Theoretic Security (ICITS2012), LNCS 7412, pp.187--204 (2012-08).
  4. Maki Yoshida and Toru Fujiwara, ``All-or-nothing Property for Efficient Symbolic Analysis,'' Computational and Symbolic Proofs of Security (2010-04).
  5. Maki Yoshida and Toru Fujiwara, ``Watermarking Cryptographic Data,'' the Fifth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2009), A02-02 (CD-ROM) (2009-09).
  6. Kazuya Ohkita, Maki Yoshida, Itaru Kitamura, and Toru Fujiwara, ``Improving Capability of Locating Tampered Pixels of Statistical Fragile Watermarking,'' the 8th International Workshop on Digital Watermarking (IWDW 2009), LNCS 5703, pp.279-293 (2009-08).
  7. Itsuki Suzuki, Yoshiki Kamano, Maki Yoshida, and Toru Fujiwara, ``Development of a Verification Tool for Composable Security,'' Computational and Symbolic Proofs of Security (2009-04).
  8. Kazuhiro Haramura, Maki Yoshida, and Toru Fujiwara, ``Anonymous Fingerprinting for Predelivery of Contents,'' Proceedings of the 11th International Conference on Information Security and Cryptography (ICISC2008), LNCS 5461, pp.134-151 (2008-12).
  9. Mohamed Layouni, Maki Yoshida, and Shingo Okamura, ``Efficient Multi-Authorizer Accredited Symmetrically Private Information Retrieval,'' Proceedings of the 10th International Conference on Information and Communications Security (ICICS2008), LNCS 5308, pp.387--402 (2008-10).
  10. Maki Yoshida and Toru Fujiwara, ``Expiration-dated Fingerprinting,'' Proceedings of the Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), pp.147--150 (2008-08). Best paper award
  11. Maki Yoshida and Toru Fujiwara, ``Global Timed-release Encryption,'' Proceedings of the 26th International Conference on Consumer Electronics 2008 (ICCE2008) (2008-01).
  12. Maki Yoshida, Itaru Kitamura, and Toru Fujiwara, ``A New Scheme for Optimum Decoding of Additive Watermarks in Spatial Domain,'' Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2007) (2007-11).
  13. Maki Yoshida and Toru Fujiwara, ``A Secure Construction for the Nonlinear Function Threshold Ramp Secret Sharing Scheme,'' Proceedings of the 2007 IEEE International Symposium on Information Theory (ISIT2007), CD-ROM (2007-07).
  14. Maki Yoshida, Takaaki Fujita, and Toru Fujiwara, ``A New Optimum Detection Scheme for Additive Watermarks in Spatial Domain,'' Proceedings of the 2nd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP2006), pp.101--104 (2006-12).
  15. Junya Asano, Shingo Okamura, Maki Yoshida, and Toru Fujiwara, ``Towards Secure C2C Contents Distribution Services,'' Proceedings of the 1st Joint Workshop on Information Security (JWIS2006), pp.347--360 (2006-09).
  16. Maki Yoshida and Toru Fujiwara, ``On the Security of Tag-KEM for Signcryption,'' Proceedings of the 2nd Workshop on Cryptography for Ad hoc Networks (WCAN'06), Electronic Notes in Theoretical Computer Science 171, No.1, pp.83--91 (2006-07).
  17. Maki Yoshida, Shigeo Mitsunari, and Toru Fujiwara, ``A Timed-Release Key Management Scheme for Backward Recovery,'' Proceedings of the 8th Annual International Conference on Information Security and Cryptology (ICISC2005), LNCS 3935, pp.3--14 (2005-12).
  18. Takaaki Fujita, Kunihiro Okamoto, Maki Yoshida, and Toru Fujiwara, ``A Watermark Detection Scheme Ensuring the False Positive Error Probability,'' Conference Records of Western European Workshop on Research in Cryptology (WEWoRC2005), pp.18--19 (2005-7).
  19. Satoshi Nakayama, Maki Yoshida, Shingo Okamura, Akira Fujiwara, and Toru Fujiwara, ``An Efficient Private and Consistent Data Retrieval Protocol,'' Conference Records of Western European Workshop on Research in Cryptology (WEWoRC2005), pp.83--84 (2005-7).
  20. Shingo Okamura, Maki Yoshida, and Toru Fujiwara, ``Coin-based Anonymous Fingerprinting Scheme with Automatic Identification of Redistributors,'' Peer-reviewed Proceedings of the ISSA 2005 New Knowledge Today Conference (ISSA2005), CD-ROM (2005-06).
  21. Kunihiro Okamoto, Takayuki Ueno, Maki Yoshida, and Toru Fujiwara, ``A Method to Ensure Reliability of a Detection Result for Correlation Based Watermarking Detection Schemes,'' Proceedings of the 2004 International Symposium on Information Theory and Its Applications (ISITA2004), pp.299--304 (2004-10).
  22. Akira Fujiwara, Shingo Okamura, Maki Yoshida, and Toru Fujiwara, ``A Digital Contents Consignment System Protecting Marketing Information,'' Proceedings of the 2004 International Symposium on Information Theory and Its Applications (ISITA2004), pp.468--473 (2004-10).
  23. Shingo Okamura, Maki Yoshida, and Toru Fujiwara, ``Unlinkable Delivery System for Interactive Dramas Including Conditional Choices,'' Proceedings of the 2004 International Symposium on Information Theory and Its Applications (ISITA2004), pp.474--479 (2004-10).
  24. Shingo Okamura, Yoshiyuki Konishi, Maki Yoshida and Toru Fujiwara, ``An Interactive Drama Delivery System Suitable for Mobile Phone (Preliminary Version),'' Proceedings of the 5th International Workshop on Information Security Applications (WISA2004), pp.391--398 (2004-8).
  25. Shingo Okamura, Maki Yoshida, and Toru Fujiwara, ``A Validatable Revocation Scheme with Black-Box Traitor Tracing,'' Proceedings of the 2002 International Symposium on Information Theory and Its Applications (ISITA2002), pp.355--358 (2002-10).
  26. Takayuki Ueno, Maki Yoshida, and Toru Fujiwara, ``A Method of Estimating the Detection Error Rate in a Certain Digital Watermarking for Audio Signals,'' Proceedings of the 2002 International Symposium on Information Theory and Its Applications (ISITA2002), pp.359--362 (2002-10).
  27. Maki Yoshida and Toru Fujiwara, ``Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem,'' Proceedings of the 8th IMA International Conference on Cryptography and Coding, LNCS 2260, pp.27--37 (2001-12).
  28. Maki Yoshida and Toru Fujiwara, ``An Efficient Traitor Tracing Scheme for Broadcast Encryption,'' Proceedings of the 2000 IEEE International Symposium on Information Theory (ISIT2000), p.463 (2000-06).
  29. Maki Yoshida, Takahiro Horikawa and Toru Fujiwara, ``An Improvement of Coding Constructions for Blacklisting Problems,'' Proceedings of the 2000 International Symposium on Information Theory and Its Applications (ISITA2000), pp.493--496 (2000-11).
  30. Maki Yoshida and Toru Fujiwara, ``Distributed Generation of RSA-Key for Three or More Parties,'' Proceedings of the 1998 First Japan-Singapore Joint Workshop on Information Security (JWIS'98), pp.117--122 (1998-12).

Survey - 学会誌解説

  1. 吉田 真紀, ``大切な情報をどうやって守りますか?,'' 日本化学会情報化学部会誌, Vol.23, No.3, pp.79--82 (2005-09).

Invited talk - 招待講演

  1. 吉田 真紀, “画質劣化を抑えた加法と乗法のハイブリッド電子透かしと尤度比検定による最適な検出,” CompView 暗号理論ワークショップ (2012-02).
  2. 吉田 真紀, “Bilinear Group に関する困難性仮定への攻撃導出,'' 計算機代数システムの進展 (Progress in Computer Algebra Systems, PCAS'11) (2011-08).
  3. Maki Yoshida, “On $d$-Multiplicative Non-perfect Secret Sharing,” 2011 Workshop on Secret Sharing and Cloud Computing (2011-06).
  4. 吉田 真紀, “Bilinear Groupに関する困難性仮定への攻撃導出,” CompView 暗号理論ワークショップ (2011-02).
  5. 吉田 真紀, “多様性か否か-安全性の形式的検証と男女共同参画,” 東工大女性研究者のキャリアモデルインタビュー (2010-02).
  6. 吉田 真紀, “電子透かし性能向上のための統計的手法,” 電子透かしと確率的情報処理 (2009-11).
  7. 吉田 真紀, ``情報セキュリティ研究生活と大阪大学における男女共同参画の取り組み,'' 東工大女性研究者のキャリアモデルインタビュー (2009-03).
  8. 吉田 真紀, ``電子透かしにおける最適な検出について,'' 第2回符号と暗号の代数的数理研究集会報告集, pp.128--137 (2005-04).
  9. Maki Yoshida, ``Inseparable Multiplex Transmission Using the Pairing on Elliptic Curves and Its Application to Watermarking,'' Proceedings of the Fifth Conference on Algebraic Geometry Number Theory and Cryptography, pp.147--156 (2003-01).

Awards - 受賞

  1. 2011年11月10 Papers Selection, Annual Report of Osaka University, Academic Achievement 2010-2011
  2. 2011年5月 第67回電子情報通信学会 論文賞
  3. 2009年12月 2009年 情報理論とその応用学会 SITA奨励賞(第31回情報理論とその応用シンポジウム(SITA2008)の発表論文)
  4. 2009年2月 平成20年度 国立大学法人大阪大学 教育・研究功績賞
  5. 2008年8月 The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008) Best paper award (Ratio: 0.008 (3 papers / 346 accepted papers))