Jump to contents

Researcher Information

last modified:2024/04/27

Professor MAMBO Masahiro

Laboratory Website

Faculty, Affiliation

Faculty of Electrical, Information and Communication Engineering,Institute of Science and Engineering

College and School Educational Field

Division of Electrical,Information and Communication Engineering, Graduate School of Natural Science and Technology
Division of Electrical Engineering and Computer Science, Graduate School of Natural Science and Technology
Course in Information and Communication Engineering, School of Electrical, Information and Communication Engineering, College of Science and Engineering

Laboratory

Academic Background

Career

Year & Month of Birth

Academic Society

Award

Specialities

Communication/Network engineering

Speciality Keywords

Information Security, Cryptography

Research Themes

Security in New Emerging Computing Enviornments

Other Protection/Authentication techniques

Secure Protocols

Cryptography

Books

Papers

  •  IHIBE: A Hierarchical and Delegated Access Control Mechanism for IoT Environments Sensors  Hari Purnama, Masahiro Mambo Sensors 24 article 979 2024/02/02
  •  Anonymous Hierarchical Identity-Based Encryption with Delegated Traceability for Cloud-Based Data Sharing Systems Zi-Yuan Liu, Masahiro Mambo, Raylin Tso, Yi-Fan Tseng Computer Standards & Interfaces 89 article 103817 2024/04
  •  A Reliable Application of MPC for Securing the Tri-training Algorithm Hendra Kurniawan, Masahiro Mambo IEEE Access 11 34718-34735 2023/04/03
  •  A Provably Secure Lattice-Based Fuzzy Signature Scheme Using Linear Sketch Mingmei Zheng, Zi-Yuan Liu, Masahiro Mambo IEEE Access 11 62510-62521 2023/06/19
  •  Homomorphic Encryption-based Federated Privacy Preservation for Deep Active Learning Hendra Kurniawan, Masahiro Mambo Entropy 24 11 Article 1545 2022/10/27

show all

  •  Public Key Encryption with Hierarchical Authorized Keyword Search Zi-Yuan Liu, Chu-Chieh Chien, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo Proc. ICISC 2022 LNCS13849 147-170 2022/11/30
  •  Accountable Bootstrapping based on Attack Resilient Public Key Infrastructure and Secure Zero Touch Provisioning Danu Dwi Sanjoyo, Masahiro Mambo IEEE Access 10 134086-134112 2022/10
  •  Public-key Authenticated Encryption with Keyword Search: A Generic Construction and Its Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen The Computer Journal 65 10 2828-2844 2022/10
  •  Identity-certifying Authority-aided Identity-based Searchable Encryption Framework in Cloud Systems Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Yu-Chi Chen, Masahiro Mambo IEEE Systems Journal 16 3 4629-4640 2022/09
  •  Efficient and Privacy-Preserving Certificate Activation for V2X Pseudonym Certificate Revocation Jan Wantoro, Masahiro Mambo Journal of Sensor and Actuator Networks 11 3 Article 51 2022/09/01
  •  Quantum-resistant 1-out-of-N Oblivious Signature from Lattices Jing-Shiuan You, Zi-Yuan Liu, Raylin Tso, Yi-Fan Tseng and Masahiro Mambo Proc. IWSEC 2022 LNCS13504 166-186 2022/09/01
  •  Public-key Authenticated Encryption with Keyword Search: Cryptanalysis, Enhanced Security, and Quantum-resistant Instantiation Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen Proc. ACM ASIA CCS 2022 423-436 2022/06/01
  •  Quantum-resistant anonymous identity-based encryption with traceable identities Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, and Yu-Chi Chen IET Information Security 16 2 111-126 2022/03
  •  Performance Comparison of Hybrid Encryption-based Access Control Schemes in NDN Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo Proc. the 17th International Conference on Mobility, Sensing and Networking (MSN 2021) 622-627 2021/12
  •  Secure Content Distribution with Access Control Enforcement in Named Data Networking Htet Htet Hlaing, Yuki Funamoto, Masahiro Mambo Sensors 21 13 Article 4477 2021/06
  •  Designated-Ciphertext Searchable Encryption Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo Journal of Information Security and Applications 58 Article 102709 2021/05
  •  BPT Scheme: Establishing Trusted Vehicular Fog Computing Service for Rural Area Based on Blockchain Approach Favian Dewanta, Masahiro Mambo IEEE Trans. on Vehicular Technology 70 2 1752-1769 2021/02
  •  Trapdoor Assignment of PEKS-based NDN Strategy in Two-Tier Networks Kyi Thar Ko, Masahiro Mambo Proc. the 16th International Conference on Mobility, Sensing and Networking (MSN 2020) 607-613 2020/12
  •  A PEKS-based NDN for Name Privacy Kyi Thar Ko, Htet Htet Hlaing, Masahiro Mambo Future Internet 12 8 Article 130 2020/07/31
  •  An Overview of Named Data Networking and its Challenging Security Issues Kyi Thar Ko and Masahiro Mambo Proc. 1th International Conference on Science and Engineering 2019 1 223-225 2019/12
  •  A Quantitative Evaluation Method of Pseudonym Update by Using Re-identification Rate Kazuya Fukushima, Shogo Kitajima, Masahiro Mambo IPSJ Journal 60 9 1509-1517 2019/09
  •  Favian Dewanta and Masahiro Mambo Favian Dewanta and Masahiro Mambo IEEE Access 7 1 103095-103114 2019/12
  •  Privacy Risk Evaluation of Re-Identification of Pseudonyms Yuma Takeuchi, Shogo Kitajima, Kazuya Fukushima, Masahiro Mambo Proc. 2019 14th Asia Joint Conference on Information Security, AsiaJCIS 2019 165-172 2019/08/02
  •  Data Anonymization for Hiding Personal Tendency in Set-valued Database Publication Dedi Gunawan, Masahiro Mambo Future Internet 11 6 Article 138 (16 pages) 2019/06
  •  Hiding Personal Tendency in Set-valued Database Publication Dedi Gunawan, Masahiro Mambo Proc. the 2nd International Conference on Information Science and System 2019/03
  •  Bidding Price-based Transaction: Trust Establishment for Vehicular Fog Computing Service in Rural Area Favian Dewanta, Masahiro Mambo Proc. The Third International Workshop on Smart Edge Computing and Networking (SmartEdge) 2019/03
  •  Set-Valued Data Anonymization Maintaining Data Utility and Data Property Dedi Gunawan, Masahiro Mambo Proc. of the 12th International Conference on Ubiquitous Information Management and Communication 2018/01
  •  Parallelizable Message Preprocessing for Merkle-Damgard Hash Functions Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo Proc. 2018 International Symposium on Information Theory and Its Application 2018/10
  •  Verifying the Validity of Public Key Certificates Using Edge Computing  Shogo Kitajima and Masahiro Mambo Proc. 2017 International Conference on Security with Intelligent Computing and Big-data Services AISC 2017/12
  •  Shoulder-Surfing Resistant Authentication Using Pass Pattern of Pattern Lock So Higashikawa, Tomoaki Kosugi, Shogo Kitajima, Masahiro Mambo IEICE Trans. Info&Systems E101-D 1 45-52 2018/01
  •  Mobile edge computing, Fog et al.: A survey and analysis of security threats and challenges Rodrigo Roman, Javier Lopez, Masahiro Mambo Future Generation Computer Systems 78 Part 2 680-698 2018/01
  •  Implementation of Certificateless Signcryption based on Elliptic Curve Using Javascript Abdul Wahid, Masahiro Mambo International Journal of Computing and Informatics 1 3 90-100 2016/08
  •  Implementation of μNaCl on 32-bit ARM Cortex-M0 Toshifumi NISHINAGA, Masahiro MAMBO The IEICE Trans. on Information and Systems E99-D 8 2056-2060 2016/08/01
  •  On the Application of Wireless LAN Information to User Authentication Satoshi HIRAIWA, Masahiro MAMBO The IEICE Trans. on Information and Systems J99-D 10 1034-1044 2016/10
  •  Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, Eiji Okamoto Trusted Systems, INTRUST 2015 2016/03/16
  •  An Ordered Multisignature Scheme under the CDH Assumption Without Random Oracles Naoto Yanai, Masahiro Mambo, Eiji Okamoto Information Security, ISC 2013 2015/12/31
  •  Certificateless aggregate signature with efficient verification Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang, Gwoboa Horng Security and Communication Networks 8 13 2232-2243 2015/09
  •  On the Traceability of the Accountable Anonymous Channel Tomoaki Kosugi, Tomoki Hayafuji, Masahiro Mambo Proc. 2015 10th Asia Joint Conference on Information Security, AsiaJCIS 2015 6-11 2015/05/25
  •  A CDH-based Ordered Multisignature Scheme in the Standard Model with Better Efficiency Naoto Yanai, Masahiro Mambo, Eiji Okamoto Proc. ISITA 2014 236-240 2014/10/26
  •  A CDH-based Ordered Multisignature Scheme Provably Secure without Random Oracles Naoto Yanai, Eikoh Chida, Masahiro Mambo, Eiji Okamoto Journal of Information Processing 55 2 366-375 2014/04/15
  •  Certificate-based proxy decryption systems with revocability in the standard model Lihua Wang, Jun Shao, Zhenfu Cao, Masahiro Mambo, Akihiro Yamamura, Licheng Wang Information Sciences 247 188-201 2013/10/20
  •  Preventing Abuse of Cookies Stolen by XSS Hiroya Takahashi, Kenji Yasunaga, Masahiro Mambo, Kwangjo Kim, Heung Youl Youm Proc. of the 2013 Eight Asia Joint Conference on Information Security, AsiaJCIS 2013 2013/07/25
  •  Toward Constructing a Secure Online Examination System Abdul Wahid, Yasushi Sengoku, Masahiro Mambo Proc. of the 9th International Conference on Ubiquitous Information Management and Communication, ACM IMCOM 2015 Article No.95 2015/01/09
  •  Experiments on the Diversion Resistance of Secret Information in Authentication Using Image: With Main Focus on Random Art Shunsuke SAKAI, Masahiro MAMBO The IEICE Trans. on Information and Systems J97-D 5 944-952 2014/05
  •  A Secure Structured Multisignature Scheme Based on a Non-Commutative Ring Homomorphism Naoto YANAI, Eikoh CHIDA, Masahiro MAMBO IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT E94-A 6 1346-1355 2011/06
  •  A Hidden Vector Encryption Scheme Hiding Wild Cards of a Search Query Hiroki Akiyama, Masahiro Mambo, Eiji Okamoto IPSJ Journal 52 9 2662-2673 2011/09
  •  Certificateless Ordered Sequential Aggregate Signature Scheme Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto Proceedings of Third International Conference on Intelligent Networking and Collaborative Systems, INCoS 662-667 2011/12
  •  Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities Lihua Wang, Lichen Wang, Masahiro Mambo, Eiji Okamoto IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUT E95-A 1 70-88 2012/01
  •  A Certificateless Ordered Sequential Aggregate Signature Scheme Secure against Super Adversaries Naoto Yanai, Raylin Tso, Masahiro Mambo, Eiji Okamoto Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA) 3 1/2 30-54 2012/03
  •  A Combined Machine Learning Method for the Detection of Attacks Hirotaka Kokubo, Akira Kanaoka, Masahiro Mambo, Eiji Okamoto IPSJ Journal 53 9 2086-2093 2012/09

Conference Presentations

  • Evaluation of Personal Match Rate in Web Browsing History Data(conference:The 2022 Symposium on Cryptography and Information Security)(2022/01)
  • Designing Countermeasures of the Simple Black-box Attack(conference:The 2022 Symposium on Cryptography and Information Security)(2022/01)
  • Privacy-preserving Federated Active Learning(conference:Science of Cyber Security -SciSec 2022 Workshops, AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022)(2022/08/10)
  • Zero-touch Provisioned Device Lifecycle and Its Security in IoT(conference:Science of Cyber Security -SciSec 2022 Workshops, AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022)(2022/08/10)
  • DeepFake Image Detections Based on Corneal Specular Highlight(conference:The 2022 Symposium on Cryptography and Information Security)(2022/01)

show all

  • An Access Control System for Verifiable Credentials with Selective Disclosure(conference:The 2022 Symposium on Cryptography and Information Security)(2022/01)
  • User estimation considering time-series characteristics of web browsing history (conference:The 2021 Symposium on Cryptography and Information Security)(2021/01)
  • Improvement of the Backup Method Dealing with 2 Types of Damages(2020/03/02)
  • White-Box Symmetric Cipher Using Quantum Memory(conference:2020 Symposium on Cryptography and Information Security)(2020/01/29)
  • Application of PEKS to NDN for Name Privacy(conference:2020 Symposium on Cryptography and Information Security)(2020/01/31)
  • A Framework for Monitoring Web-based Attacks Targeting Smartphone: Design and Implementation(conference:2020 Symposium on Cryptography and Information Security)(2020/01/29)
  • Consideration of Set-Partition Based Pseudonymisation Method(conference:Computer Security Symposium 2019)(2019/10/23)
  • Some Security Techniques for Society 5.0(conference:CISC2018)(2018/05/24)
  • Hiding Personal Tendency in Set-valued Database Publication(conference:2019 Symposium on Cryptography and Information Security)(2019/01/22)
  • BPT: How to Establish Trusted Vehicular Fog Computing Service on Rural Areas(conference:2019 Symposium on Cryptography and Information Security)(2019/01/23)
  • Detecting Adversarial Examples by Assistant Neural Networks(conference:2019 Symposium on Cryptography and Information Security)(2019/01/25)
  • Privacy Risk Evaluation for Pseudonym Update on Web-browsing History(conference:2019 Symposium on Cryptography and Information Security)(2019/01/24)
  • Similarity evaluation for the analysis of web browsing activity(conference:2019 Symposium on Cryptography and Information Security)(2019/01/24)
  • Considerations of Efficient Modulo Algorithms for IoT Devices(conference:2019 Symposium on Cryptography and Information Security)(2019/01/22)
  • Introduction: Security-related Topics for Society 5.0 (conference:IEICE General Conference)(2018/03/21)
  • Proposal of Similarity Index of Multivariate Datasets(conference:2018 Symposium on Cryptography and Information Security)(2018/01/28)
  • Implementation and Evaluation of Ring-LWE Cryptography on ARM Cortex-M0+ Microcontroller(conference:2018 Symposium on Cryptography and Information Security)(2018/01/26)
  • Re-identification of Web browsing history using time series property(conference:2018 Symposium on Cryptography and Information Security)(2018/01/24)
  • How to Utilize Wireless LAN Information for Behavior Authentication(conference:Computer Security Symposium 2017)(2017/10/24)
  • Application of Edge Computing for Trust Establishment(conference:IWSEC 2017)(2017/08/03)
  • Verifying the Validity of Public Key Certificates Using Edge Computing(conference:Computer Security Symposium 2017)(2017/10/23)
  • An Approach to Protecting Sensitive Items with Maintaining Data Size(conference:2017 Symposium on Cryptography and Information Security)(2017/01/27)
  • On the Security of Deterministic Encryption Schemes for Quantum Adversaries(conference:2017 Symposium on Cryptography and Information Security)(2017/01/27)
  • On the Impossibility Results of Permissionless Consensus Protocols(conference:2017 Symposium on Cryptography and Information Security)(2017/01/26)
  • Comparative evaluation of security indices used in data anonymization(conference:2017 Symposium on Cryptography and Information Security)(2017/01/26)
  • Implementation and Evaluation of the Knuth-Yao Algorithm for ARM-Cortex-M0+(conference:2017 Symposium on Cryptography and Information Security)(2017/01/25)
  • Application of the Method for Similarity Search of Time-Series Data to User Authentication(2016/11/07)
  • User authentication using similarity search of the time-series data(conference:Computer Security Symposium 2016)(2016/10/13)
  • Rational Proofs against Cheating Verifiers and Their Application to Delegated Computation(conference:2016 Symposium on Cryptography and Information Security)(2016/01)
  • On the Incentive to Generate Randomness in Repeated Games(conference:2016 Symposium on Cryptography and Information Security)(2016/01)
  • A Study on the Security Evaluation Methods of Proxy Re-Encryption Applied to Cloud Enviornments(conference:2016 Symposium on Cryptography and Information Security)(2016/01)
  • Implementation of μNaCl on 32-bit ARM Cortex-M0,(conference:2016 Symposium on Cryptography and Information Security)(2016/01)
  • A Construction of Signdecryption Schemes from Obfuscation(conference:2016 Symposium on Cryptography and Information Security)(2016/01)
  • Efficient CDH-based Ordered Multisignature Schemes without Random Oracles(conference:Symposium on Information Theory and its Applications 2013)(2013/12)
  • A Note on BGP-Aiding Aggregate Signatures(2013/10/22)
  • Application of Fully Homomorphic Encryption for Resource-Saving Devices(conference:2013 Symposium on Cryptography and Information Security)(2013/01)
  • A Study on Construction of Multisignatures and Aggregate Signatures(conference:2013 Symposium on Cryptography and Information Security)(2013/01)
  • Experiments on the Diversion Resistance in Image Authentication(conference:2013 Symposium on Cryptography and Information Security)(2013/01)
  • Study on the eCK security of a key exchange scheme based on mOT(conference:2013 Symposium on Cryptography and Information Security)(2013/01)
  • Ordered Multisignatures Made shorter(conference:Symposium on Information Theory and its Applications 2014)(2014/12/09)
  • How to Utilize Location Information for Distinguishing Users(2014/11/22)
  • Revisiting the Video Authentication Method(conference:2014 Symposium on Cryptography and Information Security)(2014/01)
  • On the Online Multistage Secret Sharing Schemes(conference:2014 Symposium on Cryptography and Information Security)(2014/01)
  • A Certificateless Identity-Based Authenticated key Exchange Scheme(conference:2014 Symposium on Cryptography and Information Security)(2014/01)
  • A Study on Computational Fuzzy Extractors(conference:2014 Symposium on Cryptography and Information Security)(2014/01)
  • A Study on the Accountable Anonymous Channel(conference:2014 Symposium on Cryptography and Information Security)(2014/01)
  • Application of Location Information to the Authentication Systems(conference:2014 Symposium on Cryptography and Information Security)(2014/01)
  • Implementation of μNaCl on 32-bit ARM Cortex-M3(2015/10/21)
  • Application of the Wireless LAN Information to User Authentication(2015/10/21)
  • A Further Approach toward Pattern Lock Resistant against Shoulder Surfing(2015/06/30)
  • An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme(2015/03/02)
  • On the Study of Computational Entropic Security(conference:2015 Symposium on Cryptography and Information Security)(2015/01)
  • An analysis on PRNGs with entropy pools(conference:2015 Symposium on Cryptography and Information Security)(2015/01)
  • Implementation of the method to prohibit abuse of stolen cookies(conference:2015 Symposium on Cryptography and Information Security)(2015/01)
  • Rational Proofs against Reward-Reducing Verifiers,(conference:2015 Symposium on Cryptography and Information Security)(2015/01)
  • On the Construction of Pattern Lock Strong against Shoulder Surfing(conference:2015 Symposium on Cryptography and Information Security)(2015/01)
  • Effects of the partial password sharing for usability improvements,(conference:2015 Symposium on Cryptography and Information Security)(2015/01)
  • Separation of Activation Code Delivery on V2X Pseudonym Certificate Revocation(conference:Science of Cyber Security -SciSec 2022 Workshops, AI-CryptoSec, TA-BC-NFT, and MathSci-Qsafe 2022)(2022/08/10)
  • IOTA Sharding Mechanism(conference:9th International Conference on Big Data Analytics, ICBDA 2024)(2024/03/18)
  • On the Security of Federated Learning with Dataset Distillation(conference:IPSJ SIG Technical Report)(2024/03/11)
  • Privacy-Preserving Adaptive Federated Clustering(conference:The 2024 Symposium on Cryptography and Information Security)(2024/01/24)
  • On the Differentially Private Federated Clustering over Non-IID Data(conference:Computer Security Symposium 2023)(2023/10/31)
  • On Proof of Ownership in Digital Wallets(conference:Computer Security Symposium 2023)(2023/10/31)
  • Proposal of a Malware Classification Method Using FastText and Out-of-Distribution Detection (conference:DICOMO 2023 (Multimedia, Distributed, Cooperative, and Mobile Symposium 2023))(2023/07/05)
  • Application of the Access Control Using Decentralized Identities to Blockchain-Based Selection Mechanism(conference:IPSJ SIG Technical Report)(2023/03/07)
  • On the Relationship between Byzantine Robustness and Subsampling in Federated Learning(conference:IPSJ SIG Technical Report)(2023/03/06)
  • Providing Accountability for Secure Zero Touch Provisioning(conference:The 2023 Symposium on Cryptography and Information Security)(2023/01/25)
  • Fine-grained Secure Computing for Hierarchical Organization(conference:The 2023 Symposium on Cryptography and Information Security)(2023/01/26)
  • Hierarchical Identity-Based Encryption with Simulation-Based Receiver Selective Opening Security(conference:The 2023 Symposium on Cryptography and Information Security)(2023/01/26)
  • On the Identity Match Rate in Web Browsing History Data(conference:9th International Workshop on Information and Communication Security, WICS 2022)(2022/11/27)

Others

Arts and Fieldwork

Patent

Theme to the desired joint research

Grant-in-Aid for Scientific Research

Competitive research funding,Contribution

Collaborative research,Consignment study

Classes (Bachelors)

Classes (Graduate Schools)

International Project

International Students

Lecture themes

Others (Social Activities)

To Page Top