Publications
In books:
K. Morozov, Code-Based Zero-Knowledge Protocols and Their Applications, an article in Tsuyoshi Takagi et al. (eds.), Mathematical Modelling for Next-Generation Cryptography, pp. 43-62, Mathematics for Industry, vol. 29, Springer, 2017. [Available upon request.]
Kirill Morozov, Code-Based Public-Key Encryption, an article in
Ryuei Nishi et al. (eds.), A Mathematical Approach to Research Problems of Science and Technology, Mathematics for Industry, vol. 5, pp. 47-55, Springer, 2014. [Available upon request.]
Journal papers
Kirill Morozov, Partha Sarathi Roy, Rainer Steinwandt, Rui Xu, On the security of the Courtois-Finiasz-Sendrier signature. Open Mathematics, vol. 16(1), pp. 161-167, De Gruyter, 2018. [Open access link]
Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi,
Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Computers & Security 69, pp. 65-83 (2017) (Journal version of [4].) [Available upon request.]
Hiroaki Anada, Junpei Kawamoto, Chenyutao Ke, Kirill Morozov, Kouichi Sakurai, Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions, The Journal of Supercomputing, vol. 73, no. 10, pp. 4275-4301 (2017) (Journal version of [6].) [Available upon request.]
Rui Xu, Kirill Morozov, Tsuyoshi Takagi, Secret Sharing with Cheaters Using Multi-Receiver Authentication. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. 100-A, no. 1, pp. 115-125, January, 2017. (Journal version of [9].) [Available upon request.]
Rong Hu, Kirill Morozov, Tsuyoshi Takagi, Zero-Knowledge Protocols for Code-Based Public-Key Encryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E98-A, no. 10, pp. 2139-2151, October, 2015. (Journal version of [12,13].) [Available upon request.]
Rui Xu, Kirill Morozov, Tsuyoshi Takagi, Cryptanalysis of Some Recent Cheater Identifiable Secret Sharing Schemes, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol. E98-A, no.8, pp. 1814-1819, August, 2015. [Available upon request.]
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai,
Efficient Constructions of Deterministic Encryption from Hybrid
Encryption and Code-Based PKE, accepted to International
Journal of Network Security, August 2012.
(Journal version of [16].) [ pdf ]
Adriana C. B. Pinto, Rafael Dowsley, Kirill Morozov and
Anderson C. A. Nascimento, Achieving Oblivious Transfer Capacity of
Generalized Erasure Channels in the Malicious Model, in IEEE Transactions on Information Theory, Vol. 57, No. 8, pp. 5566-5571, August 2011. [ pdf ]
- Ryo Nojima, Hideki Imai, Kazukuni Kobara and Kirill Morozov,
Semantic Security for the McEliece Cryptosystem without Random
Oracles, Designs, Codes and Cryptography, Vol. 49, No. 1-3,
pp. 289-305, December, 2008.
(Journal version of [20].) [ pdf ]
Peer-reviewed conference papers
-
Abiola Salau, Ram Dantu, Kirill Morozov, Kritagya Upadhyay and Syed Badruddoja, “Multi-tier Reputation for Data Cooperatives”, To appear in Proc. 3rd International Conference on Mathematical Research for Blockchain Economy (MARBLE 2022).
[ pdf ]
- Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, Security Analysis and Efficient Implementation of Code-Based Signature Schemes (short paper). To appear in Proc. 5th International Conference on Information Systems Security and Privacy (ICISSP), 2019 [Available upon request.]
- R. Vishnu Prasad, Ram Dantu, Aditya Paul, Paula Mears, Kirill Morozov, A Decentralized Marketplace Application on The Ethereum Blockchain. Proc. 4th IEEE International Conference on Collaboration and Internet Computing (CIC 2018), IEEE (2018) [Available upon request.]
- Partha Sarathi Roy, Sabyasachi Dutta, Kirill Morozov, Avishek Adhikari, Kazuhide Fukushima, Shinsaku Kiyomoto, Kouichi Sakurai, Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness. Proc. 14th International Conference on Information Security Practice and Experience (ISPEC 2018), pp. 578-594, Springer (2018) [Available upon request.]
Rui Xu, Kirill Morozov, Anirban Basu, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Security Analysis of a Verifiable Server-Aided Approximate Similarity Computation. Proc. IWSEC 2017, pp. 159-178, Springer (2017) [Available upon request.]
- Yusuke Yoshida, Kirill Morozov, Keisuke Tanaka, CCA2 Key-Privacy for Code-Based Encryption in the Standard Model, Proc. of PQCrypto 2017, pp. 35-50, Springer (2017) [Available upon request.]
- Kirill Morozov, Partha Sarathi Roy, Kouichi Sakurai,
On unconditionally binding code-based commitment schemes, Proc. of the 11th International Conference on Ubiquitous Information Management and Communication (IMCOM 2017), pp. 101:1-101:5, 2017. [Available upon request.]
- Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi,
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database, Proc. of 21st Australasian Conference on Information Security and Privacy (ACISP 2016), pp. 181-197, 2016. [Available upon request.]
- Avishek Adhikari, Kirill Morozov, Satoshi Obana, Partha Sarathi Roy, Kouichi Sakurai, Rui Xu,
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters. Proc. of 9th International Conference on Information Theoretic Security (ICITS 2016), pp. 3-23, 2016. [Available upon request.]
- Chenyuntao Ke, Hiroaki Anada, Junpei Kawamoto, Kirill Morozov, and Kouichi Sakurai, Cross-group Secret Sharing for Secure Cloud Storage Service, Proc. of International Conference on Ubiquitous Information Management and Communication (ACM IMCOM 2016), pp. 63:1-63:8, 2016. [Available upon request.]
- Yvo Desmedt and Kirill Morozov, Parity Check Based Redistribution of Secret Shares, Proceedings of IEEE International Symposium on Information Theory (ISIT 2015), pp. 959-963, IEEE, 2015. [Available upon request.]
- Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov and Kouichi Sakurai, An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency, To Appear in Proceedings of 4th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE 2014), Pune, India, October 18-22, 2014. [ pdf ]
- Rui Xu, Kirill Morozov, Tsuyoshi Takagi, Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication, Proceedings of 9th International Workshop on Security (IWSEC 2014), Lecture Notes in Computer Science, Vol. 8639,
pp. 72-87, 2014. [ pdf ]
- Rui Xu, Kirill Morozov, Tsuyoshi Takagi, On Cheater Identifiable Secret Sharing Schemes Secure Against Rushing Adversary, Proceedings of 8th International Workshop on Security (IWSEC 2013), Lecture Notes in Computer Science, Vol. 8331, pp. 258-271, 2013. [ pdf ]
- Rong Hu, Kirill Morozov, Tsuyoshi Takagi, On Zero-Knowledge Identification Based on q-ary Syndrome Decoding,
Proceedings of 8th Asia Joint Conference on Information Security (AsiaJCIS 2013), pp. 12-18, IEEE, 2013. [ pdf ]
- Rong Hu, Kirill Morozov, Tsuyoshi Takagi, Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited (short paper), Proceedings of 8th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2013), pp. 535-540, ACM, 2013. [ pdf ]
- Kirill Morozov, Tsuyoshi Takagi, Zero-Knowledge Protocols for the McEliece Encryption, Proceedings of 17th Australasian Conference on Information Security and Privacy (ACISP 2012), Lecture Notes in Computer Science, Vol. 7372, pp. 180-193, 2012. [ Available upon request. This result is superseded by the above short paper at ASIACCS 2013 [pdf] ]
- Ryuzou Nishi, Kirill Morozov, Yoshiaki Hori, Kouichi Sakurai, Improvement on Secrecy Capacity of Wireless LAN Using Matched Filter, in Proceedings of 1st International Workshop on Security & Optimization for Wireless Networks (SOWN 2011) - a satellite of 7th International Conference on Mobile Ad-hoc and Sensor Networks (MSN 2011), pp. 463-469, IEEE Computer Society, 2011. [Available upon request]
- Kirill Morozov, George Savvides, Efficient Computational
Oblivious Transfer Using Interactive Hashing (Short Paper), in Proceedings of 6th ACM Symposium on Information, Computer
and Communications Security (ASIACCS 2011), pp. 448-452, ACM, 2011. [ pdf ]
Yang Cui, Kirill Morozov, Kazukuni Kobara, Hideki Imai,
Efficient Constructions of Deterministic Encryption from Hybrid
Encryption and Code-Based PKE, in Proceedings
of 18th Symposium on Applied algebra, Algebraic algorithms, and
Error Correcting Codes (AAECC), Lecture Notes in Computer
Science, Vol. 5527, pp. 159-168, Springer-Verlag, 2009. [ pdf ]
Kazukuni Kobara, Kirill Morozov, Raphael Overbeck,
Coding-Based Oblivious Transfer, in Mathematical Methods in
Computer Science, Lecture Notes in Computer Science, Vol. 5393,
pp. 142-156, Springer-Verlag, 2008. [ pdf ]
Frederique Oggier, Kirill Morozov, A Practical Scheme for
String Commitment based on the Gaussian Channel, in Proceedings
of 2008 IEEE Information Theory Workshop (ITW 2008), pp.
328-332, IEEE, 2008. [ pdf ]
- Hideki Imai, Kirill Morozov, Anderson C.A. Nascimento, Efficient
Oblivious Transfer Protocols Achieving a Non-Zero Rate from Any
Non-Trivial Noisy Correlation, in Proceedings of International
Conference on Information Theoretic Security (ICITS) 2007,
Lecture Notes in Computer Science, Vol. 4883, pp. 183-194,
Springer-Verlag, 2007. [ pdf
]
- Ryo Nojima, Hideki Imai, Kazukuni Kobara and Kirill Morozov,
Semantic Security for the McEliece Cryptosystem without Random
Oracles, in Proceedings of International Workshop on
Coding and Cryptography (WCC) 2007, pp. 257-268, INRIA, 2007. [
pdf ]
- Hideki Imai, Kazukuni Kobara and Kirill Morozov, On the
Possibility of Key Agreement Using Variable Directional Antenna, in
Proceedings of 1st Joint Workshop on Information Security,
pp. 153-167, Seoul, Korea, 2006. [ pdf ]
Hideki Imai, Kirill Morozov, Anderson C.A. Nascimento, and A.
Winter, Efficient Protocols Achieving the Commitment Capacity of
Noisy Correlations, in Proceedings of 2006 International
Symposium on Information Theory (ISIT), pp. 1432-1436, IEEE,
2006. [ pdf ]
Hideki Imai, Kirill Morozov, and Anderson C.A. Nascimento, On
the Oblivious Transfer Capacity of the Erasure Channel, in
Proceedings of 2006 International Symposium on Information
Theory (ISIT), pp. 1428-1431, IEEE, 2006. [ pdf ]
Claude Crépeau, Kirill Morozov and Stefan Wolf, Efficient
Unconditional Oblivious Transfer from Almost any Noisy Channel, in
Proceedings of Fourth Conference on Security in Communication
Networks (SCN) 2004, Lecture Notes in Computer Science, Vol.
3352, pp. 47-59, Springer-Verlag, 2005. [pdf]
Ivan Damgård, Serge Fehr, Kirill Morozov, and Louis Salvail,
Unfair Noisy Channels and Oblivious Transfer, in Proceedings of
Theory of Cryptography Conference (TCC) 2004, Lecture Notes in
Computer Science, Vol. 2951, pp. 355-373, Springer-Verlag, 2004.
[pdf]
Full version of this paper: [pdf]. Also available as
BRICS report RS-03-36,
University of Aarhus, November 2003.
Valery Korjik and Kirill Morozov, Generalized Oblivious
Transfer Protocols Based on Noisy Channels, in Proceedings of
International Workshop Information Assurance in Computer Networks:
Methods, Models, and Architectures for Network Security (MMM-ACNS)
2001, Lecture Notes in Computer Science, Vol. 2052, pp.
219-229, Springer-Verlag, 2001. [ pdf ]
Valeri Korjik and Kirill Morozov, Non-asymptotic Bit
Commitment Protocol Based on Noisy Channels, in Proceedings of
20th Biennial Symposium on Communications, pp. 74-78, Queen's
University, Canada, 2000. [ pdf ]
Other Manuscripts
-
Partha Sarathi Roy, Avishek Adhikari, Rui Xu, Kirill Morozov, and Kouichi Sakurai, “An Efficient $t$-Cheater Identifiable Secret Sharing Scheme with Optimal Cheater Resiliency”, Cryptology ePrint Archive: Report 2014/628.
-
Paulo S. L. M. Barreto, Bernardo David, Rafael Dowsley, Kirill Morozov, Anderson C. A. Nascimento: A Framework for Efficient Adaptively Secure Composable Oblivious Transfer in the ROM. Cryptology ePrint Archive: Report 2017/993.
Thesis
Kirill Morozov, On Cryptographic Primitives Based on Noisy
Channels, BRICS Dissertation DS-05-1, University
of Aarhus, March 2005. [ps| pdf]
|