Shota Yamada

From MaRDI portal
Revision as of 18:33, 24 September 2023 by Import230924090903 (talk | contribs) (Created automatically from import230924090903)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Person:1650426

Available identifiers

zbMath Open yamada.shotaMaRDI QIDQ1650426

List of research outcomes





PublicationDate of PublicationType
Attribute based encryption for Turing machines from lattices2024-12-13Paper
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Compact NIZKs from standard assumptions on bilinear maps2024-07-10Paper
Constant input attribute based (and predicate) encryption from evasive and tensor LWE2024-02-06Paper
Public key encryption with secure key leasing2024-01-16Paper
Broadcast, trace and revoke with optimal parameters from polynomial hardness2023-12-12Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions2023-08-14Paper
Multi-input attribute based encryption and predicate encryption2023-06-12Paper
Direct computation of branching programs and its applications to more efficient lattice-based cryptography2023-04-21Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition2022-12-22Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 20132022-09-22Paper
Functional encryption for Turing machines with dynamic bounded collusion from LWE2022-05-18Paper
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions2022-04-22Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Optimal broadcast encryption from pairings and LWE2021-12-01Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
CP-ABE for circuits (and More) in the symmetric key setting2021-12-01Paper
Optimal broadcast encryption from LWE and pairings in the standard model2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings2021-11-24Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model2021-04-07Paper
Attribute based encryption for deterministic finite automata from DLIN2020-04-30Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Attribute-based encryption (and more) for nondeterministic finite automata from LWE2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Group signatures without NIZK: from lattices in the standard model2020-02-04Paper
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model2019-01-23Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques2017-10-27Paper
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps2017-01-06Paper
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security2016-12-19Paper
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli2016-10-27Paper
Attribute-Based Encryption for Range Attributes2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters2016-07-15Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2016-06-10Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings2016-03-02Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications2014-08-07Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Space Efficient Signature Schemes from the RSA Assumption2012-07-20Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More2012-06-08Paper
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption2011-03-15Paper
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption2010-10-12Paper

Research outcomes over time

This page was built for person: Shota Yamada