The following pages link to Fuyuki Kitagawa (Q831624):
Displayed 29 items.
- Secret sharing with statistical privacy and computational relaxed non-malleability (Q831625) (← links)
- Formal treatment of verifiable privacy-preserving data-aggregation protocols (Q1616691) (← links)
- A framework for achieving KDM-CCA secure public-key encryption (Q1710594) (← links)
- Key dependent message security and receiver selective opening security for identity-based encryption (Q1749272) (← links)
- NIZK from SNARG (Q2055737) (← links)
- Watermarking PRFs against quantum adversaries (Q2170100) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Simple and efficient KDM-CCA secure public key encryption (Q2178850) (← links)
- Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem (Q2178851) (← links)
- Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously (Q2304931) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- Non-committing encryption with constant ciphertext expansion from standard assumptions (Q2692376) (← links)
- Secure software leasing from standard assumptions (Q2695623) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions (Q2798773) (← links)
- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks (Q2942828) (← links)
- Obfustopia built on secret-key functional encryption (Q5915680) (← links)
- Simple and generic constructions of succinct functional encryption (Q5916067) (← links)
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions (Q5916284) (← links)
- Simple and generic constructions of succinct functional encryption (Q5918349) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5919495) (← links)
- Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions (Q5919680) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- NIZK from SNARGs (Q6110372) (← links)
- KDM security for the Fujisaki-Okamoto transformations in the QROM (Q6113959) (← links)
- Bounded functional encryption for Turing machines: adaptive security from general assumptions (Q6114255) (← links)
- Functional encryption with secure key leasing (Q6134000) (← links)
- Public key encryption with secure key leasing (Q6138102) (← links)