Keisuke Tanaka

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Universally composable relaxed asymmetric password-authenticated key exchange
 
2025-01-10Paper
1-out-of-\(n\) oblivious signatures: security revisited and a generic construction with an efficient communication cost
 
2024-05-31Paper
Auditable attribute-based credentials scheme and its application in contact tracing
 
2024-05-31Paper
Analysis of (U,U+V)-code problem with Gramian over binary and ternary fields
Lecture Notes in Computer Science
2023-08-21Paper
Pointcheval-Sanders signature-based synchronized aggregate signature
Lecture Notes in Computer Science
2023-08-21Paper
Turn-based communication channels
 
2023-04-13Paper
Watermarkable signature with computational function preserving
 
2023-03-21Paper
Receiver selective opening CCA secure public key encryption from various assumptions
 
2023-03-21Paper
Non-committing encryption with constant ciphertext expansion from standard assumptions
 
2023-03-21Paper
Approximation and special cases of common subtrees and editing distance
 
2023-01-25Paper
Forward secure message franking
 
2022-12-07Paper
Efficient two-party exponentiation from quotient transfer
 
2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption
 
2022-08-25Paper
Payment trees: low collateral payments for payment channel networks
 
2022-06-22Paper
Obfustopia built on secret-key functional encryption
Journal of Cryptology
2022-06-08Paper
CCA security and trapdoor functions via key-dependent-message security
Journal of Cryptology
2022-04-04Paper
Security definitions on time-lock puzzles
 
2022-03-24Paper
Secret sharing with statistical privacy and computational relaxed non-malleability
 
2022-03-24Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication
Designs, Codes and Cryptography
2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties
 
2021-12-21Paper
Tightly secure ring signatures in the standard model
Theoretical Computer Science
2021-10-21Paper
Fine-grained cryptography revisited
Journal of Cryptology
2021-07-30Paper
Simple and generic constructions of succinct functional encryption
Journal of Cryptology
2021-07-30Paper
Improved security proof for the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme
 
2021-06-08Paper
A t-out-of-n Redactable Signature Scheme
Cryptology and Network Security
2020-07-20Paper
Fine-grained cryptography revisited
Lecture Notes in Computer Science
2020-05-11Paper
Simple and efficient KDM-CCA secure public key encryption
 
2020-05-11Paper
Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem
 
2020-05-11Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously
 
2020-03-09Paper
CCA security and trapdoor functions via key-dependent-message security
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Anonymous single-round server-aided verification
 
2020-03-02Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Theoretical Computer Science
2019-10-18Paper
A framework for achieving KDM-CCA secure public-key encryption
 
2019-01-23Paper
Group signature with deniability: how to disavow a signature
 
2018-10-26Paper
Lower bounds for key length of \(k\)-wise almost independent permutations and certain symmetric-key encryption schemes
 
2018-10-24Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Lecture Notes in Computer Science
2018-10-17Paper
Fully anonymous group signature with verifier-local revocation
 
2018-10-17Paper
CCA2 key-privacy for code-based encryption in the standard model
 
2018-09-12Paper
Memory lower bounds of reductions revisited
 
2018-07-09Paper
Obfustopia built on secret-key functional encryption
Advances in Cryptology – EUROCRYPT 2018
2018-07-09Paper
Simple and generic constructions of succinct functional encryption
Public-Key Cryptography – PKC 2018
2018-05-29Paper
Key dependent message security and receiver selective opening security for identity-based encryption
 
2018-05-16Paper
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Signatures Resilient to Uninvertible Leakage
Lecture Notes in Computer Science
2016-10-21Paper
On the complexity of negation-limited Boolean networks (preliminary version)
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
On the key dependent message security of the Fujisaki-Okamoto constructions
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Completeness of single-bit projection-KDM security for public key encryption
Lecture Notes in Computer Science
2016-03-02Paper
Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
Information Security and Privacy
2015-10-20Paper
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
Provable Security
2015-09-29Paper
Efficient key dependent message security amplification against chosen ciphertext attacks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Game-theoretic security for bit commitment
Advances in Information and Computer Security
2014-09-15Paper
Attacks to the proxy re-encryption schemes from IWSEC2011
Advances in Information and Computer Security
2014-09-15Paper
Strongly simulation-extractable leakage-resilient NIZK
Information Security and Privacy
2014-07-24Paper
Factoring-based proxy re-encryption schemes
Provable Security
2013-10-23Paper
Grey-box public-key steganography
Lecture Notes in Computer Science
2013-05-28Paper
Symmetric-key encryption scheme with multi-ciphertext non-malleability
Advances in Information and Computer Security
2013-04-04Paper
Proxy re-encryption in a stronger security model extended from CT-RSA2012
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees
Theoretical Computer Science
2013-02-19Paper
Leakage-resilience of stateless/stateful public-key encryption from hash proofs
Information Security and Privacy
2012-09-07Paper
A Game-Theoretic Perspective on Oblivious Transfer
Information Security and Privacy
2012-09-07Paper
Weak oblivious transfer from strong one-way functions
Provable Security
2011-09-16Paper
Randomness leakage in the KEM/DEM framework
Provable Security
2011-09-16Paper
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Lecture Notes in Computer Science
2011-05-19Paper
A multi-trapdoor commitment scheme from the RSA assumption
Information Security and Privacy
2010-10-25Paper
CCA proxy re-encryption without bilinear maps in the standard model
Public Key Cryptography – PKC 2010
2010-05-28Paper
Security of Encryption Schemes in Weakened Random Oracle Models
Public Key Cryptography – PKC 2010
2010-05-28Paper
Efficient public key encryption based on ideal lattices (extended abstract)
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Efficient non-interactive universally composable string-commitment schemes
Provable Security
2009-12-11Paper
Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge
Provable Security
2009-12-11Paper
On the insecurity of the Fiat-Shamir signatures with iterative hash functions
Provable Security
2009-12-11Paper
Algorithms and Computation
Lecture Notes in Computer Science
2009-08-07Paper
Limiting negations in bounded-depth circuits: an extension of Markov's theorem
Information Processing Letters
2009-07-21Paper
Multi-recipient Public-Key Encryption from Simulators in Security Proofs
Information Security and Privacy
2009-06-25Paper
On the Weak Ideal Compression Functions
Information Security and Privacy
2009-06-25Paper
Security on Hybrid Encryption with the Tag-KEM/DEM Framework
Information Security and Privacy
2009-06-25Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Anonymity on Paillier’s Trap-Door Permutation
Information Security and Privacy
2009-03-06Paper
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Public-Key Cryptosystems with Primitive Power Roots of Unity
Information Security and Privacy
2008-07-08Paper
Universally Anonymizable Public-Key Encryption
Lecture Notes in Computer Science
2008-03-18Paper
Security of Digital Signature Schemes in Weakened Random Oracle Models
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
Information Security and Privacy
2007-09-07Paper
Multi-bit Cryptosystems Based on Lattice Problems
Public Key Cryptography – PKC 2007
2007-09-04Paper
Notch effect on fatigue strength reduction of bearing steel in the very high cycle regime
International Journal of Fatigue
2006-10-27Paper
Smart structure for suppression of mode I and II crack propagation in CFRP laminates by shape memory alloy TiNi actuator
International Journal of Fatigue
2006-10-10Paper
Mode II fatigue crack growth from delamination in unidirectional tape and satin-woven fabric laminates of high strength GFRP
International Journal of Fatigue
2006-10-10Paper
Fatigue damage evaluation in SiCp/2024 by X-ray diffraction method
International Journal of Fatigue
2006-10-10Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Quantum bit-commitment for small storage based on quantum one-way permutations
New Generation Computing
2004-09-22Paper
scientific article; zbMATH DE number 1759776 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1788728 (Why is no real title available?)
 
2002-08-26Paper
An exponential gap with the removal of one negation gate
Information Processing Letters
2002-07-14Paper
An extension of Grover's quantum search algorithm
RIMS Kokyuroku
2001-09-17Paper
scientific article; zbMATH DE number 1507247 (Why is no real title available?)
 
2001-02-04Paper
scientific article; zbMATH DE number 1511713 (Why is no real title available?)
 
2000-09-27Paper
scientific article; zbMATH DE number 1404249 (Why is no real title available?)
 
2000-02-20Paper
scientific article; zbMATH DE number 1395314 (Why is no real title available?)
 
2000-01-30Paper
scientific article; zbMATH DE number 1380771 (Why is no real title available?)
 
1999-12-20Paper
scientific article; zbMATH DE number 1379306 (Why is no real title available?)
 
1999-12-15Paper
scientific article; zbMATH DE number 1372647 (Why is no real title available?)
 
1999-12-01Paper
scientific article; zbMATH DE number 1322339 (Why is no real title available?)
 
1999-11-08Paper
Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine
Annals of Operations Research
1999-06-10Paper
scientific article; zbMATH DE number 1263235 (Why is no real title available?)
 
1999-03-16Paper
On the Complexity of Negation-Limited Boolean Networks
SIAM Journal on Computing
1998-09-20Paper
Minimizing The Range Of Lateness On A Single Machine Under Generalized Due Dates
INFOR: Information Systems and Operational Research
1998-09-07Paper
Negation-limited circuit complexity of symmetric functions
Information Processing Letters
1997-02-27Paper
A Dislocation Model for Fatigue Crack Initiation
Journal of Applied Mechanics
1981-01-01Paper


Research outcomes over time


This page was built for person: Keisuke Tanaka