Masayuki Abe

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Hybrid zero-knowledge from garbled circuits and circuit-based composition of \(\Sigma \)-protocols
 
2025-01-10Paper
CDS composition of multi-round protocols
 
2024-12-13Paper
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme
 
2024-11-12Paper
Mechanism of common-mode noise and heat generation in an Electric circuit with grounding using multiconductor transmission-line theory
Chinese Journal of Physics (Taipei)
2024-03-04Paper
Quantum-access security of hash-based signature schemes
 
2024-01-11Paper
Compact structure-preserving signatures with almost tight security
Journal of Cryptology
2023-08-22Paper
Acyclicity programming for sigma-protocols
 
2023-03-31Paper
Non-interactive composition of sigma-protocols via Share-then-Hash
 
2023-03-29Paper
On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness
Lecture Notes in Computer Science
2022-10-13Paper
Blind key-generation attribute-based encryption for general predicates
Designs, Codes and Cryptography
2022-09-22Paper
On black-box extension of a non-interactive zero-knowledge proof system for secret equality
 
2022-07-06Paper
On subset-resilient hash function families
Designs, Codes and Cryptography
2022-03-21Paper
Shorter QA-NIZK and SPS with tighter security
 
2020-05-11Paper
A coin-free oracle-based augmented black box framework
 
2020-01-10Paper
Efficient fully structure-preserving signatures and shrinking commitments
Journal of Cryptology
2019-08-13Paper
On the impossibility of structure-preserving deterministic primitives
Journal of Cryptology
2019-01-29Paper
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
 
2018-12-20Paper
Efficient functional encryption for inner-product values with full-hiding security
 
2018-10-18Paper
Lower bounds on structure-preserving signatures for bilateral messages
 
2018-10-17Paper
Compact structure-preserving signatures with almost tight security
 
2017-11-15Paper
Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Journal of Cryptology
2016-10-13Paper
Structure-preserving signatures and commitments to group elements
Journal of Cryptology
2016-06-01Paper
Fully structure-preserving signatures and shrinking commitments
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Packing messages and optimizing bootstrapping in GSW-FHE
Lecture Notes in Computer Science
2015-08-27Paper
On the definition of anonymity for ring signatures
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Structure-preserving signatures from type II pairings
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Converting cryptographic schemes from symmetric to asymmetric bilinear groups
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Theory of Cryptography
2014-02-18Paper
On the impossibility of structure-preserving deterministic primitives
Theory of Cryptography
2014-02-18Paper
Tagged one-time signatures: tight security and optimal tag size
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A framework for universally composable non-committing blind signatures
International Journal of Applied Cryptography
2012-11-16Paper
Tools over bilinear groups for modular design of cryptographic tasks. (Abstract)
Provable Security
2012-11-06Paper
Group to group commitments do not shrink
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
Lecture Notes in Computer Science
2011-12-02Paper
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
A signature scheme with efficient proof of validity
Lecture Notes in Computer Science
2011-06-08Paper
Structure-preserving signatures and commitments to group elements
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
2010-03-02Paper
A Framework for Universally Composable Non-committing Blind Signatures
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Compact CCA-Secure Encryption for Messages of Arbitrary Length
Public Key Cryptography – PKC 2009
2009-03-24Paper
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
Lecture Notes in Computer Science
2008-05-06Paper
Tag-KEM/DEM: A new framework for hybrid encryption
Journal of Cryptology
2008-04-16Paper
Tag-KEM from Set Partial Domain One-Way Permutations
Information Security and Privacy
2007-09-07Paper
Perfect NIZK with Adaptive Soundness
Theory of Cryptography
2007-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Combining Encryption and Proof of Knowledge in the Random Oracle Model
The Computer Journal
2004-11-19Paper
scientific article; zbMATH DE number 2085425 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2081088 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2079934 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 2044525 (Why is no real title available?)
 
2004-02-18Paper
scientific article; zbMATH DE number 2043308 (Why is no real title available?)
 
2004-02-16Paper
A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication
The Computer Journal
2003-08-07Paper
1-out-of-n Signatures from a Variety of Keys
Lecture Notes in Computer Science
2003-07-16Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941238 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1759330 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1759784 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1424190 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1722675 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583778 (Why is no real title available?)
 
2001-12-18Paper
scientific article; zbMATH DE number 1618058 (Why is no real title available?)
 
2001-07-12Paper
scientific article; zbMATH DE number 1612509 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1504563 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1504554 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1418292 (Why is no real title available?)
 
2000-07-26Paper
scientific article; zbMATH DE number 1303140 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1024495 (Why is no real title available?)
 
1997-07-20Paper


Research outcomes over time


This page was built for person: Masayuki Abe