Junji Shikata

From MaRDI portal
(Redirected from Person:1616666)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient identity-based inner product functional encryption from RLWE2026-03-23Paper
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing
Designs, Codes and Cryptography
2024-12-11Paper
Anonymous broadcast authentication with logarithmic-order ciphertexts from LWE2024-06-05Paper
A Tightly Secure Identity-Based Signature Scheme from Isogenies2024-04-26Paper
Authenticated encryption for very short inputs
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Group testing aggregate signatures with soundness
Lecture Notes in Computer Science
2023-08-21Paper
Identity-based interactive aggregate signatures from lattices
Lecture Notes in Computer Science
2023-08-21Paper
Non-adaptive Group-Testing Aggregate MAC Scheme
Information Security Practice and Experience
2023-06-30Paper
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
Designs, Codes and Cryptography
2023-06-20Paper
Asymptotically tight lower bounds in anonymous broadcast encryption and authentication2022-06-29Paper
Quantum-secure (non-)sequential aggregate message authentication codes2020-05-06Paper
SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model2020-05-06Paper
History-free sequential aggregate MAC revisited2020-01-10Paper
Identity-based encryption with hierarchical key-insulation in the standard model
Designs, Codes and Cryptography
2019-05-17Paper
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
International Journal of Applied Cryptography
2018-11-26Paper
Generic construction of sequential aggregate MACs from any MACs2018-11-07Paper
Signcryption with quantum random oracles2018-11-07Paper
Lower bounds on lattice enumeration with extreme pruning2018-09-26Paper
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography
IEEE Transactions on Information Theory
2018-06-27Paper
Lattice-based signcryption without random oracles2018-06-22Paper
Timed-release computational secret sharing and threshold encryption
Designs, Codes and Cryptography
2018-01-26Paper
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
Lecture Notes in Computer Science
2017-01-06Paper
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage
Provable Security
2016-01-27Paper
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
Cryptography and Coding
2016-01-12Paper
Constructions of CCA-Secure Revocable Identity-Based Encryption
Information Security and Privacy
2015-10-20Paper
Information-theoretically secure entity authentication in the multi-user setting
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies
Lecture Notes in Computer Science
2015-09-30Paper
Timed-release computational secret sharing scheme and its applications
Provable Security
2015-09-29Paper
Timed-release secret sharing schemes with information theoretic security
Cryptography and Information Security in the Balkans
2015-09-21Paper
Constructions of signcryption in the multi-user setting from identity-based encryption
Cryptography and Coding
2014-01-17Paper
Information-theoretic timed-release security: key-agreement, encryption, and authentication codes
Lecture Notes in Computer Science
2012-11-06Paper
Constructing secure hybrid encryption from key encapsulation mechanism with authenticity
Cryptography and Coding
2011-12-16Paper
Bit commitment in the bounded storage model: tight bound and simple optimal construction
Cryptography and Coding
2011-12-16Paper
Information-theoretically secure key-insulated multireceiver authentication codes
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Systematic treatment of collusion secure codes: security definitions and their relations
Lecture Notes in Computer Science
2010-02-09Paper
The role of arbiters in asymmetric authentication schemes
Lecture Notes in Computer Science
2010-02-09Paper
Unconditionally secure blind signatures
Lecture Notes in Computer Science
2009-12-03Paper
Construction methodology of unconditionally secure signature schemes
Lecture Notes in Computer Science
2009-12-03Paper
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment
Formal to Practical Security
2009-06-09Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM
Information Security and Privacy
2009-03-06Paper
Unconditionally Secure Steganography Against Active Attacks
IEEE Transactions on Information Theory
2009-02-24Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application
Lecture Notes in Computer Science
2008-03-18Paper
scientific article; zbMATH DE number 2086723 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2085422 (Why is no real title available?)2004-08-09Paper
scientific article; zbMATH DE number 1980951 (Why is no real title available?)2003-09-15Paper
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks
Public Key Cryptography — PKC 2003
2003-07-27Paper
Unconditionally Secure Anonymous Encryption and Group Authentication
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941244 (Why is no real title available?)2003-06-29Paper
scientific article; zbMATH DE number 1583775 (Why is no real title available?)2002-03-06Paper
scientific article; zbMATH DE number 1504542 (Why is no real title available?)2002-01-27Paper
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography
Advances in Cryptology — EUROCRYPT ’99
2000-06-07Paper


Research outcomes over time


This page was built for person: Junji Shikata