Junji Shikata

From MaRDI portal
Person:1616666

Available identifiers

zbMath Open shikata.junjiMaRDI QIDQ1616666

List of research outcomes





PublicationDate of PublicationType
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing2024-12-11Paper
Anonymous broadcast authentication with logarithmic-order ciphertexts from LWE2024-06-05Paper
A Tightly Secure Identity-Based Signature Scheme from Isogenies2024-04-26Paper
Authenticated encryption for very short inputs2023-10-04Paper
Group testing aggregate signatures with soundness2023-08-21Paper
Identity-based interactive aggregate signatures from lattices2023-08-21Paper
Non-adaptive Group-Testing Aggregate MAC Scheme2023-06-30Paper
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication2023-06-20Paper
Asymptotically tight lower bounds in anonymous broadcast encryption and authentication2022-06-29Paper
Quantum-secure (non-)sequential aggregate message authentication codes2020-05-06Paper
SO-CCA secure PKE in the quantum random oracle model or the quantum ideal cipher model2020-05-06Paper
History-free sequential aggregate MAC revisited2020-01-10Paper
Identity-based encryption with hierarchical key-insulation in the standard model2019-05-17Paper
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance2018-11-26Paper
Generic construction of sequential aggregate MACs from any MACs2018-11-07Paper
Signcryption with quantum random oracles2018-11-07Paper
Lower bounds on lattice enumeration with extreme pruning2018-09-26Paper
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography2018-06-27Paper
Lattice-based signcryption without random oracles2018-06-22Paper
Timed-release computational secret sharing and threshold encryption2018-01-26Paper
Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness2017-01-06Paper
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles2016-04-13Paper
Constructions of unconditionally secure broadcast encryption from key predistribution systems with trade-offs between communication and storage2016-01-27Paper
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer2016-01-12Paper
Constructions of CCA-Secure Revocable Identity-Based Encryption2015-10-20Paper
Information-theoretically secure entity authentication in the multi-user setting2015-10-16Paper
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies2015-09-30Paper
Timed-release computational secret sharing scheme and its applications2015-09-29Paper
Timed-release secret sharing schemes with information theoretic security2015-09-21Paper
Constructions of signcryption in the multi-user setting from identity-based encryption2014-01-17Paper
Information-theoretic timed-release security: key-agreement, encryption, and authentication codes2012-11-06Paper
Constructing secure hybrid encryption from key encapsulation mechanism with authenticity2011-12-16Paper
Bit commitment in the bounded storage model: tight bound and simple optimal construction2011-12-16Paper
Information-theoretically secure key-insulated multireceiver authentication codes2010-05-04Paper
Systematic treatment of collusion secure codes: security definitions and their relations2010-02-09Paper
The role of arbiters in asymmetric authentication schemes2010-02-09Paper
Unconditionally secure blind signatures2009-12-03Paper
Construction methodology of unconditionally secure signature schemes2009-12-03Paper
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment2009-06-09Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM2009-03-06Paper
Unconditionally Secure Steganography Against Active Attacks2009-02-24Paper
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application2008-03-18Paper
https://portal.mardi4nfdi.de/entity/Q47372622004-08-11Paper
https://portal.mardi4nfdi.de/entity/Q30439272004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q44283312003-09-15Paper
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks2003-07-27Paper
Unconditionally Secure Anonymous Encryption and Group Authentication2003-07-16Paper
https://portal.mardi4nfdi.de/entity/Q44084442003-06-29Paper
https://portal.mardi4nfdi.de/entity/Q27074092002-03-06Paper
https://portal.mardi4nfdi.de/entity/Q45024902002-01-27Paper
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography2000-06-07Paper

Research outcomes over time

This page was built for person: Junji Shikata