Shota Yamada

From MaRDI portal
Person:1650426

Available identifiers

zbMath Open yamada.shotaMaRDI QIDQ1650426

List of research outcomes

PublicationDate of PublicationType
Constant input attribute based (and predicate) encryption from evasive and tensor LWE2024-02-06Paper
Public key encryption with secure key leasing2024-01-16Paper
Broadcast, trace and revoke with optimal parameters from polynomial hardness2023-12-12Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions2023-08-14Paper
Multi-input attribute based encryption and predicate encryption2023-06-12Paper
Direct computation of branching programs and its applications to more efficient lattice-based cryptography2023-04-21Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 20132022-09-22Paper
Functional encryption for Turing machines with dynamic bounded collusion from LWE2022-05-18Paper
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions2022-04-22Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Optimal broadcast encryption from pairings and LWE2021-12-01Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
CP-ABE for circuits (and More) in the symmetric key setting2021-12-01Paper
Optimal broadcast encryption from LWE and pairings in the standard model2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings2021-11-24Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model2021-04-07Paper
Attribute based encryption for deterministic finite automata from DLIN2020-04-30Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Attribute-based encryption (and more) for nondeterministic finite automata from LWE2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Group signatures without NIZK: from lattices in the standard model2020-02-04Paper
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model2019-01-23Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques2017-10-27Paper
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps2017-01-06Paper
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security2016-12-19Paper
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli2016-10-27Paper
Attribute-Based Encryption for Range Attributes2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff2016-10-04Paper
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters2016-07-15Paper
A Framework for Identity-Based Encryption with Almost Tight Security2016-06-10Paper
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs2016-06-10Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings2016-03-02Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications2014-08-07Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Space Efficient Signature Schemes from the RSA Assumption2012-07-20Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More2012-06-08Paper
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption2011-03-15Paper
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption2010-10-12Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Shota Yamada