Shota Yamada

From MaRDI portal
Person:1650426



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Tighter adaptive IBEs and VRFs: revisiting Waters' artificial abort2025-07-25Paper
Attribute based encryption for Turing machines from lattices2024-12-13Paper
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Compact NIZKs from standard assumptions on bilinear maps
Journal of Cryptology
2024-07-10Paper
Constant input attribute based (and predicate) encryption from evasive and tensor LWE
Advances in Cryptology – CRYPTO 2023
2024-02-06Paper
Public key encryption with secure key leasing
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Broadcast, trace and revoke with optimal parameters from polynomial hardness
Advances in Cryptology – EUROCRYPT 2023
2023-12-12Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions
Theory of Cryptography
2023-08-14Paper
Multi-input attribute based encryption and predicate encryption
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Direct computation of branching programs and its applications to more efficient lattice-based cryptography
Designs, Codes and Cryptography
2023-04-21Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
1511.68043
2022-12-22Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
Designs, Codes and Cryptography
2022-09-22Paper
Functional encryption for Turing machines with dynamic bounded collusion from LWE2022-05-18Paper
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions2022-04-22Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
CP-ABE for circuits (and More) in the symmetric key setting2021-12-01Paper
Optimal broadcast encryption from pairings and LWE2021-12-01Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
Optimal broadcast encryption from LWE and pairings in the standard model2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings
Journal of Cryptology
2021-11-24Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model
Journal of Cryptology
2021-04-07Paper
Attribute based encryption for deterministic finite automata from DLIN2020-04-30Paper
Generic hardness of inversion on ring and its relation to self-bilinear map
Theoretical Computer Science
2020-04-21Paper
Attribute-based encryption (and more) for nondeterministic finite automata from LWE2020-03-09Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Group signatures without NIZK: from lattices in the standard model2020-02-04Paper
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model
Lecture Notes in Computer Science
2019-01-23Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
Designs, Codes and Cryptography
2018-07-03Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
Algorithmica
2018-01-05Paper
Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques2017-10-27Paper
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
New security proof for the Boneh-Boyen IBE: tight reduction in unbounded multi-challenge security
Information and Communications Security
2016-12-19Paper
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Attribute-based encryption for range attributes
Lecture Notes in Computer Science
2016-10-21Paper
Attribute Based Encryption with Direct Efficiency Tradeoff
Applied Cryptography and Network Security
2016-10-04Paper
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
A Framework for Identity-Based Encryption with Almost Tight Security
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
Lecture Notes in Computer Science
2016-03-02Paper
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues
Lecture Notes in Computer Science
2014-10-14Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
A framework and compact constructions for non-monotonic attribute-based encryption
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
Public Key Cryptography – PKC 2012
2012-07-20Paper
Space efficient signature schemes from the RSA assumption
Public Key Cryptography – PKC 2012
2012-07-20Paper
Two-dimensional representation of cover free families and its applications: short signatures and more
Lecture Notes in Computer Science
2012-06-08Paper
Generic constructions for chosen-ciphertext secure attribute based encryption
Public Key Cryptography – PKC 2011
2011-03-15Paper
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption
Provable Security
2010-10-12Paper


Research outcomes over time


This page was built for person: Shota Yamada