Takashi Yamakawa

From MaRDI portal
Person:1653107



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Exponential quantum one-wayness and EFI pairs2025-01-10Paper
Quantum advantage from one-way functions2024-12-13Paper
Quantum complexity for discrete logarithms and related problems2024-12-13Paper
Unconditionally secure commitments with quantum auxiliary inputs2024-12-13Paper
Quantum public-key encryption with tamper-resilient public keys from one-way functions2024-12-13Paper
Certified everlasting secure collusion-resistant functional encryption, and more2024-11-13Paper
Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness
Journal of Cryptology
2024-10-11Paper
Proofs of quantumness from trapdoor permutations2024-09-25Paper
Publicly verifiable deletion from minimal assumptions2024-08-15Paper
Compact NIZKs from standard assumptions on bilinear maps
Journal of Cryptology
2024-07-10Paper
Dynamical aspects of excitonic Floquet states generated by a phase-locked mid-infrared pulse in a one-dimensional Mott insulator
New Journal of Physics
2024-06-21Paper
Obfuscation of pseudo-deterministic quantum circuits2024-05-08Paper
Public key encryption with secure key leasing
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Classically verifiable NIZK for QMA with preprocessing
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions
Theory of Cryptography
2023-08-14Paper
NIZK from SNARGs
Journal of Cryptology
2023-07-05Paper
Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Quantum commitments and signatures without one-way functions
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Certified everlasting zero-knowledge proof for QMA
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
Lecture Notes in Computer Science
2023-05-12Paper
Secure software leasing from standard assumptions
(available as arXiv preprint)
2023-03-31Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Finding collisions in a quantum world: quantum black-box separation of collision-resistance and one-wayness2023-03-21Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
A black-box approach to post-quantum zero-knowledge in constant rounds
(available as arXiv preprint)
2022-03-31Paper
Classical verification of quantum computations with efficient verifier
(available as arXiv preprint)
2022-03-23Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Classical vs quantum random oracles2021-12-08Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
NIZK from SNARG2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings
Journal of Cryptology
2021-11-24Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model
Journal of Cryptology
2021-04-07Paper
Quantum random oracle model with auxiliary input2020-05-20Paper
Generic hardness of inversion on ring and its relation to self-bilinear map
Theoretical Computer Science
2020-04-21Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously2020-03-09Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
(Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model2020-02-25Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio2020-01-28Paper
On the analytical solution for the Pütter-Bertalanffy growth equation
Journal of Theoretical Biology
2019-05-14Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model
Lecture Notes in Computer Science
2019-01-23Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Tightly-secure key-encapsulation mechanism in the quantum random oracle model2018-07-17Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
Algorithmica
2018-01-05Paper
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
Generalized hardness assumption for self-bilinear map with auxiliary information
Information Security and Privacy
2016-09-02Paper
A short fail-stop signature scheme from factoring
Provable Security
2015-09-29Paper
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues
Lecture Notes in Computer Science
2014-10-14Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper


Research outcomes over time


This page was built for person: Takashi Yamakawa