Shuichi Katsumata

From MaRDI portal
(Redirected from Person:1701436)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Unmasking \textsf{TRaccoon}: a lattice-based threshold signature with an efficient identifiable abort protocol2026-01-28Paper
Triple Ratchet: a bandwidth efficient hybrid-secure signal protocol2025-12-02Paper
Two-round threshold signature from algebraic one-more learning with errors
Journal of Cryptology
2025-09-30Paper
Two-round threshold signature from algebraic one-more learning with errors2024-12-13Paper
Adaptively secure 5 round threshold signatures from \textsf{MLWE}/\textsf{MSIS} and \textsf{DL} with rewinding2024-12-13Paper
Raccoon: a masking-friendly signature proven in the probing model2024-12-04Paper
Breaking parallel ROS: implication for isogeny and lattice-based blind signatures2024-11-12Paper
Threshold raccoon: practical threshold signatures from standard lattice assumptions2024-11-12Paper
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
Designs, Codes and Cryptography
2024-11-04Paper
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Compact NIZKs from standard assumptions on bilinear maps
Journal of Cryptology
2024-07-10Paper
Practical round-optimal blind signatures in the ROM from standard assumptions2024-06-26Paper
\textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling
Advances in Cryptology – CRYPTO 2022
2023-06-28Paper
Group signatures and more from isogenies and lattices: generic, simple, and efficient
Designs, Codes and Cryptography
2023-05-31Paper
Direct computation of branching programs and its applications to more efficient lattice-based cryptography
Designs, Codes and Cryptography
2023-04-21Paper
Statistical ZAPs from group-based assumptions2023-03-31Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices2023-03-21Paper
Scalable ciphertext compression techniques for post-quantum KEMs and their applications2023-03-21Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Group signatures and more from isogenies and lattices: generic, simple, and efficient2022-08-30Paper
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices2022-08-25Paper
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
Journal of Cryptology
2022-05-09Paper
A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs2022-04-22Paper
Identity-based encryption with security against the KGC: a formal model and its instantiations
Theoretical Computer Science
2021-12-22Paper
An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable2021-12-21Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-5122021-12-01Paper
Non-interactive zero-knowledge in pairing-free groups from weaker assumptions2021-12-01Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings
Journal of Cryptology
2021-11-24Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model
Journal of Cryptology
2021-04-07Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Group signatures without NIZK: from lattices in the standard model2020-02-04Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Theoretical Computer Science
2020-01-29Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Public-Key Cryptography – PKC 2019
2020-01-28Paper
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR2020-01-28Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
Tighter security proofs for GPV-IBE in the quantum random oracle model
Lecture Notes in Computer Science
2019-01-23Paper
Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices2018-05-29Paper
On the untapped potential of encoding predicates by arithmetic circuits and their applications2018-02-23Paper
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Constructing subspace membership encryption through inner product encryption
Provable Security
2015-09-29Paper


Research outcomes over time


This page was built for person: Shuichi Katsumata