Yusuke Sakai

From MaRDI portal
(Redirected from Person:278728)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Practical round-optimal blind signatures in the ROM from standard assumptions2024-06-26Paper
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions2024-03-14Paper
Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs
Lecture Notes in Computer Science
2023-07-25Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
1511.68043
2022-12-22Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures
International Journal of Applied Cryptography
2018-11-26Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols2018-11-07Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes2018-10-24Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Attribute-based signatures for circuits from bilinear map
Public-Key Cryptography – PKC 2016
2016-04-13Paper
THE INVERSE MEAN CURVATURE FLOW IN RANK ONE SYMMETRIC SPACES OF NON-COMPACT TYPE
Kyushu Journal of Mathematics
2015-12-11Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list
Applied Cryptography and Network Security
2014-07-07Paper
Group signatures with message-dependent opening
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
Cryptography and Coding
2011-12-16Paper
Towards restricting plaintext space in public key encryption
Advances in Information and Computer Security
2011-11-10Paper


Research outcomes over time


This page was built for person: Yusuke Sakai