Masayuki Abe

From MaRDI portal
(Redirected from Person:290387)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Hybrid zero-knowledge from garbled circuits and circuit-based composition of \(\Sigma \)-protocols
 
2025-01-10Paper
CDS composition of multi-round protocols
 
2024-12-13Paper
Cryptanalysis of the \textsc{Peregrine} lattice-based signature scheme
 
2024-11-12Paper
Mechanism of common-mode noise and heat generation in an Electric circuit with grounding using multiconductor transmission-line theory
Chinese Journal of Physics (Taipei)
2024-03-04Paper
Quantum-access security of hash-based signature schemes
 
2024-01-11Paper
Compact structure-preserving signatures with almost tight security
Journal of Cryptology
2023-08-22Paper
Acyclicity programming for sigma-protocols
 
2023-03-31Paper
Non-interactive composition of sigma-protocols via Share-then-Hash
 
2023-03-29Paper
On black-box extensions of non-interactive zero-knowledge arguments, and signatures directly from simulation soundness
Lecture Notes in Computer Science
2022-10-13Paper
Blind key-generation attribute-based encryption for general predicates
Designs, Codes and Cryptography
2022-09-22Paper
On black-box extension of a non-interactive zero-knowledge proof system for secret equality
 
2022-07-06Paper
On subset-resilient hash function families
Designs, Codes and Cryptography
2022-03-21Paper
Shorter QA-NIZK and SPS with tighter security
 
2020-05-11Paper
A coin-free oracle-based augmented black box framework
 
2020-01-10Paper
Efficient fully structure-preserving signatures and shrinking commitments
Journal of Cryptology
2019-08-13Paper
On the impossibility of structure-preserving deterministic primitives
Journal of Cryptology
2019-01-29Paper
Improved (almost) tightly-secure simulation-sound QA-NIZK with applications
 
2018-12-20Paper
Efficient functional encryption for inner-product values with full-hiding security
 
2018-10-18Paper
Lower bounds on structure-preserving signatures for bilateral messages
 
2018-10-17Paper
Compact structure-preserving signatures with almost tight security
 
2017-11-15Paper
Design in type-I, run in type-III: fast and scalable bilinear-type conversion using integer programming
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Journal of Cryptology
2016-10-13Paper
Structure-preserving signatures and commitments to group elements
Journal of Cryptology
2016-06-01Paper
Fully structure-preserving signatures and shrinking commitments
Advances in Cryptology - EUROCRYPT 2015
2015-09-30Paper
Packing messages and optimizing bootstrapping in GSW-FHE
Lecture Notes in Computer Science
2015-08-27Paper
On the definition of anonymity for ring signatures
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Structure-preserving signatures from type II pairings
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Converting cryptographic schemes from symmetric to asymmetric bilinear groups
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures
Theory of Cryptography
2014-02-18Paper
On the impossibility of structure-preserving deterministic primitives
Theory of Cryptography
2014-02-18Paper
Tagged one-time signatures: tight security and optimal tag size
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A framework for universally composable non-committing blind signatures
International Journal of Applied Cryptography
2012-11-16Paper
Tools over bilinear groups for modular design of cryptographic tasks. (Abstract)
Provable Security
2012-11-06Paper
Group to group commitments do not shrink
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions
Lecture Notes in Computer Science
2011-12-02Paper
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
A signature scheme with efficient proof of validity
Lecture Notes in Computer Science
2011-06-08Paper
Structure-preserving signatures and commitments to group elements
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Efficient hybrid encryption from ID-based encryption
Designs, Codes and Cryptography
2010-03-02Paper
A Framework for Universally Composable Non-committing Blind Signatures
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Compact CCA-Secure Encryption for Messages of Arbitrary Length
Public Key Cryptography – PKC 2009
2009-03-24Paper
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM
Lecture Notes in Computer Science
2008-05-06Paper
Tag-KEM/DEM: A new framework for hybrid encryption
Journal of Cryptology
2008-04-16Paper
Tag-KEM from Set Partial Domain One-Way Permutations
Information Security and Privacy
2007-09-07Paper
Perfect NIZK with Adaptive Soundness
Theory of Cryptography
2007-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Combining Encryption and Proof of Knowledge in the Random Oracle Model
The Computer Journal
2004-11-19Paper
scientific article; zbMATH DE number 2085425 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2081088 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2079934 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 2044525 (Why is no real title available?)
 
2004-02-18Paper
scientific article; zbMATH DE number 2043308 (Why is no real title available?)
 
2004-02-16Paper
A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication
The Computer Journal
2003-08-07Paper
1-out-of-n Signatures from a Variety of Keys
Lecture Notes in Computer Science
2003-07-16Paper
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
Lecture Notes in Computer Science
2003-07-16Paper
scientific article; zbMATH DE number 1941238 (Why is no real title available?)
 
2003-06-29Paper
scientific article; zbMATH DE number 1759330 (Why is no real title available?)
 
2002-10-13Paper
scientific article; zbMATH DE number 1759784 (Why is no real title available?)
 
2002-10-07Paper
scientific article; zbMATH DE number 1424190 (Why is no real title available?)
 
2002-04-08Paper
scientific article; zbMATH DE number 1722675 (Why is no real title available?)
 
2002-03-21Paper
scientific article; zbMATH DE number 1583778 (Why is no real title available?)
 
2001-12-18Paper
scientific article; zbMATH DE number 1618058 (Why is no real title available?)
 
2001-07-12Paper
scientific article; zbMATH DE number 1612509 (Why is no real title available?)
 
2001-07-01Paper
scientific article; zbMATH DE number 1504563 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1504554 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1418292 (Why is no real title available?)
 
2000-07-26Paper
scientific article; zbMATH DE number 1303140 (Why is no real title available?)
 
1999-06-17Paper
scientific article; zbMATH DE number 1024495 (Why is no real title available?)
 
1997-07-20Paper


Research outcomes over time


This page was built for person: Masayuki Abe