Jun Furukawa

From MaRDI portal
Person:2925563



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
High-throughput secure three-party computation with an honest majority
Journal of Cryptology
2023-07-05Paper
High-throughput secure three-party computation for malicious adversaries and an honest majority
Lecture Notes in Computer Science
2017-06-13Paper
Short comparable encryption
Cryptology and Network Security
2015-02-10Paper
Request-based comparable encryption
Lecture Notes in Computer Science
2014-10-16Paper
2-pass key exchange protocols from CPA-secure KEM
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Controlled joining on encrypted relational database
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
An implementation of a universally verifiable electronic voting scheme based on shuffling
Financial Cryptography
2011-04-20Paper
On the Minimum Communication Effort for Secure Group Key Exchange
Selected Areas in Cryptography
2011-03-15Paper
An implementation of a mix-net based network voting scheme and its use in a private organization
Towards Trustworthy Elections
2010-06-17Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low
Progress in Cryptology - INDOCRYPT 2008
2009-01-22Paper
Efficient Identity-Based Encryption with Tight Security Reduction
Cryptology and Network Security
2009-01-09Paper
A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort
Lecture Notes in Computer Science
2008-11-20Paper
An Efficient Publicly Verifiable Mix-Net for Long Inputs
Financial Cryptography and Data Security
2008-09-09Paper
Universally Composable Undeniable Signature
Automata, Languages and Programming
2008-08-19Paper
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
An Efficient Aggregate Shuffle Argument Scheme
Financial Cryptography and Data Security
2008-03-07Paper
Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys
Automata, Languages and Programming
2007-11-28Paper
Short Signature and Universal Designated Verifier Signature Without Random Oracles
Applied Cryptography and Network Security
2007-09-24Paper
An Efficient Compiler from Σ-Protocol to 2-Move Deniable Zero-Knowledge
Automata, Languages and Programming
2007-09-11Paper
Security in Communication Networks
Lecture Notes in Computer Science
2006-10-10Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
k-Times Anonymous Authentication (Extended Abstract)2005-08-12Paper
scientific article; zbMATH DE number 1842502 (Why is no real title available?)2002-12-08Paper


Research outcomes over time


This page was built for person: Jun Furukawa