Available identifiers
zbMath Open nishimaki.ryoMaRDI QIDQ321315
List of research outcomes
Publication | Date of Publication | Type |
---|
Public key encryption with secure key leasing | 2024-01-16 | Paper |
Compact structure-preserving signatures with almost tight security | 2023-08-22 | Paper |
Functional encryption with secure key leasing | 2023-08-21 | Paper |
Bounded functional encryption for Turing machines: adaptive security from general assumptions | 2023-08-14 | Paper |
KDM security for the Fujisaki-Okamoto transformations in the QROM | 2023-08-10 | Paper |
The direction of updatable encryption does matter | 2023-08-10 | Paper |
Certified everlasting zero-knowledge proof for QMA | 2023-06-12 | Paper |
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication | 2023-05-12 | Paper |
Secure software leasing from standard assumptions | 2023-03-31 | Paper |
Adaptively secure inner product encryption from LWE | 2023-03-29 | Paper |
Adaptively secure constrained pseudorandom functions in the standard model | 2022-11-09 | Paper |
Fast, Compact, and Expressive Attribute-Based Encryption | 2022-10-13 | Paper |
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 | 2022-09-22 | Paper |
Watermarking PRFs against quantum adversaries | 2022-08-30 | Paper |
Obfustopia built on secret-key functional encryption | 2022-06-08 | Paper |
Universal proxy re-encryption | 2021-12-21 | Paper |
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions | 2021-12-08 | Paper |
Compact NIZKs from standard assumptions on bilinear maps | 2021-12-01 | Paper |
Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark) | 2021-12-01 | Paper |
Compact designated verifier NIZKs from the CDH assumption without pairings | 2021-11-24 | Paper |
Fast, compact, and expressive attribute-based encryption | 2021-10-19 | Paper |
Simple and generic constructions of succinct functional encryption | 2021-07-30 | Paper |
From cryptomania to obfustopia through secret-key functional encryption | 2020-04-28 | Paper |
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously | 2020-03-09 | Paper |
Exploring constructions of compact NIZKs from various assumptions | 2020-03-09 | Paper |
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions | 2020-02-06 | Paper |
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio | 2020-01-28 | Paper |
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) | 2020-01-28 | Paper |
Watermarking Cryptographic Capabilities | 2018-12-05 | Paper |
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups | 2018-09-26 | Paper |
Obfustopia built on secret-key functional encryption | 2018-07-09 | Paper |
Simple and generic constructions of succinct functional encryption | 2018-05-29 | Paper |
Compact structure-preserving signatures with almost tight security | 2017-11-15 | Paper |
Watermarking cryptographic programs | 2017-10-23 | Paper |
Watermarking cryptographic capabilities | 2017-09-29 | Paper |
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption | 2016-12-22 | Paper |
Constant-size structure-preserving signatures: generic constructions and simple assumptions | 2016-10-13 | Paper |
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key | 2016-07-15 | Paper |
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES | 2015-09-30 | Paper |
Generalizing Efficient Multiparty Computation | 2015-09-24 | Paper |
Universally Composable Identity-Based Encryption | 2014-08-21 | Paper |
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices | 2014-03-25 | Paper |
How to Watermark Cryptographic Functions | 2013-05-31 | Paper |
Tagged One-Time Signatures: Tight Security and Optimal Tag Size | 2013-04-19 | Paper |
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES | 2013-04-19 | Paper |
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions | 2013-03-19 | Paper |
A Multi-trapdoor Commitment Scheme from the RSA Assumption | 2010-10-25 | Paper |
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model | 2010-05-28 | Paper |
Efficient Non-interactive Universally Composable String-Commitment Schemes | 2009-12-11 | Paper |
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions | 2009-12-11 | Paper |
Security on Hybrid Encryption with the Tag-KEM/DEM Framework | 2009-06-25 | Paper |
Research outcomes over time
Doctoral students
No records found.
Known relations from the MaRDI Knowledge Graph
This page was built for person: Ryo Nishimaki