Ryo Nishimaki

From MaRDI portal
Person:321315

Available identifiers

zbMath Open nishimaki.ryoMaRDI QIDQ321315

List of research outcomes

PublicationDate of PublicationType
Public key encryption with secure key leasing2024-01-16Paper
Compact structure-preserving signatures with almost tight security2023-08-22Paper
Functional encryption with secure key leasing2023-08-21Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions2023-08-14Paper
KDM security for the Fujisaki-Okamoto transformations in the QROM2023-08-10Paper
The direction of updatable encryption does matter2023-08-10Paper
Certified everlasting zero-knowledge proof for QMA2023-06-12Paper
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication2023-05-12Paper
Secure software leasing from standard assumptions2023-03-31Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Fast, Compact, and Expressive Attribute-Based Encryption2022-10-13Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 20132022-09-22Paper
Watermarking PRFs against quantum adversaries2022-08-30Paper
Obfustopia built on secret-key functional encryption2022-06-08Paper
Universal proxy re-encryption2021-12-21Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings2021-11-24Paper
Fast, compact, and expressive attribute-based encryption2021-10-19Paper
Simple and generic constructions of succinct functional encryption2021-07-30Paper
From cryptomania to obfustopia through secret-key functional encryption2020-04-28Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously2020-03-09Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Watermarking Cryptographic Capabilities2018-12-05Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Obfustopia built on secret-key functional encryption2018-07-09Paper
Simple and generic constructions of succinct functional encryption2018-05-29Paper
Compact structure-preserving signatures with almost tight security2017-11-15Paper
Watermarking cryptographic programs2017-10-23Paper
Watermarking cryptographic capabilities2017-09-29Paper
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption2016-12-22Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions2016-10-13Paper
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key2016-07-15Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES2015-09-30Paper
Generalizing Efficient Multiparty Computation2015-09-24Paper
Universally Composable Identity-Based Encryption2014-08-21Paper
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices2014-03-25Paper
How to Watermark Cryptographic Functions2013-05-31Paper
Tagged One-Time Signatures: Tight Security and Optimal Tag Size2013-04-19Paper
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES2013-04-19Paper
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions2013-03-19Paper
A Multi-trapdoor Commitment Scheme from the RSA Assumption2010-10-25Paper
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model2010-05-28Paper
Efficient Non-interactive Universally Composable String-Commitment Schemes2009-12-11Paper
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions2009-12-11Paper
Security on Hybrid Encryption with the Tag-KEM/DEM Framework2009-06-25Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Ryo Nishimaki