Ryo Nishimaki

From MaRDI portal
(Redirected from Person:321315)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
PKE and ABE with collusion-resistant secure key leasing2026-02-04Paper
Non-committing identity based encryption: constructions and applications2025-07-29Paper
Robust combiners and universal constructions for quantum cryptography2025-07-25Paper
Quantum public-key encryption with tamper-resilient public keys from one-way functions2024-12-13Paper
Certified everlasting secure collusion-resistant functional encryption, and more2024-11-13Paper
One-out-of-many unclonable cryptography: definitions, constructions, and more2024-08-15Paper
Publicly verifiable deletion from minimal assumptions2024-08-15Paper
Compact NIZKs from standard assumptions on bilinear maps
Journal of Cryptology
2024-07-10Paper
Watermarking PRFs and PKE against quantum adversaries
Journal of Cryptology
2024-05-13Paper
Obfuscation of pseudo-deterministic quantum circuits2024-05-08Paper
Public key encryption with secure key leasing
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Compact structure-preserving signatures with almost tight security
Journal of Cryptology
2023-08-22Paper
Functional encryption with secure key leasing
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions
Theory of Cryptography
2023-08-14Paper
KDM security for the Fujisaki-Okamoto transformations in the QROM
Public-Key Cryptography – PKC 2022
2023-08-10Paper
The direction of updatable encryption does matter
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Certified everlasting zero-knowledge proof for QMA
Advances in Cryptology – CRYPTO 2022
2023-06-12Paper
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication
Lecture Notes in Computer Science
2023-05-12Paper
Secure software leasing from standard assumptions
(available as arXiv preprint)
2023-03-31Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Fast, compact, and expressive attribute-based encryption
Lecture Notes in Computer Science
2022-10-13Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
Designs, Codes and Cryptography
2022-09-22Paper
Watermarking PRFs against quantum adversaries
(available as arXiv preprint)
2022-08-30Paper
Obfustopia built on secret-key functional encryption
Journal of Cryptology
2022-06-08Paper
Universal proxy re-encryption2021-12-21Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings
Journal of Cryptology
2021-11-24Paper
Fast, compact, and expressive attribute-based encryption
Designs, Codes and Cryptography
2021-10-19Paper
Simple and generic constructions of succinct functional encryption
Journal of Cryptology
2021-07-30Paper
From cryptomania to obfustopia through secret-key functional encryption
Journal of Cryptology
2020-04-28Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously2020-03-09Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio2020-01-28Paper
Watermarking cryptographic capabilities
SIAM Journal on Computing
2018-12-05Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Obfustopia built on secret-key functional encryption
Advances in Cryptology – EUROCRYPT 2018
2018-07-09Paper
Simple and generic constructions of succinct functional encryption
Public-Key Cryptography – PKC 2018
2018-05-29Paper
Compact structure-preserving signatures with almost tight security2017-11-15Paper
Watermarking cryptographic programs2017-10-23Paper
Watermarking cryptographic capabilities
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing
2017-09-29Paper
From cryptomania to obfustopia through secret-key functional encryption
Theory of Cryptography
2016-12-22Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Journal of Cryptology
2016-10-13Paper
Anonymous traitor tracing: how to embed arbitrary information in a key
Advances in Cryptology – EUROCRYPT 2016
2016-07-15Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
Designs, Codes and Cryptography
2015-09-30Paper
Generalizing efficient multiparty computation
Lecture Notes in Computer Science
2015-09-24Paper
Universally composable identity-based encryption
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
Public-Key Cryptography – PKC 2014
2014-03-25Paper
How to watermark cryptographic functions
Advances in cryptology -- EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26--30, 2013. Proceedings
2013-05-31Paper
Tagged one-time signatures: tight security and optimal tag size
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A multi-trapdoor commitment scheme from the RSA assumption
Information Security and Privacy
2010-10-25Paper
CCA proxy re-encryption without bilinear maps in the standard model
Public Key Cryptography – PKC 2010
2010-05-28Paper
Efficient non-interactive universally composable string-commitment schemes
Provable Security
2009-12-11Paper
On the insecurity of the Fiat-Shamir signatures with iterative hash functions
Provable Security
2009-12-11Paper
Security on Hybrid Encryption with the Tag-KEM/DEM Framework
Information Security and Privacy
2009-06-25Paper


Research outcomes over time


This page was built for person: Ryo Nishimaki