Ryo Nishimaki

From MaRDI portal
Person:321315

Available identifiers

zbMath Open nishimaki.ryoMaRDI QIDQ321315

List of research outcomes





PublicationDate of PublicationType
Quantum public-key encryption with tamper-resilient public keys from one-way functions2024-12-13Paper
Certified everlasting secure collusion-resistant functional encryption, and more2024-11-13Paper
One-out-of-many unclonable cryptography: definitions, constructions, and more2024-08-15Paper
Publicly verifiable deletion from minimal assumptions2024-08-15Paper
Compact NIZKs from standard assumptions on bilinear maps2024-07-10Paper
Watermarking PRFs and PKE against quantum adversaries2024-05-13Paper
Obfuscation of pseudo-deterministic quantum circuits2024-05-08Paper
Public key encryption with secure key leasing2024-01-16Paper
Compact structure-preserving signatures with almost tight security2023-08-22Paper
Functional encryption with secure key leasing2023-08-21Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions2023-08-14Paper
KDM security for the Fujisaki-Okamoto transformations in the QROM2023-08-10Paper
The direction of updatable encryption does matter2023-08-10Paper
Certified everlasting zero-knowledge proof for QMA2023-06-12Paper
Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication2023-05-12Paper
Secure software leasing from standard assumptions2023-03-31Paper
Adaptively secure inner product encryption from LWE2023-03-29Paper
Adaptively secure constrained pseudorandom functions in the standard model2022-11-09Paper
Fast, Compact, and Expressive Attribute-Based Encryption2022-10-13Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 20132022-09-22Paper
Watermarking PRFs against quantum adversaries2022-08-30Paper
Obfustopia built on secret-key functional encryption2022-06-08Paper
Universal proxy re-encryption2021-12-21Paper
Round-optimal blind signatures in the plain model from classical and quantum standard assumptions2021-12-08Paper
Compact NIZKs from standard assumptions on bilinear maps2021-12-01Paper
Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark)2021-12-01Paper
Compact designated verifier NIZKs from the CDH assumption without pairings2021-11-24Paper
Fast, compact, and expressive attribute-based encryption2021-10-19Paper
Simple and generic constructions of succinct functional encryption2021-07-30Paper
From cryptomania to obfustopia through secret-key functional encryption2020-04-28Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously2020-03-09Paper
Exploring constructions of compact NIZKs from various assumptions2020-03-09Paper
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions2020-02-06Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio2020-01-28Paper
Watermarking Cryptographic Capabilities2018-12-05Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Obfustopia built on secret-key functional encryption2018-07-09Paper
Simple and generic constructions of succinct functional encryption2018-05-29Paper
Compact structure-preserving signatures with almost tight security2017-11-15Paper
Watermarking cryptographic programs2017-10-23Paper
Watermarking cryptographic capabilities2017-09-29Paper
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption2016-12-22Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions2016-10-13Paper
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key2016-07-15Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES2015-09-30Paper
Generalizing Efficient Multiparty Computation2015-09-24Paper
Universally Composable Identity-Based Encryption2014-08-21Paper
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices2014-03-25Paper
How to watermark cryptographic functions2013-05-31Paper
Tagged one-time signatures: tight security and optimal tag size2013-04-19Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES2013-04-19Paper
Constant-size structure-preserving signatures: generic constructions and simple assumptions2013-03-19Paper
A multi-trapdoor commitment scheme from the RSA assumption2010-10-25Paper
CCA proxy re-encryption without bilinear maps in the standard model2010-05-28Paper
Efficient non-interactive universally composable string-commitment schemes2009-12-11Paper
On the insecurity of the Fiat-Shamir signatures with iterative hash functions2009-12-11Paper
Security on Hybrid Encryption with the Tag-KEM/DEM Framework2009-06-25Paper

Research outcomes over time

This page was built for person: Ryo Nishimaki