Takahiro Matsuda

From MaRDI portal
(Redirected from Person:428990)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Public‐Key Encryption and Security Notions
Asymmetric Cryptography
2023-08-04Paper
NIZK from SNARGs
Journal of Cryptology
2023-07-05Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE
Designs, Codes and Cryptography
2023-04-28Paper
Circular security is complete for KDM security2023-03-21Paper
CCA security and trapdoor functions via key-dependent-message security
Journal of Cryptology
2022-04-04Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication
Designs, Codes and Cryptography
2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
NIZK from SNARG2021-12-01Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Simple and efficient KDM-CCA secure public key encryption2020-05-11Paper
CPA-to-CCA transformation for KDM security2020-04-30Paper
CCA security and trapdoor functions via key-dependent-message security
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Theoretical Computer Science
2020-01-29Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Public-Key Cryptography – PKC 2019
2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Theoretical Computer Science
2019-10-18Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Lecture Notes in Computer Science
2018-10-17Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Efficient bit-decomposition and modulus-conversion protocols with an honest majority2018-09-26Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
Designs, Codes and Cryptography
2018-07-03Paper
Related randomness security for public key encryption, revisited2018-05-16Paper
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Signatures Resilient to Uninvertible Leakage
Lecture Notes in Computer Science
2016-10-21Paper
Fuzzy signatures: relaxing requirements and a new construction
Applied Cryptography and Network Security
2016-10-04Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption
Advances in Cryptology -- ASIACRYPT 2015
2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
On the key dependent message security of the Fujisaki-Okamoto constructions
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Trading plaintext-awareness for simulatability to achieve chosen ciphertext security
Public-Key Cryptography – PKC 2016
2016-04-13Paper
A signature scheme with a fuzzy private key
Applied Cryptography and Network Security
2016-03-10Paper
Completeness of single-bit projection-KDM security for public key encryption
Lecture Notes in Computer Science
2016-03-02Paper
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
Lecture Notes in Computer Science
2016-03-02Paper
Anonymous Data Collection System with Mediators
Cryptography and Information Security in the Balkans
2015-09-21Paper
Efficient key dependent message security amplification against chosen ciphertext attacks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms
Theory of Cryptography
2015-07-06Paper
More constructions of re-splittable threshold public key encryption
Advances in Information and Computer Security
2015-05-27Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption
Advances in Information and Computer Security
2014-09-15Paper
Chosen ciphertext security via UCE
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Chosen ciphertext security via point obfuscation
Theory of Cryptography
2014-02-18Paper
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations
Theory of Cryptography
2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption
Lecture Notes in Computer Science
2013-06-04Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Key encapsulation mechanisms from extractable hash proof systems, revisited
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Group signatures with message-dependent opening
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Time-specific encryption from forward-secure encryption
Lecture Notes in Computer Science
2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups
Lecture Notes in Computer Science
2012-09-25Paper
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms
Public Key Cryptography – PKC 2012
2012-07-20Paper
Asynchronous multiple source network coding for wireless broadcasting
Numerical Algebra, Control and Optimization
2012-06-25Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
On black-box separations among injective one-way functions
Theory of Cryptography
2011-05-19Paper
Parallel decryption queries in bounded chosen ciphertext attacks
Public Key Cryptography – PKC 2011
2011-03-15Paper
Efficient generic constructions of timed-release encryption with pre-open capability
Lecture Notes in Computer Science
2010-11-26Paper
Efficient constructions of signcryption schemes and signcryption composability
Progress in Cryptology - INDOCRYPT 2009
2009-12-17Paper
A Generic Construction of Timed-Release Encryption with Pre-open Capability
Advances in Information and Computer Security
2009-10-28Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations
Topics in Cryptology – CT-RSA 2009
2009-04-29Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function
Provable Security
2008-06-10Paper
Wired/Wireless Internet Communications
Lecture Notes in Computer Science
2007-09-24Paper


Research outcomes over time


This page was built for person: Takahiro Matsuda