Takahiro Matsuda

From MaRDI portal
Person:428990

Available identifiers

zbMath Open matsuda.takahiroMaRDI QIDQ428990

List of research outcomes





PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Public‐Key Encryption and Security Notions2023-08-04Paper
NIZK from SNARGs2023-07-05Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Circular security is complete for KDM security2023-03-21Paper
CCA security and trapdoor functions via key-dependent-message security2022-04-04Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
NIZK from SNARG2021-12-01Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Simple and efficient KDM-CCA secure public key encryption2020-05-11Paper
CPA-to-CCA transformation for KDM security2020-04-30Paper
CCA security and trapdoor functions via key-dependent-message security2020-03-09Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance2020-01-29Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2019-10-18Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2018-10-17Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Efficient bit-decomposition and modulus-conversion protocols with an honest majority2018-09-26Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Related randomness security for public key encryption, revisited2018-05-16Paper
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones2017-01-06Paper
Signatures Resilient to Uninvertible Leakage2016-10-21Paper
Fuzzy signatures: relaxing requirements and a new construction2016-10-04Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks2016-05-19Paper
On the key dependent message security of the Fujisaki-Okamoto constructions2016-04-13Paper
Trading plaintext-awareness for simulatability to achieve chosen ciphertext security2016-04-13Paper
A signature scheme with a fuzzy private key2016-03-10Paper
Completeness of single-bit projection-KDM security for public key encryption2016-03-02Paper
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption2016-03-02Paper
Anonymous Data Collection System with Mediators2015-09-21Paper
Efficient key dependent message security amplification against chosen ciphertext attacks2015-09-11Paper
Constructing and understanding chosen ciphertext security via puncturable key encapsulation mechanisms2015-07-06Paper
More constructions of re-splittable threshold public key encryption2015-05-27Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption2014-09-15Paper
Chosen ciphertext security via UCE2014-03-25Paper
Chosen ciphertext security via point obfuscation2014-02-18Paper
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption2013-04-19Paper
Key encapsulation mechanisms from extractable hash proof systems, revisited2013-04-19Paper
Group signatures with message-dependent opening2013-04-04Paper
Time-specific encryption from forward-secure encryption2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012-09-25Paper
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms2012-07-20Paper
Asynchronous multiple source network coding for wireless broadcasting2012-06-25Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
On black-box separations among injective one-way functions2011-05-19Paper
Parallel decryption queries in bounded chosen ciphertext attacks2011-03-15Paper
Efficient generic constructions of timed-release encryption with pre-open capability2010-11-26Paper
Efficient constructions of signcryption schemes and signcryption composability2009-12-17Paper
A Generic Construction of Timed-Release Encryption with Pre-open Capability2009-10-28Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Wired/Wireless Internet Communications2007-09-24Paper

Research outcomes over time

This page was built for person: Takahiro Matsuda