Takahiro Matsuda

From MaRDI portal
Person:428990

Available identifiers

zbMath Open matsuda.takahiroMaRDI QIDQ428990

List of research outcomes

PublicationDate of PublicationType
Public‐Key Encryption and Security Notions2023-08-04Paper
NIZK from SNARGs2023-07-05Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Circular security is complete for KDM security2023-03-21Paper
CCA security and trapdoor functions via key-dependent-message security2022-04-04Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
NIZK from SNARG2021-12-01Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Simple and efficient KDM-CCA secure public key encryption2020-05-11Paper
CPA-to-CCA transformation for KDM security2020-04-30Paper
CCA security and trapdoor functions via key-dependent-message security2020-03-09Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance2020-01-29Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2019-10-18Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2018-10-17Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Efficient bit-decomposition and modulus-conversion protocols with an honest majority2018-09-26Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Related randomness security for public key encryption, revisited2018-05-16Paper
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones2017-01-06Paper
Signatures Resilient to Uninvertible Leakage2016-10-21Paper
Fuzzy Signatures: Relaxing Requirements and a New Construction2016-10-04Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks2016-05-19Paper
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security2016-04-13Paper
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions2016-04-13Paper
A Signature Scheme with a Fuzzy Private Key2016-03-10Paper
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption2016-03-02Paper
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption2016-03-02Paper
Anonymous Data Collection System with Mediators2015-09-21Paper
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks2015-09-11Paper
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms2015-07-06Paper
More Constructions of Re-splittable Threshold Public Key Encryption2015-05-27Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption2014-09-15Paper
Chosen Ciphertext Security via UCE2014-03-25Paper
Chosen Ciphertext Security via Point Obfuscation2014-02-18Paper
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013-04-19Paper
Group Signatures with Message-Dependent Opening2013-04-04Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012-09-25Paper
Relations between Constrained and Bounded Chosen Ciphertext Security for Key Encapsulation Mechanisms2012-07-20Paper
Asynchronous multiple source network coding for wireless broadcasting2012-06-25Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
On Black-Box Separations among Injective One-Way Functions2011-05-19Paper
Parallel Decryption Queries in Bounded Chosen Ciphertext Attacks2011-03-15Paper
Efficient Generic Constructions of Timed-Release Encryption with Pre-open Capability2010-11-26Paper
Efficient Constructions of Signcryption Schemes and Signcryption Composability2009-12-17Paper
A Generic Construction of Timed-Release Encryption with Pre-open Capability2009-10-28Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Wired/Wireless Internet Communications2007-09-24Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Takahiro Matsuda