Takahiro Matsuda

From MaRDI portal
Person:428990

Available identifiers

zbMath Open matsuda.takahiroMaRDI QIDQ428990

List of research outcomes





PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Public‐Key Encryption and Security Notions2023-08-04Paper
NIZK from SNARGs2023-07-05Paper
Maliciously circuit-private multi-key FHE and MPC based on LWE2023-04-28Paper
Circular security is complete for KDM security2023-03-21Paper
CCA security and trapdoor functions via key-dependent-message security2022-04-04Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
NIZK from SNARG2021-12-01Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Simple and efficient KDM-CCA secure public key encryption2020-05-11Paper
CPA-to-CCA transformation for KDM security2020-04-30Paper
CCA security and trapdoor functions via key-dependent-message security2020-03-09Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance2020-01-29Paper
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance2020-01-28Paper
Adaptively single-key secure constrained PRFs for \(\text{NC}^1\)2020-01-28Paper
Improved security evaluation techniques for imperfect randomness from arbitrary distributions2020-01-28Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2019-10-18Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions2018-10-17Paper
Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups2018-09-26Paper
Efficient bit-decomposition and modulus-conversion protocols with an honest majority2018-09-26Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Related randomness security for public key encryption, revisited2018-05-16Paper
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones2017-01-06Paper
Signatures Resilient to Uninvertible Leakage2016-10-21Paper
Fuzzy Signatures: Relaxing Requirements and a New Construction2016-10-04Paper
An Asymptotically Optimal Method for Converting Bit Encryption to Multi-Bit Encryption2016-06-10Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks2016-05-19Paper
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions2016-04-13Paper
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security2016-04-13Paper
A Signature Scheme with a Fuzzy Private Key2016-03-10Paper
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption2016-03-02Paper
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption2016-03-02Paper
Anonymous Data Collection System with Mediators2015-09-21Paper
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks2015-09-11Paper
Constructing and Understanding Chosen Ciphertext Security via Puncturable Key Encapsulation Mechanisms2015-07-06Paper
More Constructions of Re-splittable Threshold Public Key Encryption2015-05-27Paper
Achieving Chosen Ciphertext Security from Detectable Public Key Encryption Efficiently via Hybrid Encryption2014-09-15Paper
Chosen Ciphertext Security via UCE2014-03-25Paper
Chosen Ciphertext Security via Point Obfuscation2014-02-18Paper
On the Impossibility of Basing Public-Coin One-Way Permutations on Trapdoor Permutations2014-02-18Paper
Ciphertext Policy Multi-dimensional Range Encryption2013-06-04Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited2013-04-19Paper
Group Signatures with Message-Dependent Opening2013-04-04Paper
Time-specific encryption from forward-secure encryption2012-09-25Paper
On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order Groups2012-09-25Paper
Relations between constrained and bounded chosen ciphertext security for key encapsulation mechanisms2012-07-20Paper
Asynchronous multiple source network coding for wireless broadcasting2012-06-25Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
On black-box separations among injective one-way functions2011-05-19Paper
Parallel decryption queries in bounded chosen ciphertext attacks2011-03-15Paper
Efficient generic constructions of timed-release encryption with pre-open capability2010-11-26Paper
Efficient constructions of signcryption schemes and signcryption composability2009-12-17Paper
A Generic Construction of Timed-Release Encryption with Pre-open Capability2009-10-28Paper
An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations2009-04-29Paper
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function2008-06-10Paper
Wired/Wireless Internet Communications2007-09-24Paper

Research outcomes over time

This page was built for person: Takahiro Matsuda