Keisuke Tanaka

From MaRDI portal
(Redirected from Person:671623)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Universally composable relaxed asymmetric password-authenticated key exchange2025-01-10Paper
1-out-of-\(n\) oblivious signatures: security revisited and a generic construction with an efficient communication cost2024-05-31Paper
Auditable attribute-based credentials scheme and its application in contact tracing2024-05-31Paper
Analysis of (U,U+V)-code problem with Gramian over binary and ternary fields
Lecture Notes in Computer Science
2023-08-21Paper
Pointcheval-Sanders signature-based synchronized aggregate signature
Lecture Notes in Computer Science
2023-08-21Paper
Turn-based communication channels2023-04-13Paper
Watermarkable signature with computational function preserving2023-03-21Paper
Receiver selective opening CCA secure public key encryption from various assumptions2023-03-21Paper
Non-committing encryption with constant ciphertext expansion from standard assumptions2023-03-21Paper
Approximation and special cases of common subtrees and editing distance2023-01-25Paper
Forward secure message franking2022-12-07Paper
Efficient two-party exponentiation from quotient transfer2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Payment trees: low collateral payments for payment channel networks2022-06-22Paper
Obfustopia built on secret-key functional encryption
Journal of Cryptology
2022-06-08Paper
CCA security and trapdoor functions via key-dependent-message security
Journal of Cryptology
2022-04-04Paper
Security definitions on time-lock puzzles2022-03-24Paper
Secret sharing with statistical privacy and computational relaxed non-malleability2022-03-24Paper
Generic transformation from broadcast encryption to round-optimal deniable ring authentication
Designs, Codes and Cryptography
2022-03-21Paper
Impossibility on tamper-resilient cryptography with uniqueness properties2021-12-21Paper
Tightly secure ring signatures in the standard model
Theoretical Computer Science
2021-10-21Paper
Fine-grained cryptography revisited
Journal of Cryptology
2021-07-30Paper
Simple and generic constructions of succinct functional encryption
Journal of Cryptology
2021-07-30Paper
Improved security proof for the Camenisch-Lysyanskaya signature-based synchronized aggregate signature scheme
(available as arXiv preprint)
2021-06-08Paper
A t-out-of-n Redactable Signature Scheme
Cryptology and Network Security
2020-07-20Paper
Fine-grained cryptography revisited
Lecture Notes in Computer Science
2020-05-11Paper
Simple and efficient KDM-CCA secure public key encryption2020-05-11Paper
Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem2020-05-11Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously2020-03-09Paper
CCA security and trapdoor functions via key-dependent-message security
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Anonymous single-round server-aided verification2020-03-02Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Theoretical Computer Science
2019-10-18Paper
A framework for achieving KDM-CCA secure public-key encryption2019-01-23Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Lower bounds for key length of \(k\)-wise almost independent permutations and certain symmetric-key encryption schemes2018-10-24Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Lecture Notes in Computer Science
2018-10-17Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
CCA2 key-privacy for code-based encryption in the standard model2018-09-12Paper
Memory lower bounds of reductions revisited2018-07-09Paper
Obfustopia built on secret-key functional encryption
Advances in Cryptology – EUROCRYPT 2018
2018-07-09Paper
Simple and generic constructions of succinct functional encryption
Public-Key Cryptography – PKC 2018
2018-05-29Paper
Key dependent message security and receiver selective opening security for identity-based encryption2018-05-16Paper
How to obtain fully structure-preserving (automorphic) signatures from structure-preserving ones
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Signatures Resilient to Uninvertible Leakage
Lecture Notes in Computer Science
2016-10-21Paper
On the complexity of negation-limited Boolean networks (preliminary version)
Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94
2016-09-01Paper
On the key dependent message security of the Fujisaki-Okamoto constructions
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Completeness of single-bit projection-KDM security for public key encryption
Lecture Notes in Computer Science
2016-03-02Paper
Generic transformation to strongly existentially unforgeable signature schemes with continuous leakage resiliency
Information Security and Privacy
2015-10-20Paper
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency
Provable Security
2015-09-29Paper
Efficient key dependent message security amplification against chosen ciphertext attacks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper
Game-theoretic security for bit commitment
Advances in Information and Computer Security
2014-09-15Paper
Attacks to the proxy re-encryption schemes from IWSEC2011
Advances in Information and Computer Security
2014-09-15Paper
Strongly simulation-extractable leakage-resilient NIZK
Information Security and Privacy
2014-07-24Paper
Factoring-based proxy re-encryption schemes
Provable Security
2013-10-23Paper
Grey-box public-key steganography
Lecture Notes in Computer Science
2013-05-28Paper
Symmetric-key encryption scheme with multi-ciphertext non-malleability
Advances in Information and Computer Security
2013-04-04Paper
Proxy re-encryption in a stronger security model extended from CT-RSA2012
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees
Theoretical Computer Science
2013-02-19Paper
Leakage-resilience of stateless/stateful public-key encryption from hash proofs
Information Security and Privacy
2012-09-07Paper
A Game-Theoretic Perspective on Oblivious Transfer
Information Security and Privacy
2012-09-07Paper
Weak oblivious transfer from strong one-way functions
Provable Security
2011-09-16Paper
Randomness leakage in the KEM/DEM framework
Provable Security
2011-09-16Paper
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity
Lecture Notes in Computer Science
2011-05-19Paper
A multi-trapdoor commitment scheme from the RSA assumption
Information Security and Privacy
2010-10-25Paper
CCA proxy re-encryption without bilinear maps in the standard model
Public Key Cryptography – PKC 2010
2010-05-28Paper
Security of Encryption Schemes in Weakened Random Oracle Models
Public Key Cryptography – PKC 2010
2010-05-28Paper
Efficient public key encryption based on ideal lattices (extended abstract)
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Efficient non-interactive universally composable string-commitment schemes
Provable Security
2009-12-11Paper
Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge
Provable Security
2009-12-11Paper
On the insecurity of the Fiat-Shamir signatures with iterative hash functions
Provable Security
2009-12-11Paper
Algorithms and Computation
Lecture Notes in Computer Science
2009-08-07Paper
Limiting negations in bounded-depth circuits: an extension of Markov's theorem
Information Processing Letters
2009-07-21Paper
Multi-recipient Public-Key Encryption from Simulators in Security Proofs
Information Security and Privacy
2009-06-25Paper
On the Weak Ideal Compression Functions
Information Security and Privacy
2009-06-25Paper
Security on Hybrid Encryption with the Tag-KEM/DEM Framework
Information Security and Privacy
2009-06-25Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Anonymity on Paillier’s Trap-Door Permutation
Information Security and Privacy
2009-03-06Paper
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Public-Key Cryptosystems with Primitive Power Roots of Unity
Information Security and Privacy
2008-07-08Paper
Universally Anonymizable Public-Key Encryption
Lecture Notes in Computer Science
2008-03-18Paper
Security of Digital Signature Schemes in Weakened Random Oracle Models
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity
Information Security and Privacy
2007-09-07Paper
Multi-bit Cryptosystems Based on Lattice Problems
Public Key Cryptography – PKC 2007
2007-09-04Paper
Notch effect on fatigue strength reduction of bearing steel in the very high cycle regime
International Journal of Fatigue
2006-10-27Paper
Smart structure for suppression of mode I and II crack propagation in CFRP laminates by shape memory alloy TiNi actuator
International Journal of Fatigue
2006-10-10Paper
Mode II fatigue crack growth from delamination in unidirectional tape and satin-woven fabric laminates of high strength GFRP
International Journal of Fatigue
2006-10-10Paper
Fatigue damage evaluation in SiCp/2024 by X-ray diffraction method
International Journal of Fatigue
2006-10-10Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Public Key Cryptography - PKC 2005
Lecture Notes in Computer Science
2005-12-07Paper
Quantum bit-commitment for small storage based on quantum one-way permutations
New Generation Computing
2004-09-22Paper
scientific article; zbMATH DE number 1759776 (Why is no real title available?)2002-10-07Paper
scientific article; zbMATH DE number 1788728 (Why is no real title available?)2002-08-26Paper
An exponential gap with the removal of one negation gate
Information Processing Letters
2002-07-14Paper
An extension of Grover's quantum search algorithm
RIMS Kokyuroku
2001-09-17Paper
scientific article; zbMATH DE number 1507247 (Why is no real title available?)2001-02-04Paper
scientific article; zbMATH DE number 1511713 (Why is no real title available?)2000-09-27Paper
scientific article; zbMATH DE number 1404249 (Why is no real title available?)2000-02-20Paper
scientific article; zbMATH DE number 1395314 (Why is no real title available?)2000-01-30Paper
scientific article; zbMATH DE number 1380771 (Why is no real title available?)1999-12-20Paper
scientific article; zbMATH DE number 1379306 (Why is no real title available?)1999-12-15Paper
scientific article; zbMATH DE number 1372647 (Why is no real title available?)1999-12-01Paper
scientific article; zbMATH DE number 1322339 (Why is no real title available?)1999-11-08Paper
Minimizing maximum absolute lateness and range of lateness under generalized due dates on a single machine
Annals of Operations Research
1999-06-10Paper
scientific article; zbMATH DE number 1263235 (Why is no real title available?)1999-03-16Paper
On the Complexity of Negation-Limited Boolean Networks
SIAM Journal on Computing
1998-09-20Paper
Minimizing The Range Of Lateness On A Single Machine Under Generalized Due Dates
INFOR: Information Systems and Operational Research
1998-09-07Paper
Negation-limited circuit complexity of symmetric functions
Information Processing Letters
1997-02-27Paper
A Dislocation Model for Fatigue Crack Initiation
Journal of Applied Mechanics
1981-01-01Paper


Research outcomes over time


This page was built for person: Keisuke Tanaka