Fuyuki Kitagawa

From MaRDI portal
Person:831624


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Quantum public-key encryption with tamper-resilient public keys from one-way functions
 
2024-12-13Paper
Certified everlasting secure collusion-resistant functional encryption, and more
 
2024-11-13Paper
One-out-of-many unclonable cryptography: definitions, constructions, and more
 
2024-08-15Paper
Publicly verifiable deletion from minimal assumptions
 
2024-08-15Paper
Watermarking PRFs and PKE against quantum adversaries
Journal of Cryptology
2024-05-13Paper
Obfuscation of pseudo-deterministic quantum circuits
 
2024-05-08Paper
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions
 
2024-03-14Paper
Public key encryption with secure key leasing
Advances in Cryptology – EUROCRYPT 2023
2024-01-16Paper
Functional encryption with secure key leasing
Advances in Cryptology – ASIACRYPT 2022
2023-08-21Paper
Bounded functional encryption for Turing machines: adaptive security from general assumptions
Theory of Cryptography
2023-08-14Paper
KDM security for the Fujisaki-Okamoto transformations in the QROM
Public-Key Cryptography – PKC 2022
2023-08-10Paper
NIZK from SNARGs
Journal of Cryptology
2023-07-05Paper
Secure software leasing from standard assumptions
 
2023-03-31Paper
Circular security is complete for KDM security
 
2023-03-21Paper
Non-committing encryption with constant ciphertext expansion from standard assumptions
 
2023-03-21Paper
Watermarking PRFs against quantum adversaries
 
2022-08-30Paper
Obfustopia built on secret-key functional encryption
Journal of Cryptology
2022-06-08Paper
CCA security and trapdoor functions via key-dependent-message security
Journal of Cryptology
2022-04-04Paper
Secret sharing with statistical privacy and computational relaxed non-malleability
 
2022-03-24Paper
NIZK from SNARG
 
2021-12-01Paper
Simple and generic constructions of succinct functional encryption
Journal of Cryptology
2021-07-30Paper
Simple and efficient KDM-CCA secure public key encryption
 
2020-05-11Paper
Non-committing encryption with quasi-optimal ciphertext-rate based on the DDH problem
 
2020-05-11Paper
CPA-to-CCA transformation for KDM security
 
2020-04-30Paper
Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously
 
2020-03-09Paper
CCA security and trapdoor functions via key-dependent-message security
Advances in Cryptology – CRYPTO 2019
2020-03-09Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Theoretical Computer Science
2019-10-18Paper
A framework for achieving KDM-CCA secure public-key encryption
 
2019-01-23Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols
 
2018-11-07Paper
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions
Lecture Notes in Computer Science
2018-10-17Paper
Obfustopia built on secret-key functional encryption
Advances in Cryptology – EUROCRYPT 2018
2018-07-09Paper
Simple and generic constructions of succinct functional encryption
Public-Key Cryptography – PKC 2018
2018-05-29Paper
Key dependent message security and receiver selective opening security for identity-based encryption
 
2018-05-16Paper
On the key dependent message security of the Fujisaki-Okamoto constructions
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Completeness of single-bit projection-KDM security for public key encryption
Lecture Notes in Computer Science
2016-03-02Paper
Efficient key dependent message security amplification against chosen ciphertext attacks
Information Security and Cryptology - ICISC 2014
2015-09-11Paper


Research outcomes over time


This page was built for person: Fuyuki Kitagawa