The following pages link to Shota Yamada (Q1650426):
Displaying 47 items.
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques (Q1675199) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups (Q1784106) (← links)
- Generic hardness of inversion on ring and its relation to self-bilinear map (Q1989358) (← links)
- Compact designated verifier NIZKs from the CDH assumption without pairings (Q2051369) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q2055661) (← links)
- CP-ABE for circuits (and More) in the symmetric key setting (Q2055716) (← links)
- Optimal broadcast encryption from LWE and pairings in the standard model (Q2055717) (← links)
- Round-optimal blind signatures in the plain model from classical and quantum standard assumptions (Q2056693) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions (Q2128566) (← links)
- Functional encryption for Turing machines with dynamic bounded collusion from LWE (Q2139636) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR (Q2289429) (← links)
- Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) (Q2289431) (← links)
- Group signatures without NIZK: from lattices in the standard model (Q2292699) (← links)
- Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions (Q2292887) (← links)
- Exploring constructions of compact NIZKs from various assumptions (Q2304936) (← links)
- Attribute-based encryption (and more) for nondeterministic finite automata from LWE (Q2305001) (← links)
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 (Q2673979) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Direct computation of branching programs and its applications to more efficient lattice-based cryptography (Q2698337) (← links)
- Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings (Q2790032) (← links)
- A Framework for Identity-Based Encryption with Almost Tight Security (Q2811145) (← links)
- Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs (Q2811147) (← links)
- Attribute Based Encryption with Direct Efficiency Tradeoff (Q2822674) (← links)
- Attribute-Based Encryption for Range Attributes (Q2827709) (← links)
- Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli (Q2829209) (← links)
- Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications (Q2874532) (← links)
- Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (Q2890012) (← links)
- Space Efficient Signature Schemes from the RSA Assumption (Q2900211) (← links)
- Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication (Q2900221) (← links)
- Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues (Q2922681) (← links)
- Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps (Q2953793) (← links)
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption (Q3084341) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption (Q4933224) (← links)
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption (Q5402976) (← links)
- New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security (Q5507374) (← links)
- Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters (Q5739197) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5915905) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q6570525) (← links)
- Signature for objects: formalizing how to authenticate physical data and more (Q6573964) (← links)
- Attribute based encryption for Turing machines from lattices (Q6652903) (← links)