The following pages link to Ryo Nishimaki (Q321315):
Displaying 50 items.
- Constant-size structure-preserving signatures: generic constructions and simple assumptions (Q321316) (← links)
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Compact structure-preserving signatures with almost tight security (Q1680229) (← links)
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups (Q1784106) (← links)
- Compact designated verifier NIZKs from the CDH assumption without pairings (Q2051369) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q2055661) (← links)
- Equipping public-key cryptographic primitives with watermarking (or: a hole is to watermark) (Q2055718) (← links)
- Round-optimal blind signatures in the plain model from classical and quantum standard assumptions (Q2056693) (← links)
- Universal proxy re-encryption (Q2061932) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Watermarking PRFs against quantum adversaries (Q2170100) (← links)
- From cryptomania to obfustopia through secret-key functional encryption (Q2175212) (← links)
- Fast, compact, and expressive attribute-based encryption (Q2234469) (← links)
- Leakage-resilient identity-based encryption in bounded retrieval model with nearly optimal leakage-ratio (Q2289217) (← links)
- Adaptively single-key secure constrained PRFs for \(\text{NC}^1\) (Q2289431) (← links)
- Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions (Q2292887) (← links)
- Adaptively secure and succinct functional encryption: improving security and efficiency, simultaneously (Q2304931) (← links)
- Exploring constructions of compact NIZKs from various assumptions (Q2304936) (← links)
- Watermarking cryptographic programs (Q2412250) (← links)
- Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013 (Q2673979) (← links)
- Adaptively secure inner product encryption from LWE (Q2691591) (← links)
- Secure software leasing from standard assumptions (Q2695623) (← links)
- Universally Composable Identity-Based Encryption (Q2876988) (← links)
- Generalizing Efficient Multiparty Computation (Q2947520) (← links)
- A Multi-trapdoor Commitment Scheme from the RSA Assumption (Q3163104) (← links)
- From Cryptomania to Obfustopia Through Secret-Key Functional Encryption (Q3181034) (← links)
- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model (Q3562901) (← links)
- Security on Hybrid Encryption with the Tag-KEM/DEM Framework (Q3634504) (← links)
- Efficient Non-interactive Universally Composable String-Commitment Schemes (Q3651577) (← links)
- On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions (Q3651585) (← links)
- Watermarking Cryptographic Capabilities (Q4561266) (← links)
- Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions (Q4911575) (← links)
- Tagged One-Time Signatures: Tight Security and Optimal Tag Size (Q4916017) (← links)
- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES (Q4916022) (← links)
- How to Watermark Cryptographic Functions (Q4924406) (← links)
- Fast, Compact, and Expressive Attribute-Based Encryption (Q5041150) (← links)
- Watermarking cryptographic capabilities (Q5361906) (← links)
- Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices (Q5402966) (← links)
- Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key (Q5739209) (← links)
- Obfustopia built on secret-key functional encryption (Q5915680) (← links)
- Simple and generic constructions of succinct functional encryption (Q5916067) (← links)
- Simple and generic constructions of succinct functional encryption (Q5918349) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- Compact structure-preserving signatures with almost tight security (Q6134421) (← links)
- Watermarking PRFs and PKE against quantum adversaries (Q6536747) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q6570525) (← links)
- Publicly verifiable deletion from minimal assumptions (Q6587954) (← links)
- One-out-of-many unclonable cryptography: definitions, constructions, and more (Q6587955) (← links)
- Certified everlasting secure collusion-resistant functional encryption, and more (Q6637338) (← links)
- Quantum public-key encryption with tamper-resilient public keys from one-way functions (Q6653003) (← links)