Yusuke Sakai

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Signature for objects: formalizing how to authenticate physical data and more2024-07-17Paper
Practical round-optimal blind signatures in the ROM from standard assumptions2024-06-26Paper
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions2024-03-14Paper
Succinct attribute-based signatures for bounded-size circuits by combining algebraic and arithmetic proofs
Lecture Notes in Computer Science
2023-07-25Paper
Achieving pairing-free aggregate signatures using pre-communication between signers2023-03-21Paper
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition
1511.68043
2022-12-22Paper
Field extension in secret-shared form and its applications to efficient secure computation2020-05-27Paper
Attribute-based signatures for unbounded languages from standard assumptions2019-01-23Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures
International Journal of Applied Cryptography
2018-11-26Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols2018-11-07Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes2018-10-24Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Attribute-based signatures for circuits from bilinear map
Public-Key Cryptography – PKC 2016
2016-04-13Paper
THE INVERSE MEAN CURVATURE FLOW IN RANK ONE SYMMETRIC SPACES OF NON-COMPACT TYPE
Kyushu Journal of Mathematics
2015-12-11Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list
Applied Cryptography and Network Security
2014-07-07Paper
Group signatures with message-dependent opening
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
Ciphertext-policy delegatable hidden vector encryption and its application to searchable encryption in multi-user setting
Cryptography and Coding
2011-12-16Paper
Towards restricting plaintext space in public key encryption
Advances in Information and Computer Security
2011-11-10Paper


Research outcomes over time


This page was built for person: Yusuke Sakai