default search action
Shota Yamada 0001
Person information
- unicode name: 山田翔太
- affiliation: National Institute of Advanced Industrial Science and Technology (AIST), Tokyo, Japan
Other persons with the same name
- Shota Yamada — disambiguation page
- Shota Yamada 0002 — Keio University, Department of Information and Computer Science, Tokyo, Japan
- Shota Yamada 0003 — University of Tokyo, Japan
- Shota Yamada 0004 — Panasonic Corporation, Nagaokakyo City, Kyoto, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. J. Cryptol. 37(3): 23 (2024) - [c55]Shweta Agrawal, Simran Kumari, Shota Yamada:
Attribute Based Encryption for Turing Machines from Lattices. CRYPTO (3) 2024: 352-386 - [c54]Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada:
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort. TCC (3) 2024: 124-155 - [i42]Ryuya Hayashi, Yusuke Sakai, Shota Yamada:
Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions. IACR Cryptol. ePrint Arch. 2024: 1129 (2024) - [i41]Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada:
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort. IACR Cryptol. ePrint Arch. 2024: 1481 (2024) - [i40]Shweta Agrawal, Simran Kumari, Shota Yamada:
Compact Pseudorandom Functional Encryption from Evasive LWE. IACR Cryptol. ePrint Arch. 2024: 1719 (2024) - [i39]Shweta Agrawal, Simran Kumari, Shota Yamada:
Pseudorandom Multi-Input Functional Encryption and Applications. IACR Cryptol. ePrint Arch. 2024: 1720 (2024) - 2023
- [j13]Shuichi Katsumata, Toi Tomita, Shota Yamada:
Direct computation of branching programs and its applications to more efficient lattice-based cryptography. Des. Codes Cryptogr. 91(2): 391-431 (2023) - [c53]Shweta Agrawal, Mélissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. CRYPTO (4) 2023: 532-564 - [c52]Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. EUROCRYPT (1) 2023: 581-610 - [c51]Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada:
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness. EUROCRYPT (3) 2023: 605-636 - [c50]Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Signature for Objects: Formalizing How to Authenticate Physical Data and More. FC (1) 2023: 182-199 - [i38]Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. CoRR abs/2302.11663 (2023) - [i37]Shweta Agrawal, Fuyuki Kitagawa, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Public Key Encryption with Secure Key Leasing. IACR Cryptol. ePrint Arch. 2023: 264 (2023) - [i36]Shweta Agrawal, Melissa Rossi, Anshu Yadav, Shota Yamada:
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE. IACR Cryptol. ePrint Arch. 2023: 941 (2023) - 2022
- [j12]Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada:
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013. Des. Codes Cryptogr. 90(10): 2301-2318 (2022) - [j11]SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
How to Extend CTRT for AES-256 and AES-192. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(8): 1121-1133 (2022) - [c49]Shweta Agrawal, Anshu Yadav, Shota Yamada:
Multi-input Attribute Based Encryption and Predicate Encryption. CRYPTO (1) 2022: 590-621 - [c48]Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. TCC (1) 2022: 618-647 - [i35]Shweta Agrawal, Fuyuki Kitagawa, Anuja Modi, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions. IACR Cryptol. ePrint Arch. 2022: 316 (2022) - [i34]Shweta Agrawal, Anshu Yadav, Shota Yamada:
Multi-Input Attribute Based Encryption and Predicate Encryption. IACR Cryptol. ePrint Arch. 2022: 1024 (2022) - [i33]Shweta Agrawal, Simran Kumari, Anshu Yadav, Shota Yamada:
Trace and Revoke with Optimal Parameters from Polynomial Hardness. IACR Cryptol. ePrint Arch. 2022: 1347 (2022) - 2021
- [j10]Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. J. Cryptol. 34(1): 5 (2021) - [j9]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings. J. Cryptol. 34(4): 42 (2021) - [c47]Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada:
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. CRYPTO (4) 2021: 239-269 - [c46]Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida:
Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions. CRYPTO (2) 2021: 305-334 - [c45]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. EUROCRYPT (1) 2021: 404-434 - [i32]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. IACR Cryptol. ePrint Arch. 2021: 306 (2021) - [i31]Shweta Agrawal, Rajarshi Biswas, Ryo Nishimaki, Keita Xagawa, Xiang Xie, Shota Yamada:
Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013. IACR Cryptol. ePrint Arch. 2021: 505 (2021) - [i30]Shweta Agrawal, Monosij Maitra, Narasimha Sai Vempati, Shota Yamada:
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE. IACR Cryptol. ePrint Arch. 2021: 848 (2021) - 2020
- [j8]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic hardness of inversion on ring and its relation to self-bilinear map. Theor. Comput. Sci. 820: 60-84 (2020) - [c44]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Inner Product Encryption from LWE. ASIACRYPT (3) 2020: 375-404 - [c43]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. CRYPTO (1) 2020: 559-589 - [c42]Goichiro Hanaoka, Misaki Komatsu, Kazuma Ohara, Yusuke Sakai, Shota Yamada:
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition. ESORICS (2) 2020: 65-85 - [c41]Shweta Agrawal, Shota Yamada:
Optimal Broadcast Encryption from Pairings and LWE. EUROCRYPT (1) 2020: 13-43 - [c40]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. EUROCRYPT (3) 2020: 379-409 - [c39]Shweta Agrawal, Shota Yamada:
CP-ABE for Circuits (and More) in the Symmetric Key Setting. TCC (1) 2020: 117-148 - [c38]Shweta Agrawal, Daniel Wichs, Shota Yamada:
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model. TCC (1) 2020: 149-178 - [i29]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 111 (2020) - [i28]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. IACR Cryptol. ePrint Arch. 2020: 223 (2020) - [i27]Shweta Agrawal, Shota Yamada:
Optimal Broadcast Encryption from Pairings and LWE. IACR Cryptol. ePrint Arch. 2020: 228 (2020) - [i26]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Inner Product Encryption from LWE. IACR Cryptol. ePrint Arch. 2020: 1135 (2020) - [i25]Shweta Agrawal, Daniel Wichs, Shota Yamada:
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 1179 (2020) - [i24]Shweta Agrawal, Shota Yamada:
CP-ABE for Circuits (and more) in the Symmetric Key Setting. IACR Cryptol. ePrint Arch. 2020: 1432 (2020)
2010 – 2019
- 2019
- [c37]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Exploring Constructions of Compact NIZKs from Various Assumptions. CRYPTO (3) 2019: 639-669 - [c36]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. CRYPTO (2) 2019: 765-797 - [c35]Shuichi Katsumata, Shota Yamada:
Group Signatures Without NIZK: From Lattices in the Standard Model. EUROCRYPT (3) 2019: 312-344 - [c34]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. EUROCRYPT (2) 2019: 622-651 - [c33]Shuichi Katsumata, Shota Yamada:
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. Public Key Cryptography (2) 2019: 158-188 - [c32]Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1. Public Key Cryptography (2) 2019: 223-253 - [c31]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN. TCC (2) 2019: 91-117 - [c30]SeongHan Shin, Shota Yamada, Goichiro Hanaoka, Yusuke Ishida, Atsushi Kunii, Junichi Oketani, Shimpei Kunii, Kiyoshi Tomomura:
An Extended CTRT for AES-256. WISA 2019: 79-91 - [i23]Shuichi Katsumata, Shota Yamada:
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. IACR Cryptol. ePrint Arch. 2019: 36 (2019) - [i22]Shuichi Katsumata, Shota Yamada:
Group Signatures without NIZK: From Lattices in the Standard Model. IACR Cryptol. ePrint Arch. 2019: 221 (2019) - [i21]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2019: 255 (2019) - [i20]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Exploring Constructions of Compact NIZKs from Various Assumptions. IACR Cryptol. ePrint Arch. 2019: 623 (2019) - [i19]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. IACR Cryptol. ePrint Arch. 2019: 629 (2019) - [i18]Shweta Agrawal, Monosij Maitra, Shota Yamada:
Attribute Based Encryption for Deterministic Finite Automata from DLIN. IACR Cryptol. ePrint Arch. 2019: 645 (2019) - 2018
- [j7]Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. Des. Codes Cryptogr. 86(8): 1623-1683 (2018) - [j6]Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1440-1455 (2018) - [c29]Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. ASIACRYPT (2) 2018: 253-282 - [c28]Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Constrained PRFs for \mathrmNC^1 in Traditional Groups. CRYPTO (2) 2018: 543-574 - [c27]Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka:
Tree-based Secure Comparison of Secret Shared Data. ISITA 2018: 525-529 - [c26]Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai:
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests. ISITA 2018: 530-534 - [c25]Ryo Kato, Naohisa Nishida, Ryo Hirano, Tatsumi Oba, Yuji Unagami, Shota Yamada, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Embedding Lemmas for Functional Encryption. ISITA 2018: 712-716 - [i17]Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Constrained PRFs for NC1 in Traditional Groups. IACR Cryptol. ePrint Arch. 2018: 154 (2018) - [i16]Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2018: 451 (2018) - [i15]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map. IACR Cryptol. ePrint Arch. 2018: 463 (2018) - [i14]Shuichi Katsumata, Shota Yamada:
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance. IACR Cryptol. ePrint Arch. 2018: 914 (2018) - [i13]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada:
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance. IACR Cryptol. ePrint Arch. 2018: 982 (2018) - [i12]Nuttapong Attrapadung, Takahiro Matsuda, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Single-Key Secure Constrained PRFs for NC1. IACR Cryptol. ePrint Arch. 2018: 1000 (2018) - 2017
- [j5]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. Algorithmica 79(4): 1286-1317 (2017) - [j4]Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1846-1856 (2017) - [j3]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1882-1890 (2017) - [j2]Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Private Similarity Searchable Encryption for Euclidean Distance. IEICE Trans. Inf. Syst. 100-D(10): 2319-2326 (2017) - [c24]Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. CCS 2017: 2277-2293 - [c23]Shota Yamada:
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. CRYPTO (3) 2017: 161-193 - [p1]Goichiro Hanaoka, Shota Yamada:
A Survey on Identity-Based Encryption from Lattices. CREST Crypto-Math Project 2017: 349-365 - [i11]Shota Yamada:
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. IACR Cryptol. ePrint Arch. 2017: 96 (2017) - [i10]Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions. IACR Cryptol. ePrint Arch. 2017: 650 (2017) - 2016
- [c22]Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada:
Attribute Based Encryption with Direct Efficiency Tradeoff. ACNS 2016: 249-266 - [c21]Shuichi Katsumata, Shota Yamada:
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps. ASIACRYPT (2) 2016: 682-712 - [c20]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. CRYPTO (2) 2016: 3-32 - [c19]Shota Yamada:
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters. EUROCRYPT (2) 2016: 32-62 - [c18]Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
Private similarity searchable encryption for Euclidean distance. ISITA 2016: 718-722 - [c17]Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
Attribute-Based Encryption for Range Attributes. SCN 2016: 42-61 - [i9]Shota Yamada:
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters. IACR Cryptol. ePrint Arch. 2016: 140 (2016) - [i8]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. IACR Cryptol. ePrint Arch. 2016: 567 (2016) - [i7]Shuichi Katsumata, Shota Yamada:
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps. IACR Cryptol. ePrint Arch. 2016: 843 (2016) - 2015
- [c16]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. ASIACRYPT (1) 2015: 521-549 - [c15]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs. ASIACRYPT (1) 2015: 575-601 - [c14]Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. CT-RSA 2015: 87-105 - [i6]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. IACR Cryptol. ePrint Arch. 2015: 128 (2015) - [i5]Nuttapong Attrapadung, Shota Yamada:
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings. IACR Cryptol. ePrint Arch. 2015: 157 (2015) - [i4]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka:
Conversions among Several Classes of Predicate Encryption and Their Applications. IACR Cryptol. ePrint Arch. 2015: 431 (2015) - [i3]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
A Framework for Identity-Based Encryption with Almost Tight Security. IACR Cryptol. ePrint Arch. 2015: 566 (2015) - 2014
- [c13]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. CRYPTO (2) 2014: 90-107 - [c12]Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security. ICICS 2014: 176-190 - [c11]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. Public Key Cryptography 2014: 275-292 - [c10]Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. SCN 2014: 558-577 - [i2]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 181 (2014) - 2013
- [c9]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism. AsiaPKC@AsiaCCS 2013: 23-32 - [c8]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length. ISC 2013: 100-109 - [c7]Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. Public Key Cryptography 2013: 32-50 - [c6]Go Ohtake, Yuki Hironaka, Kenjiro Kai, Yosuke Endo, Goichiro Hanaoka, Hajime Watanabe, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, Hideki Imai:
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction. SECRYPT 2013: 339-346 - [i1]Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada:
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption. IACR Cryptol. ePrint Arch. 2013: 390 (2013) - 2012
- [c5]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. CT-RSA 2012: 260-277 - [c4]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Space Efficient Signature Schemes from the RSA Assumption. Public Key Cryptography 2012: 102-119 - [c3]Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Public Key Cryptography 2012: 243-261 - 2011
- [c2]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Public Key Cryptography 2011: 71-89 - 2010
- [j1]Shota Yamada, Yutaka Kawai, Goichiro Hanaoka, Noboru Kunihiro:
Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1984-1993 (2010) - [c1]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. ProvSec 2010: 229-243
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-13 20:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint