BibTeX records: Ryo Nishimaki

download as .bib file

@article{DBLP:journals/joc/AbeHNOP23,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  title        = {Compact Structure-Preserving Signatures with Almost Tight Security},
  journal      = {J. Cryptol.},
  volume       = {36},
  number       = {4},
  pages        = {37},
  year         = {2023},
  url          = {https://doi.org/10.1007/s00145-023-09477-z},
  doi          = {10.1007/S00145-023-09477-Z},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbeHNOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AgrawalKNYY23,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {Public Key Encryption with Secure Key Leasing},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14004},
  pages        = {581--610},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30545-0\_20},
  doi          = {10.1007/978-3-031-30545-0\_20},
  timestamp    = {Thu, 20 Apr 2023 11:35:01 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AgrawalKNYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/BartusekKNY23,
  author       = {James Bartusek and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Barna Saha and
                  Rocco A. Servedio},
  title        = {Obfuscation of Pseudo-Deterministic Quantum Circuits},
  booktitle    = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing,
                  {STOC} 2023, Orlando, FL, USA, June 20-23, 2023},
  pages        = {1567--1578},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3564246.3585179},
  doi          = {10.1145/3564246.3585179},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/stoc/BartusekKNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KitagawaNY23,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {Publicly Verifiable Deletion from Minimal Assumptions},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14372},
  pages        = {228--245},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48624-1\_9},
  doi          = {10.1007/978-3-031-48624-1\_9},
  timestamp    = {Wed, 06 Dec 2023 13:56:15 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KitagawaNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KitagawaN23,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  editor       = {Guy N. Rothblum and
                  Hoeteck Wee},
  title        = {One-Out-of-Many Unclonable Cryptography: Definitions, Constructions,
                  and More},
  booktitle    = {Theory of Cryptography - 21st International Conference, {TCC} 2023,
                  Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part
                  {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14372},
  pages        = {246--275},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-48624-1\_10},
  doi          = {10.1007/978-3-031-48624-1\_10},
  timestamp    = {Wed, 06 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KitagawaN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-09836,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {One-out-of-Many Unclonable Cryptography: Definitions, Constructions,
                  and More},
  journal      = {CoRR},
  volume       = {abs/2302.09836},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.09836},
  doi          = {10.48550/ARXIV.2302.09836},
  eprinttype    = {arXiv},
  eprint       = {2302.09836},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-09836.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-10354,
  author       = {Taiga Hiroka and
                  Fuyuki Kitagawa and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Tapas Pal and
                  Takashi Yamakawa},
  title        = {Certified Everlasting Secure Collusion-Resistant Functional Encryption,
                  and More},
  journal      = {CoRR},
  volume       = {abs/2302.10354},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.10354},
  doi          = {10.48550/ARXIV.2302.10354},
  eprinttype    = {arXiv},
  eprint       = {2302.10354},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-10354.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-11083,
  author       = {James Bartusek and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Obfuscation of Pseudo-Deterministic Quantum Circuits},
  journal      = {CoRR},
  volume       = {abs/2302.11083},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.11083},
  doi          = {10.48550/ARXIV.2302.11083},
  eprinttype    = {arXiv},
  eprint       = {2302.11083},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-11083.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2302-11663,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Public Key Encryption with Secure Key Leasing},
  journal      = {CoRR},
  volume       = {abs/2302.11663},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2302.11663},
  doi          = {10.48550/ARXIV.2302.11663},
  eprinttype    = {arXiv},
  eprint       = {2302.11663},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2302-11663.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-01800,
  author       = {Fuyuki Kitagawa and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Quantum Public-Key Encryption with Tamper-Resilient Public Keys from
                  One-Way Functions},
  journal      = {CoRR},
  volume       = {abs/2304.01800},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.01800},
  doi          = {10.48550/ARXIV.2304.01800},
  eprinttype    = {arXiv},
  eprint       = {2304.01800},
  timestamp    = {Thu, 20 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-01800.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-07062,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Publicly Verifiable Deletion from Minimal Assumptions},
  journal      = {CoRR},
  volume       = {abs/2304.07062},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.07062},
  doi          = {10.48550/ARXIV.2304.07062},
  eprinttype    = {arXiv},
  eprint       = {2304.07062},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-07062.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaN23,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {One-out-of-Many Unclonable Cryptography: Definitions, Constructions,
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {229},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/229},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirokaKMNPY23,
  author       = {Taiga Hiroka and
                  Fuyuki Kitagawa and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Tapas Pal and
                  Takashi Yamakawa},
  title        = {Certified Everlasting Secure Collusion-Resistant Functional Encryption,
                  and More},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {236},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/236},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HirokaKMNPY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BartusekKNY23,
  author       = {James Bartusek and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Obfuscation of Pseudo-Deterministic Quantum Circuits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {252},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/252},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BartusekKNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKNYY23,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Public Key Encryption with Secure Key Leasing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {264},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/264},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKNYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaMNY23,
  author       = {Fuyuki Kitagawa and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Quantum Public-Key Encryption with Tamper-Resilient Public Keys from
                  One-Way Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {490},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/490},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaMNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNY23,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Publicly Verifiable Deletion from Minimal Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {538},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/538},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirokaKNY23,
  author       = {Taiga Hiroka and
                  Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Robust Combiners and Universal Constructions for Quantum Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1772},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1772},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HirokaKNY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgrawalBNXXY22,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC}
                  2013},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2301--2318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01076-6},
  doi          = {10.1007/S10623-022-01076-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KitagawaNT22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Obfustopia Built on Secret-Key Functional Encryption},
  journal      = {J. Cryptol.},
  volume       = {35},
  number       = {3},
  pages        = {19},
  year         = {2022},
  url          = {https://doi.org/10.1007/s00145-022-09429-z},
  doi          = {10.1007/S00145-022-09429-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KitagawaNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KitagawaN22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {Functional Encryption with Secure Key Leasing},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13794},
  pages        = {569--598},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22972-5\_20},
  doi          = {10.1007/978-3-031-22972-5\_20},
  timestamp    = {Fri, 03 Feb 2023 17:07:15 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KitagawaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/HirokaMNY22,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Yevgeniy Dodis and
                  Thomas Shrimpton},
  title        = {Certified Everlasting Zero-Knowledge Proof for {QMA}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International
                  Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August
                  15-18, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13507},
  pages        = {239--268},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15802-5\_9},
  doi          = {10.1007/978-3-031-15802-5\_9},
  timestamp    = {Wed, 19 Oct 2022 17:37:44 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/HirokaMNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KitagawaN22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Watermarking PRFs Against Quantum Adversaries},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {488--518},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_18},
  doi          = {10.1007/978-3-031-07082-2\_18},
  timestamp    = {Tue, 31 May 2022 17:23:10 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KitagawaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Nishimaki22,
  author       = {Ryo Nishimaki},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {The Direction of Updatable Encryption Does Matter},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {194--224},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_7},
  doi          = {10.1007/978-3-030-97131-1\_7},
  timestamp    = {Thu, 10 Mar 2022 11:26:10 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/Nishimaki22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaN22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  editor       = {Goichiro Hanaoka and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {{KDM} Security for the Fujisaki-Okamoto Transformations in the {QROM}},
  booktitle    = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Virtual Event,
                  March 8-11, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13178},
  pages        = {286--315},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-97131-1\_10},
  doi          = {10.1007/978-3-030-97131-1\_10},
  timestamp    = {Thu, 10 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AgrawalKMNYY22,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Anuja Modi and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Eike Kiltz and
                  Vinod Vaikuntanathan},
  title        = {Bounded Functional Encryption for Turing Machines: Adaptive Security
                  from General Assumptions},
  booktitle    = {Theory of Cryptography - 20th International Conference, {TCC} 2022,
                  Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13747},
  pages        = {618--647},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22318-1\_22},
  doi          = {10.1007/978-3-031-22318-1\_22},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/AgrawalKMNYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-11034,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {Watermarking PRFs against Quantum Adversaries},
  journal      = {CoRR},
  volume       = {abs/2205.11034},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.11034},
  doi          = {10.48550/ARXIV.2205.11034},
  eprinttype    = {arXiv},
  eprint       = {2205.11034},
  timestamp    = {Tue, 31 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-11034.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2207-13878,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Certified Everlasting Functional Encryption},
  journal      = {CoRR},
  volume       = {abs/2207.13878},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2207.13878},
  doi          = {10.48550/ARXIV.2207.13878},
  eprinttype    = {arXiv},
  eprint       = {2207.13878},
  timestamp    = {Tue, 02 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2207-13878.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-13081,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {Functional Encryption with Secure Key Leasing},
  journal      = {CoRR},
  volume       = {abs/2209.13081},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.13081},
  doi          = {10.48550/ARXIV.2209.13081},
  eprinttype    = {arXiv},
  eprint       = {2209.13081},
  timestamp    = {Thu, 06 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-13081.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalKMNYY22,
  author       = {Shweta Agrawal and
                  Fuyuki Kitagawa and
                  Anuja Modi and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Bounded Functional Encryption for Turing Machines: Adaptive Security
                  from General Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/316},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalKMNYY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaN22,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {Watermarking PRFs against Quantum Adversaries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {631},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/631},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirokaMNY22,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Certified Everlasting Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {969},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/969},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirokaMNY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaN22a,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {Functional Encryption with Secure Key Leasing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1252},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1252},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaN22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/TomidaKN21,
  author       = {Junichi Tomida and
                  Yuto Kawahara and
                  Ryo Nishimaki},
  title        = {Fast, compact, and expressive attribute-based encryption},
  journal      = {Des. Codes Cryptogr.},
  volume       = {89},
  number       = {11},
  pages        = {2577--2626},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10623-021-00939-8},
  doi          = {10.1007/S10623-021-00939-8},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/TomidaKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KitagawaNT21,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Simple and Generic Constructions of Succinct Functional Encryption},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {3},
  pages        = {25},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09396-x},
  doi          = {10.1007/S00145-021-09396-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KitagawaNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/KatsumataNYY21,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Compact Designated Verifier NIZKs from the {CDH} Assumption Without
                  Pairings},
  journal      = {J. Cryptol.},
  volume       = {34},
  number       = {4},
  pages        = {42},
  year         = {2021},
  url          = {https://doi.org/10.1007/s00145-021-09408-w},
  doi          = {10.1007/S00145-021-09408-W},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/KatsumataNYY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HirokaMNY21,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Quantum Encryption with Certified Deletion, Revisited: Public Key,
                  Attribute-Based, and Classical Communication},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13090},
  pages        = {606--636},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92062-3\_21},
  doi          = {10.1007/978-3-030-92062-3\_21},
  timestamp    = {Mon, 28 Aug 2023 21:17:52 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HirokaMNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y21,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Round-Optimal Blind Signatures in the Plain Model from Classical and
                  Quantum Standard Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {404--434},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_15},
  doi          = {10.1007/978-3-030-77870-5\_15},
  timestamp    = {Wed, 16 Jun 2021 11:49:32 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/DottlingN21,
  author       = {Nico D{\"{o}}ttling and
                  Ryo Nishimaki},
  editor       = {Juan A. Garay},
  title        = {Universal Proxy Re-Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference
                  on Practice and Theory of Public Key Cryptography, Virtual Event,
                  May 10-13, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12710},
  pages        = {512--542},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-75245-3\_19},
  doi          = {10.1007/978-3-030-75245-3\_19},
  timestamp    = {Fri, 07 May 2021 15:40:46 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/DottlingN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/KitagawaNY21,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Kobbi Nissim and
                  Brent Waters},
  title        = {Secure Software Leasing from Standard Assumptions},
  booktitle    = {Theory of Cryptography - 19th International Conference, {TCC} 2021,
                  Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13042},
  pages        = {31--61},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90459-3\_2},
  doi          = {10.1007/978-3-030-90459-3\_2},
  timestamp    = {Wed, 10 Nov 2021 16:16:02 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/KitagawaNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-05393,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Quantum Encryption with Certified Deletion, Revisited: Public Key,
                  Attribute-Based, and Classical Communication},
  journal      = {CoRR},
  volume       = {abs/2105.05393},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.05393},
  eprinttype    = {arXiv},
  eprint       = {2105.05393},
  timestamp    = {Tue, 18 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-05393.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-14163,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Certified Everlasting Zero-Knowledge Proof for {QMA}},
  journal      = {CoRR},
  volume       = {abs/2109.14163},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.14163},
  eprinttype    = {arXiv},
  eprint       = {2109.14163},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-14163.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nishimaki21,
  author       = {Ryo Nishimaki},
  title        = {The Direction of Updatable Encryption Does Matter},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/221},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nishimaki21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataN0Y21,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Round-Optimal Blind Signatures in the Plain Model from Classical and
                  Quantum Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {306},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/306},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataN0Y21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiY21,
  author       = {Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Quantum Encryption with Certified Deletion: Public Key and Attribute-Based},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {394},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/394},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBNXXY21,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in {TCC}
                  2013},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/505},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBNXXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirokaMNY21,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Quantum Encryption with Certified Deletion, Revisited: Public Key,
                  Attribute-Based, and Classical Communication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/617},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirokaMNY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT21,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Obfustopia Built on Secret-Key Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1018},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaN21,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki},
  title        = {{KDM} Security for the Fujisaki-Okamoto Transformations in the {QROM}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1200},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1200},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HirokaMNY21a,
  author       = {Taiga Hiroka and
                  Tomoyuki Morimae and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Certified Everlasting Zero-Knowledge Proof for {QMA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1315},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1315},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HirokaMNY21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BitanskyNPW20,
  author       = {Nir Bitansky and
                  Ryo Nishimaki and
                  Alain Passel{\`{e}}gue and
                  Daniel Wichs},
  title        = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {2},
  pages        = {357--405},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09337-9},
  doi          = {10.1007/S00145-019-09337-9},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BitanskyNPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KatsumataN0Y20,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Adaptively Secure Inner Product Encryption from {LWE}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12493},
  pages        = {375--404},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64840-4\_13},
  doi          = {10.1007/978-3-030-64840-4\_13},
  timestamp    = {Thu, 10 Dec 2020 10:11:44 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KatsumataN0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DavidsonKN0Y20,
  author       = {Alex Davidson and
                  Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Daniele Micciancio and
                  Thomas Ristenpart},
  title        = {Adaptively Secure Constrained Pseudorandom Functions in the Standard
                  Model},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International
                  Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August
                  17-21, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12170},
  pages        = {559--589},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-56784-2\_19},
  doi          = {10.1007/978-3-030-56784-2\_19},
  timestamp    = {Wed, 12 Aug 2020 14:16:56 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DavidsonKN0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y20,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Compact NIZKs from Standard Assumptions on Bilinear Maps},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12107},
  pages        = {379--409},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45727-3\_13},
  doi          = {10.1007/978-3-030-45727-3\_13},
  timestamp    = {Mon, 04 May 2020 14:40:23 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TomidaKN20,
  author       = {Junichi Tomida and
                  Yuto Kawahara and
                  Ryo Nishimaki},
  editor       = {Aggelos Kiayias and
                  Markulf Kohlweiss and
                  Petros Wallden and
                  Vassilis Zikas},
  title        = {Fast, Compact, and Expressive Attribute-Based Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Edinburgh, UK,
                  May 4-7, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12110},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45374-9\_1},
  doi          = {10.1007/978-3-030-45374-9\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TomidaKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Nishimaki20,
  author       = {Ryo Nishimaki},
  editor       = {Rafael Pass and
                  Krzysztof Pietrzak},
  title        = {Equipping Public-Key Cryptographic Primitives with Watermarking (or:
                  {A} Hole Is to Watermark)},
  booktitle    = {Theory of Cryptography - 18th International Conference, {TCC} 2020,
                  Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12550},
  pages        = {179--209},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64375-1\_7},
  doi          = {10.1007/978-3-030-64375-1\_7},
  timestamp    = {Tue, 15 Dec 2020 11:52:09 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/Nishimaki20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-11186,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Secure Software Leasing from Standard Assumptions},
  journal      = {CoRR},
  volume       = {abs/2010.11186},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.11186},
  eprinttype    = {arXiv},
  eprint       = {2010.11186},
  timestamp    = {Tue, 27 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-11186.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidsonKNYY20,
  author       = {Alex Davidson and
                  Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Adaptively Secure Constrained Pseudorandom Functions in the Standard
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidsonKNYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataNYY20,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Compact NIZKs from Standard Assumptions on Bilinear Maps},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataNYY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataNYY20a,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Adaptively Secure Inner Product Encryption from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1135},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1135},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataNYY20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nishimaki20,
  author       = {Ryo Nishimaki},
  title        = {Equipping Public-Key Cryptographic Primitives with Watermarking (or:
                  {A} Hole Is to Watermark)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1173},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1173},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nishimaki20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNY20,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Secure Software Leasing from Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1314},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1314},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Nishimaki19,
  author       = {Ryo Nishimaki},
  title        = {How to Watermark Cryptographic Functions by Bilinear Maps},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {1},
  pages        = {99--113},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.99},
  doi          = {10.1587/TRANSFUN.E102.A.99},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Nishimaki19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KitagawaNTY19,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Takashi Yamakawa},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Adaptively Secure and Succinct Functional Encryption: Improving Security
                  and Efficiency, Simultaneously},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {521--551},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_17},
  doi          = {10.1007/978-3-030-26954-8\_17},
  timestamp    = {Fri, 09 Aug 2019 14:27:02 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KitagawaNTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KatsumataN0Y19,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Exploring Constructions of Compact NIZKs from Various Assumptions},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11694},
  pages        = {639--669},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26954-8\_21},
  doi          = {10.1007/978-3-030-26954-8\_21},
  timestamp    = {Fri, 09 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KatsumataN0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y19,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman
                  Assumptions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11477},
  pages        = {622--651},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17656-3\_22},
  doi          = {10.1007/978-3-030-17656-3\_22},
  timestamp    = {Tue, 14 May 2019 13:55:31 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AttrapadungMNYY19,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Adaptively Single-Key Secure Constrained PRFs for {\textbackslash}mathrm
                  NC{\^{}}1},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {223--253},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_8},
  doi          = {10.1007/978-3-030-17259-6\_8},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AttrapadungMNYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiY19,
  author       = {Ryo Nishimaki and
                  Takashi Yamakawa},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model
                  with Nearly Optimal Leakage-Ratio},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11442},
  pages        = {466--495},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17253-4\_16},
  doi          = {10.1007/978-3-030-17253-4\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishimakiY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiY19,
  author       = {Ryo Nishimaki and
                  Takashi Yamakawa},
  title        = {Leakage-resilient Identity-based Encryption in Bounded Retrieval Model
                  with Nearly Optimal Leakage-Ratio},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataNYY19,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman
                  Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataNYY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatsumataN0Y19,
  author       = {Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Exploring Constructions of Compact NIZKs from Various Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {623},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/623},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatsumataN0Y19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TomidaKN19,
  author       = {Junichi Tomida and
                  Yuto Kawahara and
                  Ryo Nishimaki},
  title        = {Fast, Compact, and Expressive Attribute-Based Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {966},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/966},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TomidaKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/siamcomp/CohenHNVW18,
  author       = {Aloni Cohen and
                  Justin Holmgren and
                  Ryo Nishimaki and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {Watermarking Cryptographic Capabilities},
  journal      = {{SIAM} J. Comput.},
  volume       = {47},
  number       = {6},
  pages        = {2157--2202},
  year         = {2018},
  url          = {https://doi.org/10.1137/18M1164834},
  doi          = {10.1137/18M1164834},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/siamcomp/CohenHNVW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Attrapadung0N0Y18,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Constrained PRFs for {\textbackslash}mathrmNC{\^{}}1 in Traditional
                  Groups},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10992},
  pages        = {543--574},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96881-0\_19},
  doi          = {10.1007/978-3-319-96881-0\_19},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Attrapadung0N0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KitagawaNT18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Obfustopia Built on Secret-Key Functional Encryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10821},
  pages        = {603--648},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78375-8\_20},
  doi          = {10.1007/978-3-319-78375-8\_20},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KitagawaNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KitagawaNT18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Michel Abdalla and
                  Ricardo Dahab},
  title        = {Simple and Generic Constructions of Succinct Functional Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Rio de Janeiro,
                  Brazil, March 25-29, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10770},
  pages        = {187--217},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76581-5\_7},
  doi          = {10.1007/978-3-319-76581-5\_7},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KitagawaNT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Attrapadung0N0Y18,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Constrained PRFs for {NC1} in Traditional Groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {154},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/154},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Attrapadung0N0Y18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DottlingN18,
  author       = {Nico D{\"{o}}ttling and
                  Ryo Nishimaki},
  title        = {Universal Proxy Re-Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/840},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DottlingN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidsonN18,
  author       = {Alex Davidson and
                  Ryo Nishimaki},
  title        = {A Bit-fixing {PRF} with {O(1)} Collusion-Resistance from {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {890},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/890},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidsonN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNTY18,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Takashi Yamakawa},
  title        = {Adaptively Secure and Succinct Functional Encryption: Improving Security
                  and Efficiency, Simultaneously},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {974},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/974},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNTY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidsonKNY18,
  author       = {Alex Davidson and
                  Shuichi Katsumata and
                  Ryo Nishimaki and
                  Shota Yamada},
  title        = {Constrained PRFs for Bit-fixing from OWFs with Constant Collusion
                  Resistance},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {982},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/982},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidsonKNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AttrapadungMNYY18,
  author       = {Nuttapong Attrapadung and
                  Takahiro Matsuda and
                  Ryo Nishimaki and
                  Shota Yamada and
                  Takashi Yamakawa},
  title        = {Adaptively Single-Key Secure Constrained PRFs for {NC1}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1000},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1000},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AttrapadungMNYY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AbeHNOP17,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {Compact Structure-Preserving Signatures with Almost Tight Security},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10402},
  pages        = {548--580},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63715-0\_19},
  doi          = {10.1007/978-3-319-63715-0\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/AbeHNOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17a,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {Indistinguishability Obfuscation for All Circuits from Secret-Key
                  Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/361},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeHNOP17,
  author       = {Masayuki Abe and
                  Dennis Hofheinz and
                  Ryo Nishimaki and
                  Miyako Ohkubo and
                  Jiaxin Pan},
  title        = {Compact Structure-preserving Signatures with Almost Tight Security},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {524},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/524},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeHNOP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitagawaNT17b,
  author       = {Fuyuki Kitagawa and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  title        = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption
                  by Leveraging Succinctness},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {638},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/638},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitagawaNT17b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeCDKNO16,
  author       = {Masayuki Abe and
                  Melissa Chase and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  title        = {Constant-Size Structure-Preserving Signatures: Generic Constructions
                  and Simple Assumptions},
  journal      = {J. Cryptol.},
  volume       = {29},
  number       = {4},
  pages        = {833--878},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00145-015-9211-7},
  doi          = {10.1007/S00145-015-9211-7},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/AbeCDKNO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/NishimakiWZ16,
  author       = {Ryo Nishimaki and
                  Daniel Wichs and
                  Mark Zhandry},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
                  Key},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9666},
  pages        = {388--419},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49896-5\_14},
  doi          = {10.1007/978-3-662-49896-5\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/NishimakiWZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Nishimaki16,
  author       = {Ryo Nishimaki},
  editor       = {Raphael C.{-}W. Phan and
                  Moti Yung},
  title        = {Watermarking Cryptographic Programs},
  booktitle    = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory
                  Cryptology - Second International Conference, Mycrypt 2016, Kuala
                  Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10311},
  pages        = {521--543},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-61273-7\_28},
  doi          = {10.1007/978-3-319-61273-7\_28},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Nishimaki16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stoc/CohenHNVW16,
  author       = {Aloni Cohen and
                  Justin Holmgren and
                  Ryo Nishimaki and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  editor       = {Daniel Wichs and
                  Yishay Mansour},
  title        = {Watermarking cryptographic capabilities},
  booktitle    = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory
                  of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016},
  pages        = {1115--1127},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2897518.2897651},
  doi          = {10.1145/2897518.2897651},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/stoc/CohenHNVW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BitanskyNPW16,
  author       = {Nir Bitansky and
                  Ryo Nishimaki and
                  Alain Passel{\`{e}}gue and
                  Daniel Wichs},
  editor       = {Martin Hirt and
                  Adam D. Smith},
  title        = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption},
  booktitle    = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B,
                  Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9986},
  pages        = {391--418},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53644-5\_15},
  doi          = {10.1007/978-3-662-53644-5\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/tcc/BitanskyNPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BitanskyNPW16,
  author       = {Nir Bitansky and
                  Ryo Nishimaki and
                  Alain Passel{\`{e}}gue and
                  Daniel Wichs},
  title        = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {558},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/558},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BitanskyNPW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Verifiably encrypted signatures with short keys based on the decisional
                  linear problem and obfuscation for encrypted {VES}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {1},
  pages        = {61--98},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9986-9},
  doi          = {10.1007/S10623-014-9986-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Key-Private Proxy Re-Encryption from Lattices, Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {100--116},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.100},
  doi          = {10.1587/TRANSFUN.E98.A.100},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujisakiKNTY15,
  author       = {Eiichiro Fujisaki and
                  Akinori Kawachi and
                  Ryo Nishimaki and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  title        = {Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split
                  State Model},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {3},
  pages        = {853--862},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.853},
  doi          = {10.1587/TRANSFUN.E98.A.853},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujisakiKNTY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DavidNRT15,
  author       = {Bernardo Machado David and
                  Ryo Nishimaki and
                  Samuel Ranellucci and
                  Alain Tapp},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Generalizing Efficient Multiparty Computation},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {15--32},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_2},
  doi          = {10.1007/978-3-319-17470-9\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DavidNRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DavidNRT15,
  author       = {Bernardo David and
                  Ryo Nishimaki and
                  Samuel Ranellucci and
                  Alain Tapp},
  title        = {Generalizing Efficient Multiparty Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {135},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/135},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DavidNRT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Verifiably Encrypted Signatures with Short Keys based on the Decisional
                  Linear Problem and Obfuscation for Encrypted {VES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeDKNO15,
  author       = {Masayuki Abe and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  title        = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeDKNO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiW15,
  author       = {Ryo Nishimaki and
                  Daniel Wichs},
  title        = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {344},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/344},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCLNX15,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Feng{-}Hao Liu and
                  Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Re-encryption, functional re-encryption, and multi-hop re-encryption:
                  {A} framework for achieving obfuscation-based security and instantiations
                  from lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCLNX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiWZ15,
  author       = {Ryo Nishimaki and
                  Daniel Wichs and
                  Mark Zhandry},
  title        = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a
                  Key},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {750},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/750},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CohenHNVW15,
  author       = {Aloni Cohen and
                  Justin Holmgren and
                  Ryo Nishimaki and
                  Vinod Vaikuntanathan and
                  Daniel Wichs},
  title        = {Watermarking Cryptographic Capabilities},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1096},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1096},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CohenHNVW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChandranCLNX14,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Feng{-}Hao Liu and
                  Ryo Nishimaki and
                  Keita Xagawa},
  editor       = {Hugo Krawczyk},
  title        = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption:
                  {A} Framework for Achieving Obfuscation-Based Security and Instantiations
                  from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_6},
  doi          = {10.1007/978-3-642-54631-0\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChandranCLNX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Nishimaki14,
  author       = {Ryo Nishimaki},
  title        = {How to Watermark Cryptographic Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {472},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/472},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Nishimaki14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/AbeCDN13,
  author       = {Masayuki Abe and
                  Jan Camenisch and
                  Maria Dubovitskaya and
                  Ryo Nishimaki},
  editor       = {Thomas Gro{\ss} and
                  Marit Hansen},
  title        = {Universally composable adaptive oblivious transfer (with access control)
                  from standard assumptions},
  booktitle    = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
                  Management, Berlin, Germany, November 8, 2013},
  pages        = {1--12},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517881.2517883},
  doi          = {10.1145/2517881.2517883},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/AbeCDN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Nishimaki13,
  author       = {Ryo Nishimaki},
  editor       = {Thomas Johansson and
                  Phong Q. Nguyen},
  title        = {How to Watermark Cryptographic Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Athens, Greece, May 26-30, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7881},
  pages        = {111--125},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38348-9\_7},
  doi          = {10.1007/978-3-642-38348-9\_7},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Nishimaki13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AbeDKNO13,
  author       = {Masayuki Abe and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {312--331},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_20},
  doi          = {10.1007/978-3-642-36362-7\_20},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AbeDKNO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiX13,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional
                  Linear Problem and Obfuscation for Encrypted {VES}},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {405--422},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_25},
  doi          = {10.1007/978-3-642-36362-7\_25},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishimakiX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiFT12,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  title        = {An Efficient Non-interactive Universally Composable String-Commitment
                  Scheme},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {167--175},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.167},
  doi          = {10.1587/TRANSFUN.E95.A.167},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiFT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiFT12a,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  title        = {A Multi-Trapdoor Commitment Scheme from the {RSA} Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {176--184},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.176},
  doi          = {10.1587/TRANSFUN.E95.A.176},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiFT12a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AbeCDKNO12,
  author       = {Masayuki Abe and
                  Melissa Chase and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Constant-Size Structure-Preserving Signatures: Generic Constructions
                  and Simple Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {4--24},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_3},
  doi          = {10.1007/978-3-642-34961-4\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AbeCDKNO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AbeCDKNO12,
  author       = {Masayuki Abe and
                  Melissa Chase and
                  Bernardo David and
                  Markulf Kohlweiss and
                  Ryo Nishimaki and
                  Miyako Ohkubo},
  title        = {Constant-Size Structure-Preserving Signatures: Generic Constructions
                  and Simple Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AbeCDKNO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NishimakiFT10,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_12},
  doi          = {10.1007/978-3-642-14081-5\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NishimakiFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MatsudaNT10,
  author       = {Toshihide Matsuda and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_16},
  doi          = {10.1007/978-3-642-13013-7\_16},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/MatsudaNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsudaNNT09,
  author       = {Toshihide Matsuda and
                  Ryo Nishimaki and
                  Akira Numayama and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {343--359},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_24},
  doi          = {10.1007/978-3-642-02620-1\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsudaNNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/NishimakiFT09,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Efficient Non-interactive Universally Composable String-Commitment
                  Schemes},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_3},
  doi          = {10.1007/978-3-642-04642-1\_3},
  timestamp    = {Sun, 02 Jun 2019 21:26:38 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/NishimakiFT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/FujisakiNT09,
  author       = {Eiichiro Fujisaki and
                  Ryo Nishimaki and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash
                  Functions},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {118--128},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_11},
  doi          = {10.1007/978-3-642-04642-1\_11},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/FujisakiNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiMO08,
  author       = {Ryo Nishimaki and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {Universally Composable Identity-Based Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {262--271},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.262},
  doi          = {10.1093/IETFEC/E91-A.1.262},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/NishimakiMO06,
  author       = {Ryo Nishimaki and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  editor       = {Phong Q. Nguyen},
  title        = {Universally Composable Identity-Based Encryption},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {337--353},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_23},
  doi          = {10.1007/11958239\_23},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/NishimakiMO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics