Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ryo Nishimaki
@article{DBLP:journals/joc/AbeHNOP23, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, title = {Compact Structure-Preserving Signatures with Almost Tight Security}, journal = {J. Cryptol.}, volume = {36}, number = {4}, pages = {37}, year = {2023}, url = {https://doi.org/10.1007/s00145-023-09477-z}, doi = {10.1007/S00145-023-09477-Z}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbeHNOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalKNYY23, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Carmit Hazay and Martijn Stam}, title = {Public Key Encryption with Secure Key Leasing}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14004}, pages = {581--610}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30545-0\_20}, doi = {10.1007/978-3-031-30545-0\_20}, timestamp = {Thu, 20 Apr 2023 11:35:01 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalKNYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/BartusekKNY23, author = {James Bartusek and Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, editor = {Barna Saha and Rocco A. Servedio}, title = {Obfuscation of Pseudo-Deterministic Quantum Circuits}, booktitle = {Proceedings of the 55th Annual {ACM} Symposium on Theory of Computing, {STOC} 2023, Orlando, FL, USA, June 20-23, 2023}, pages = {1567--1578}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3564246.3585179}, doi = {10.1145/3564246.3585179}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/stoc/BartusekKNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KitagawaNY23, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {Publicly Verifiable Deletion from Minimal Assumptions}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14372}, pages = {228--245}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48624-1\_9}, doi = {10.1007/978-3-031-48624-1\_9}, timestamp = {Wed, 06 Dec 2023 13:56:15 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KitagawaNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KitagawaN23, author = {Fuyuki Kitagawa and Ryo Nishimaki}, editor = {Guy N. Rothblum and Hoeteck Wee}, title = {One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More}, booktitle = {Theory of Cryptography - 21st International Conference, {TCC} 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14372}, pages = {246--275}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-48624-1\_10}, doi = {10.1007/978-3-031-48624-1\_10}, timestamp = {Wed, 06 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KitagawaN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-09836, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More}, journal = {CoRR}, volume = {abs/2302.09836}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.09836}, doi = {10.48550/ARXIV.2302.09836}, eprinttype = {arXiv}, eprint = {2302.09836}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-09836.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-10354, author = {Taiga Hiroka and Fuyuki Kitagawa and Tomoyuki Morimae and Ryo Nishimaki and Tapas Pal and Takashi Yamakawa}, title = {Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More}, journal = {CoRR}, volume = {abs/2302.10354}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.10354}, doi = {10.48550/ARXIV.2302.10354}, eprinttype = {arXiv}, eprint = {2302.10354}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-10354.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-11083, author = {James Bartusek and Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Obfuscation of Pseudo-Deterministic Quantum Circuits}, journal = {CoRR}, volume = {abs/2302.11083}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.11083}, doi = {10.48550/ARXIV.2302.11083}, eprinttype = {arXiv}, eprint = {2302.11083}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-11083.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2302-11663, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Public Key Encryption with Secure Key Leasing}, journal = {CoRR}, volume = {abs/2302.11663}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2302.11663}, doi = {10.48550/ARXIV.2302.11663}, eprinttype = {arXiv}, eprint = {2302.11663}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2302-11663.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-01800, author = {Fuyuki Kitagawa and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions}, journal = {CoRR}, volume = {abs/2304.01800}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.01800}, doi = {10.48550/ARXIV.2304.01800}, eprinttype = {arXiv}, eprint = {2304.01800}, timestamp = {Thu, 20 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-01800.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2304-07062, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Publicly Verifiable Deletion from Minimal Assumptions}, journal = {CoRR}, volume = {abs/2304.07062}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2304.07062}, doi = {10.48550/ARXIV.2304.07062}, eprinttype = {arXiv}, eprint = {2304.07062}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2304-07062.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaN23, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {229}, year = {2023}, url = {https://eprint.iacr.org/2023/229}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirokaKMNPY23, author = {Taiga Hiroka and Fuyuki Kitagawa and Tomoyuki Morimae and Ryo Nishimaki and Tapas Pal and Takashi Yamakawa}, title = {Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {236}, year = {2023}, url = {https://eprint.iacr.org/2023/236}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HirokaKMNPY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BartusekKNY23, author = {James Bartusek and Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Obfuscation of Pseudo-Deterministic Quantum Circuits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {252}, year = {2023}, url = {https://eprint.iacr.org/2023/252}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BartusekKNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKNYY23, author = {Shweta Agrawal and Fuyuki Kitagawa and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Public Key Encryption with Secure Key Leasing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {264}, year = {2023}, url = {https://eprint.iacr.org/2023/264}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKNYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaMNY23, author = {Fuyuki Kitagawa and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {490}, year = {2023}, url = {https://eprint.iacr.org/2023/490}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaMNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNY23, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Publicly Verifiable Deletion from Minimal Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {538}, year = {2023}, url = {https://eprint.iacr.org/2023/538}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirokaKNY23, author = {Taiga Hiroka and Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Robust Combiners and Universal Constructions for Quantum Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1772}, year = {2023}, url = {https://eprint.iacr.org/2023/1772}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HirokaKNY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgrawalBNXXY22, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC} 2013}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2301--2318}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01076-6}, doi = {10.1007/S10623-022-01076-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KitagawaNT22, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Obfustopia Built on Secret-Key Functional Encryption}, journal = {J. Cryptol.}, volume = {35}, number = {3}, pages = {19}, year = {2022}, url = {https://doi.org/10.1007/s00145-022-09429-z}, doi = {10.1007/S00145-022-09429-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KitagawaNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KitagawaN22, author = {Fuyuki Kitagawa and Ryo Nishimaki}, editor = {Shweta Agrawal and Dongdai Lin}, title = {Functional Encryption with Secure Key Leasing}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13794}, pages = {569--598}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22972-5\_20}, doi = {10.1007/978-3-031-22972-5\_20}, timestamp = {Fri, 03 Feb 2023 17:07:15 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KitagawaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/HirokaMNY22, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, editor = {Yevgeniy Dodis and Thomas Shrimpton}, title = {Certified Everlasting Zero-Knowledge Proof for {QMA}}, booktitle = {Advances in Cryptology - {CRYPTO} 2022 - 42nd Annual International Cryptology Conference, {CRYPTO} 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13507}, pages = {239--268}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15802-5\_9}, doi = {10.1007/978-3-031-15802-5\_9}, timestamp = {Wed, 19 Oct 2022 17:37:44 +0200}, biburl = {https://dblp.org/rec/conf/crypto/HirokaMNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KitagawaN22, author = {Fuyuki Kitagawa and Ryo Nishimaki}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Watermarking PRFs Against Quantum Adversaries}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {488--518}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_18}, doi = {10.1007/978-3-031-07082-2\_18}, timestamp = {Tue, 31 May 2022 17:23:10 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KitagawaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Nishimaki22, author = {Ryo Nishimaki}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {The Direction of Updatable Encryption Does Matter}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {194--224}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_7}, doi = {10.1007/978-3-030-97131-1\_7}, timestamp = {Thu, 10 Mar 2022 11:26:10 +0100}, biburl = {https://dblp.org/rec/conf/pkc/Nishimaki22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaN22, author = {Fuyuki Kitagawa and Ryo Nishimaki}, editor = {Goichiro Hanaoka and Junji Shikata and Yohei Watanabe}, title = {{KDM} Security for the Fujisaki-Okamoto Transformations in the {QROM}}, booktitle = {Public-Key Cryptography - {PKC} 2022 - 25th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13178}, pages = {286--315}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-97131-1\_10}, doi = {10.1007/978-3-030-97131-1\_10}, timestamp = {Thu, 10 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/AgrawalKMNYY22, author = {Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Eike Kiltz and Vinod Vaikuntanathan}, title = {Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions}, booktitle = {Theory of Cryptography - 20th International Conference, {TCC} 2022, Chicago, IL, USA, November 7-10, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13747}, pages = {618--647}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22318-1\_22}, doi = {10.1007/978-3-031-22318-1\_22}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/AgrawalKMNYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-11034, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {Watermarking PRFs against Quantum Adversaries}, journal = {CoRR}, volume = {abs/2205.11034}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.11034}, doi = {10.48550/ARXIV.2205.11034}, eprinttype = {arXiv}, eprint = {2205.11034}, timestamp = {Tue, 31 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-11034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2207-13878, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Certified Everlasting Functional Encryption}, journal = {CoRR}, volume = {abs/2207.13878}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2207.13878}, doi = {10.48550/ARXIV.2207.13878}, eprinttype = {arXiv}, eprint = {2207.13878}, timestamp = {Tue, 02 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2207-13878.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-13081, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {Functional Encryption with Secure Key Leasing}, journal = {CoRR}, volume = {abs/2209.13081}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.13081}, doi = {10.48550/ARXIV.2209.13081}, eprinttype = {arXiv}, eprint = {2209.13081}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-13081.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalKMNYY22, author = {Shweta Agrawal and Fuyuki Kitagawa and Anuja Modi and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2022}, url = {https://eprint.iacr.org/2022/316}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalKMNYY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaN22, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {Watermarking PRFs against Quantum Adversaries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {631}, year = {2022}, url = {https://eprint.iacr.org/2022/631}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirokaMNY22, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Certified Everlasting Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {969}, year = {2022}, url = {https://eprint.iacr.org/2022/969}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirokaMNY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaN22a, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {Functional Encryption with Secure Key Leasing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1252}, year = {2022}, url = {https://eprint.iacr.org/2022/1252}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaN22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/TomidaKN21, author = {Junichi Tomida and Yuto Kawahara and Ryo Nishimaki}, title = {Fast, compact, and expressive attribute-based encryption}, journal = {Des. Codes Cryptogr.}, volume = {89}, number = {11}, pages = {2577--2626}, year = {2021}, url = {https://doi.org/10.1007/s10623-021-00939-8}, doi = {10.1007/S10623-021-00939-8}, timestamp = {Wed, 03 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/TomidaKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KitagawaNT21, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Simple and Generic Constructions of Succinct Functional Encryption}, journal = {J. Cryptol.}, volume = {34}, number = {3}, pages = {25}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09396-x}, doi = {10.1007/S00145-021-09396-X}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KitagawaNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/KatsumataNYY21, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Compact Designated Verifier NIZKs from the {CDH} Assumption Without Pairings}, journal = {J. Cryptol.}, volume = {34}, number = {4}, pages = {42}, year = {2021}, url = {https://doi.org/10.1007/s00145-021-09408-w}, doi = {10.1007/S00145-021-09408-W}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/KatsumataNYY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HirokaMNY21, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13090}, pages = {606--636}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92062-3\_21}, doi = {10.1007/978-3-030-92062-3\_21}, timestamp = {Mon, 28 Aug 2023 21:17:52 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HirokaMNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y21, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {404--434}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_15}, doi = {10.1007/978-3-030-77870-5\_15}, timestamp = {Wed, 16 Jun 2021 11:49:32 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/DottlingN21, author = {Nico D{\"{o}}ttling and Ryo Nishimaki}, editor = {Juan A. Garay}, title = {Universal Proxy Re-Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2021 - 24th {IACR} International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12710}, pages = {512--542}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-75245-3\_19}, doi = {10.1007/978-3-030-75245-3\_19}, timestamp = {Fri, 07 May 2021 15:40:46 +0200}, biburl = {https://dblp.org/rec/conf/pkc/DottlingN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/KitagawaNY21, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, editor = {Kobbi Nissim and Brent Waters}, title = {Secure Software Leasing from Standard Assumptions}, booktitle = {Theory of Cryptography - 19th International Conference, {TCC} 2021, Raleigh, NC, USA, November 8-11, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13042}, pages = {31--61}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90459-3\_2}, doi = {10.1007/978-3-030-90459-3\_2}, timestamp = {Wed, 10 Nov 2021 16:16:02 +0100}, biburl = {https://dblp.org/rec/conf/tcc/KitagawaNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-05393, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication}, journal = {CoRR}, volume = {abs/2105.05393}, year = {2021}, url = {https://arxiv.org/abs/2105.05393}, eprinttype = {arXiv}, eprint = {2105.05393}, timestamp = {Tue, 18 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-05393.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-14163, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Certified Everlasting Zero-Knowledge Proof for {QMA}}, journal = {CoRR}, volume = {abs/2109.14163}, year = {2021}, url = {https://arxiv.org/abs/2109.14163}, eprinttype = {arXiv}, eprint = {2109.14163}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-14163.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nishimaki21, author = {Ryo Nishimaki}, title = {The Direction of Updatable Encryption Does Matter}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2021}, url = {https://eprint.iacr.org/2021/221}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nishimaki21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataN0Y21, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {306}, year = {2021}, url = {https://eprint.iacr.org/2021/306}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataN0Y21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiY21, author = {Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Encryption with Certified Deletion: Public Key and Attribute-Based}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {394}, year = {2021}, url = {https://eprint.iacr.org/2021/394}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBNXXY21, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in {TCC} 2013}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2021}, url = {https://eprint.iacr.org/2021/505}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBNXXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirokaMNY21, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2021}, url = {https://eprint.iacr.org/2021/617}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirokaMNY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT21, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Obfustopia Built on Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2021}, url = {https://eprint.iacr.org/2021/1018}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaN21, author = {Fuyuki Kitagawa and Ryo Nishimaki}, title = {{KDM} Security for the Fujisaki-Okamoto Transformations in the {QROM}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1200}, year = {2021}, url = {https://eprint.iacr.org/2021/1200}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HirokaMNY21a, author = {Taiga Hiroka and Tomoyuki Morimae and Ryo Nishimaki and Takashi Yamakawa}, title = {Certified Everlasting Zero-Knowledge Proof for {QMA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1315}, year = {2021}, url = {https://eprint.iacr.org/2021/1315}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HirokaMNY21a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BitanskyNPW20, author = {Nir Bitansky and Ryo Nishimaki and Alain Passel{\`{e}}gue and Daniel Wichs}, title = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption}, journal = {J. Cryptol.}, volume = {33}, number = {2}, pages = {357--405}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09337-9}, doi = {10.1007/S00145-019-09337-9}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BitanskyNPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KatsumataN0Y20, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Adaptively Secure Inner Product Encryption from {LWE}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12493}, pages = {375--404}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64840-4\_13}, doi = {10.1007/978-3-030-64840-4\_13}, timestamp = {Thu, 10 Dec 2020 10:11:44 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/KatsumataN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DavidsonKN0Y20, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Daniele Micciancio and Thomas Ristenpart}, title = {Adaptively Secure Constrained Pseudorandom Functions in the Standard Model}, booktitle = {Advances in Cryptology - {CRYPTO} 2020 - 40th Annual International Cryptology Conference, {CRYPTO} 2020, Santa Barbara, CA, USA, August 17-21, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12170}, pages = {559--589}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56784-2\_19}, doi = {10.1007/978-3-030-56784-2\_19}, timestamp = {Wed, 12 Aug 2020 14:16:56 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DavidsonKN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y20, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Anne Canteaut and Yuval Ishai}, title = {Compact NIZKs from Standard Assumptions on Bilinear Maps}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {12107}, pages = {379--409}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45727-3\_13}, doi = {10.1007/978-3-030-45727-3\_13}, timestamp = {Mon, 04 May 2020 14:40:23 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TomidaKN20, author = {Junichi Tomida and Yuto Kawahara and Ryo Nishimaki}, editor = {Aggelos Kiayias and Markulf Kohlweiss and Petros Wallden and Vassilis Zikas}, title = {Fast, Compact, and Expressive Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2020 - 23rd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12110}, pages = {3--33}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45374-9\_1}, doi = {10.1007/978-3-030-45374-9\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TomidaKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Nishimaki20, author = {Ryo Nishimaki}, editor = {Rafael Pass and Krzysztof Pietrzak}, title = {Equipping Public-Key Cryptographic Primitives with Watermarking (or: {A} Hole Is to Watermark)}, booktitle = {Theory of Cryptography - 18th International Conference, {TCC} 2020, Durham, NC, USA, November 16-19, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12550}, pages = {179--209}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64375-1\_7}, doi = {10.1007/978-3-030-64375-1\_7}, timestamp = {Tue, 15 Dec 2020 11:52:09 +0100}, biburl = {https://dblp.org/rec/conf/tcc/Nishimaki20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-11186, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Secure Software Leasing from Standard Assumptions}, journal = {CoRR}, volume = {abs/2010.11186}, year = {2020}, url = {https://arxiv.org/abs/2010.11186}, eprinttype = {arXiv}, eprint = {2010.11186}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-11186.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidsonKNYY20, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Secure Constrained Pseudorandom Functions in the Standard Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2020}, url = {https://eprint.iacr.org/2020/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidsonKNYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataNYY20, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Compact NIZKs from Standard Assumptions on Bilinear Maps}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2020}, url = {https://eprint.iacr.org/2020/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataNYY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataNYY20a, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Secure Inner Product Encryption from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1135}, year = {2020}, url = {https://eprint.iacr.org/2020/1135}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataNYY20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nishimaki20, author = {Ryo Nishimaki}, title = {Equipping Public-Key Cryptographic Primitives with Watermarking (or: {A} Hole Is to Watermark)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1173}, year = {2020}, url = {https://eprint.iacr.org/2020/1173}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nishimaki20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNY20, author = {Fuyuki Kitagawa and Ryo Nishimaki and Takashi Yamakawa}, title = {Secure Software Leasing from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1314}, year = {2020}, url = {https://eprint.iacr.org/2020/1314}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Nishimaki19, author = {Ryo Nishimaki}, title = {How to Watermark Cryptographic Functions by Bilinear Maps}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {1}, pages = {99--113}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.99}, doi = {10.1587/TRANSFUN.E102.A.99}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Nishimaki19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KitagawaNTY19, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {521--551}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_17}, doi = {10.1007/978-3-030-26954-8\_17}, timestamp = {Fri, 09 Aug 2019 14:27:02 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KitagawaNTY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KatsumataN0Y19, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Exploring Constructions of Compact NIZKs from Various Assumptions}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11694}, pages = {639--669}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26954-8\_21}, doi = {10.1007/978-3-030-26954-8\_21}, timestamp = {Fri, 09 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KatsumataN0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KatsumataN0Y19, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Yuval Ishai and Vincent Rijmen}, title = {Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11477}, pages = {622--651}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17656-3\_22}, doi = {10.1007/978-3-030-17656-3\_22}, timestamp = {Tue, 14 May 2019 13:55:31 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KatsumataN0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AttrapadungMNYY19, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Dongdai Lin and Kazue Sako}, title = {Adaptively Single-Key Secure Constrained PRFs for {\textbackslash}mathrm NC{\^{}}1}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {223--253}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_8}, doi = {10.1007/978-3-030-17259-6\_8}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AttrapadungMNYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishimakiY19, author = {Ryo Nishimaki and Takashi Yamakawa}, editor = {Dongdai Lin and Kazue Sako}, title = {Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11442}, pages = {466--495}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17253-4\_16}, doi = {10.1007/978-3-030-17253-4\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishimakiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiY19, author = {Ryo Nishimaki and Takashi Yamakawa}, title = {Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2019}, url = {https://eprint.iacr.org/2019/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataNYY19, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2019}, url = {https://eprint.iacr.org/2019/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataNYY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatsumataN0Y19, author = {Shuichi Katsumata and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Exploring Constructions of Compact NIZKs from Various Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {623}, year = {2019}, url = {https://eprint.iacr.org/2019/623}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatsumataN0Y19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TomidaKN19, author = {Junichi Tomida and Yuto Kawahara and Ryo Nishimaki}, title = {Fast, Compact, and Expressive Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {966}, year = {2019}, url = {https://eprint.iacr.org/2019/966}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TomidaKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/siamcomp/CohenHNVW18, author = {Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs}, title = {Watermarking Cryptographic Capabilities}, journal = {{SIAM} J. Comput.}, volume = {47}, number = {6}, pages = {2157--2202}, year = {2018}, url = {https://doi.org/10.1137/18M1164834}, doi = {10.1137/18M1164834}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/siamcomp/CohenHNVW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Attrapadung0N0Y18, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Constrained PRFs for {\textbackslash}mathrmNC{\^{}}1 in Traditional Groups}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10992}, pages = {543--574}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96881-0\_19}, doi = {10.1007/978-3-319-96881-0\_19}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Attrapadung0N0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KitagawaNT18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Obfustopia Built on Secret-Key Functional Encryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10821}, pages = {603--648}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78375-8\_20}, doi = {10.1007/978-3-319-78375-8\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KitagawaNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KitagawaNT18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, editor = {Michel Abdalla and Ricardo Dahab}, title = {Simple and Generic Constructions of Succinct Functional Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2018 - 21st {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10770}, pages = {187--217}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76581-5\_7}, doi = {10.1007/978-3-319-76581-5\_7}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KitagawaNT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Attrapadung0N0Y18, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Constrained PRFs for {NC1} in Traditional Groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {154}, year = {2018}, url = {http://eprint.iacr.org/2018/154}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Attrapadung0N0Y18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DottlingN18, author = {Nico D{\"{o}}ttling and Ryo Nishimaki}, title = {Universal Proxy Re-Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2018}, url = {https://eprint.iacr.org/2018/840}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DottlingN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidsonN18, author = {Alex Davidson and Ryo Nishimaki}, title = {A Bit-fixing {PRF} with {O(1)} Collusion-Resistance from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {890}, year = {2018}, url = {https://eprint.iacr.org/2018/890}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidsonN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNTY18, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka and Takashi Yamakawa}, title = {Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {974}, year = {2018}, url = {https://eprint.iacr.org/2018/974}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNTY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidsonKNY18, author = {Alex Davidson and Shuichi Katsumata and Ryo Nishimaki and Shota Yamada}, title = {Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {982}, year = {2018}, url = {https://eprint.iacr.org/2018/982}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidsonKNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AttrapadungMNYY18, author = {Nuttapong Attrapadung and Takahiro Matsuda and Ryo Nishimaki and Shota Yamada and Takashi Yamakawa}, title = {Adaptively Single-Key Secure Constrained PRFs for {NC1}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1000}, year = {2018}, url = {https://eprint.iacr.org/2018/1000}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AttrapadungMNYY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AbeHNOP17, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, editor = {Jonathan Katz and Hovav Shacham}, title = {Compact Structure-Preserving Signatures with Almost Tight Security}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10402}, pages = {548--580}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63715-0\_19}, doi = {10.1007/978-3-319-63715-0\_19}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AbeHNOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2017}, url = {http://eprint.iacr.org/2017/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17a, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2017}, url = {http://eprint.iacr.org/2017/361}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeHNOP17, author = {Masayuki Abe and Dennis Hofheinz and Ryo Nishimaki and Miyako Ohkubo and Jiaxin Pan}, title = {Compact Structure-preserving Signatures with Almost Tight Security}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {524}, year = {2017}, url = {http://eprint.iacr.org/2017/524}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeHNOP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitagawaNT17b, author = {Fuyuki Kitagawa and Ryo Nishimaki and Keisuke Tanaka}, title = {From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {638}, year = {2017}, url = {http://eprint.iacr.org/2017/638}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitagawaNT17b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/AbeCDKNO16, author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions}, journal = {J. Cryptol.}, volume = {29}, number = {4}, pages = {833--878}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9211-7}, doi = {10.1007/S00145-015-9211-7}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/AbeCDKNO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/NishimakiWZ16, author = {Ryo Nishimaki and Daniel Wichs and Mark Zhandry}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9666}, pages = {388--419}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49896-5\_14}, doi = {10.1007/978-3-662-49896-5\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/NishimakiWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Nishimaki16, author = {Ryo Nishimaki}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Watermarking Cryptographic Programs}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {521--543}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_28}, doi = {10.1007/978-3-319-61273-7\_28}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Nishimaki16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/stoc/CohenHNVW16, author = {Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs}, editor = {Daniel Wichs and Yishay Mansour}, title = {Watermarking cryptographic capabilities}, booktitle = {Proceedings of the 48th Annual {ACM} {SIGACT} Symposium on Theory of Computing, {STOC} 2016, Cambridge, MA, USA, June 18-21, 2016}, pages = {1115--1127}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2897518.2897651}, doi = {10.1145/2897518.2897651}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/stoc/CohenHNVW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/BitanskyNPW16, author = {Nir Bitansky and Ryo Nishimaki and Alain Passel{\`{e}}gue and Daniel Wichs}, editor = {Martin Hirt and Adam D. Smith}, title = {From Cryptomania to Obfustopia Through Secret-Key Functional Encryption}, booktitle = {Theory of Cryptography - 14th International Conference, {TCC} 2016-B, Beijing, China, October 31 - November 3, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9986}, pages = {391--418}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53644-5\_15}, doi = {10.1007/978-3-662-53644-5\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/BitanskyNPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BitanskyNPW16, author = {Nir Bitansky and Ryo Nishimaki and Alain Passel{\`{e}}gue and Daniel Wichs}, title = {From Cryptomania to Obfustopia through Secret-Key Functional Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {558}, year = {2016}, url = {http://eprint.iacr.org/2016/558}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BitanskyNPW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted {VES}}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {1}, pages = {61--98}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9986-9}, doi = {10.1007/S10623-014-9986-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Key-Private Proxy Re-Encryption from Lattices, Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {100--116}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.100}, doi = {10.1587/TRANSFUN.E98.A.100}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujisakiKNTY15, author = {Eiichiro Fujisaki and Akinori Kawachi and Ryo Nishimaki and Keisuke Tanaka and Kenji Yasunaga}, title = {Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {3}, pages = {853--862}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.853}, doi = {10.1587/TRANSFUN.E98.A.853}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FujisakiKNTY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DavidNRT15, author = {Bernardo Machado David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp}, editor = {Anja Lehmann and Stefan Wolf}, title = {Generalizing Efficient Multiparty Computation}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {15--32}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_2}, doi = {10.1007/978-3-319-17470-9\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/DavidNRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DavidNRT15, author = {Bernardo David and Ryo Nishimaki and Samuel Ranellucci and Alain Tapp}, title = {Generalizing Efficient Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {135}, year = {2015}, url = {http://eprint.iacr.org/2015/135}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DavidNRT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted {VES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2015}, url = {http://eprint.iacr.org/2015/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeDKNO15, author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2015}, url = {http://eprint.iacr.org/2015/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeDKNO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiW15, author = {Ryo Nishimaki and Daniel Wichs}, title = {Watermarking Cryptographic Programs Against Arbitrary Removal Strategies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {344}, year = {2015}, url = {http://eprint.iacr.org/2015/344}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCLNX15, author = {Nishanth Chandran and Melissa Chase and Feng{-}Hao Liu and Ryo Nishimaki and Keita Xagawa}, title = {Re-encryption, functional re-encryption, and multi-hop re-encryption: {A} framework for achieving obfuscation-based security and instantiations from lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2015}, url = {http://eprint.iacr.org/2015/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCLNX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiWZ15, author = {Ryo Nishimaki and Daniel Wichs and Mark Zhandry}, title = {Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {750}, year = {2015}, url = {http://eprint.iacr.org/2015/750}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CohenHNVW15, author = {Aloni Cohen and Justin Holmgren and Ryo Nishimaki and Vinod Vaikuntanathan and Daniel Wichs}, title = {Watermarking Cryptographic Capabilities}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1096}, year = {2015}, url = {http://eprint.iacr.org/2015/1096}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CohenHNVW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChandranCLNX14, author = {Nishanth Chandran and Melissa Chase and Feng{-}Hao Liu and Ryo Nishimaki and Keita Xagawa}, editor = {Hugo Krawczyk}, title = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: {A} Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {95--112}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_6}, doi = {10.1007/978-3-642-54631-0\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChandranCLNX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Nishimaki14, author = {Ryo Nishimaki}, title = {How to Watermark Cryptographic Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {472}, year = {2014}, url = {http://eprint.iacr.org/2014/472}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Nishimaki14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/AbeCDN13, author = {Masayuki Abe and Jan Camenisch and Maria Dubovitskaya and Ryo Nishimaki}, editor = {Thomas Gro{\ss} and Marit Hansen}, title = {Universally composable adaptive oblivious transfer (with access control) from standard assumptions}, booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity Management, Berlin, Germany, November 8, 2013}, pages = {1--12}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517881.2517883}, doi = {10.1145/2517881.2517883}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/AbeCDN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Nishimaki13, author = {Ryo Nishimaki}, editor = {Thomas Johansson and Phong Q. Nguyen}, title = {How to Watermark Cryptographic Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7881}, pages = {111--125}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38348-9\_7}, doi = {10.1007/978-3-642-38348-9\_7}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Nishimaki13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbeDKNO13, author = {Masayuki Abe and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Tagged One-Time Signatures: Tight Security and Optimal Tag Size}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {312--331}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_20}, doi = {10.1007/978-3-642-36362-7\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbeDKNO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishimakiX13, author = {Ryo Nishimaki and Keita Xagawa}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted {VES}}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {405--422}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_25}, doi = {10.1007/978-3-642-36362-7\_25}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishimakiX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiFT12, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, title = {An Efficient Non-interactive Universally Composable String-Commitment Scheme}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {167--175}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.167}, doi = {10.1587/TRANSFUN.E95.A.167}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiFT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiFT12a, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, title = {A Multi-Trapdoor Commitment Scheme from the {RSA} Assumption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {176--184}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.176}, doi = {10.1587/TRANSFUN.E95.A.176}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiFT12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AbeCDKNO12, author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {4--24}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_3}, doi = {10.1007/978-3-642-34961-4\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AbeCDKNO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AbeCDKNO12, author = {Masayuki Abe and Melissa Chase and Bernardo David and Markulf Kohlweiss and Ryo Nishimaki and Miyako Ohkubo}, title = {Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2012}, url = {http://eprint.iacr.org/2012/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AbeCDKNO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NishimakiFT10, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, editor = {Ron Steinfeld and Philip Hawkes}, title = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {182--199}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_12}, doi = {10.1007/978-3-642-14081-5\_12}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NishimakiFT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MatsudaNT10, author = {Toshihide Matsuda and Ryo Nishimaki and Keisuke Tanaka}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {{CCA} Proxy Re-Encryption without Bilinear Maps in the Standard Model}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {261--278}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_16}, doi = {10.1007/978-3-642-13013-7\_16}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/MatsudaNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MatsudaNNT09, author = {Toshihide Matsuda and Ryo Nishimaki and Akira Numayama and Keisuke Tanaka}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework}, booktitle = {Information Security and Privacy, 14th Australasian Conference, {ACISP} 2009, Brisbane, Australia, July 1-3, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5594}, pages = {343--359}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-02620-1\_24}, doi = {10.1007/978-3-642-02620-1\_24}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MatsudaNNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/NishimakiFT09, author = {Ryo Nishimaki and Eiichiro Fujisaki and Keisuke Tanaka}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Efficient Non-interactive Universally Composable String-Commitment Schemes}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {3--18}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_3}, doi = {10.1007/978-3-642-04642-1\_3}, timestamp = {Sun, 02 Jun 2019 21:26:38 +0200}, biburl = {https://dblp.org/rec/conf/provsec/NishimakiFT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/FujisakiNT09, author = {Eiichiro Fujisaki and Ryo Nishimaki and Keisuke Tanaka}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {118--128}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_11}, doi = {10.1007/978-3-642-04642-1\_11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/FujisakiNT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiMO08, author = {Ryo Nishimaki and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {Universally Composable Identity-Based Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {262--271}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.262}, doi = {10.1093/IETFEC/E91-A.1.262}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/NishimakiMO06, author = {Ryo Nishimaki and Yoshifumi Manabe and Tatsuaki Okamoto}, editor = {Phong Q. Nguyen}, title = {Universally Composable Identity-Based Encryption}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {337--353}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_23}, doi = {10.1007/11958239\_23}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/NishimakiMO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.