Attrapadung, Nuttapong; Hanaoka, Goichiro; Hiromasa, Ryo; Matsuda, Takahiro; Schuldt, Jacob C. N. Maliciously circuit-private multi-key FHE and MPC based on LWE. (English) Zbl 1512.94059 Des. Codes Cryptography 91, No. 5, 1645-1684 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Des. Codes Cryptography 91, No. 5, 1645--1684 (2023; Zbl 1512.94059) Full Text: DOI
Hayata, Junichiro; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Matsuura, Kanta On private information retrieval supporting range queries. (English) Zbl 1511.68044 Chen, Liqun (ed.) et al., Computer security – ESORICS 2020. 25th European symposium on research in computer security, ESORICS 2020, Guildford, UK, September 14–18, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12309, 674-694 (2020). MSC: 68M25 68P20 68P27 94A62 PDFBibTeX XMLCite \textit{J. Hayata} et al., Lect. Notes Comput. Sci. 12309, 674--694 (2020; Zbl 1511.68044) Full Text: DOI
Attrapadung, Nuttapong; Hanaoka, Goichiro; Hirano, Takato; Kawai, Yutaka; Koseki, Yoshihiro; Schuldt, Jacob C. N. Token-based multi-input functional encryption. (English) Zbl 1421.94036 Baek, Joonsang (ed.) et al., Provable security. 12th international conference, ProvSec 2018, Jeju, South Korea, October 25–28, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11192, 147-164 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{N. Attrapadung} et al., Lect. Notes Comput. Sci. 11192, 147--164 (2018; Zbl 1421.94036) Full Text: DOI
Morita, Hiraku; Schuldt, Jacob C. N.; Matsuda, Takahiro; Hanaoka, Goichiro; Iwata, Tetsu On the security of the Schnorr signature scheme and DSA against related-key attacks. (English) Zbl 1384.94089 Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 20-35 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{H. Morita} et al., Lect. Notes Comput. Sci. 9558, 20--35 (2016; Zbl 1384.94089) Full Text: DOI
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency. (English) Zbl 1403.94077 Theor. Comput. Sci. 630, 95-116 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Theor. Comput. Sci. 630, 95--116 (2016; Zbl 1403.94077) Full Text: DOI
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Secure multi-party computation using polarizing cards. (English) Zbl 1398.68145 Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 281-297 (2015). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 9241, 281--297 (2015; Zbl 1398.68145) Full Text: DOI
Shinagawa, Kazumasa; Mizuki, Takaaki; Schuldt, Jacob C. N.; Nuida, Koji; Kanayama, Naoki; Nishide, Takashi; Hanaoka, Goichiro; Okamoto, Eiji Multi-party computation with small shuffle complexity using regular polygon cards. (English) Zbl 1388.94078 Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 127-146 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Shinagawa} et al., Lect. Notes Comput. Sci. 9451, 127--146 (2015; Zbl 1388.94078) Full Text: DOI
Sakai, Yusuke; Emura, Keita; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Ohta, Kazuo Dynamic threshold public-key encryption with decryption consistency from static assumptions. (English) Zbl 1358.94077 Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 77-92 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Lect. Notes Comput. Sci. 9144, 77--92 (2015; Zbl 1358.94077) Full Text: DOI
Hanaoka, Goichiro; Matsuda, Takahiro; Schuldt, Jacob C. N. On the impossibility of constructing efficient key encapsulation and programmable hash functions in prime order groups. (English) Zbl 1296.94120 Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology – CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 812-831 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Hanaoka} et al., Lect. Notes Comput. Sci. 7417, 812--831 (2012; Zbl 1296.94120) Full Text: DOI
Sakai, Yusuke; Schuldt, Jacob C. N.; Emura, Keita; Hanaoka, Goichiro; Ohta, Kazuo On the security of dynamic group signatures: preventing signature hijacking. (English) Zbl 1291.94196 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 715-732 (2012). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{Y. Sakai} et al., Lect. Notes Comput. Sci. 7293, 715--732 (2012; Zbl 1291.94196) Full Text: DOI
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Schuldt, Jacob C. N.; Hanaoka, Goichiro; Kunihiro, Noboru Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication. (English) Zbl 1290.94158 Fischlin, Marc (ed.) et al., Public key cryptography – PKC 2012. 15th international conference on practice and theory in public key cryptography, Darmstadt, Germany, May 21–23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-30056-1/pbk). Lecture Notes in Computer Science 7293, 243-261 (2012). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{S. Yamada} et al., Lect. Notes Comput. Sci. 7293, 243--261 (2012; Zbl 1290.94158) Full Text: DOI
Schuldt, Jacob C. N.; Hanaoka, Goichiro Non-transferable user certification secure against authority information leaks and impersonation attacks. (English) Zbl 1428.94112 Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 6715, 413-430 (2011). MSC: 94A62 PDFBibTeX XMLCite \textit{J. C. N. Schuldt} and \textit{G. Hanaoka}, Lect. Notes Comput. Sci. 6715, 413--430 (2011; Zbl 1428.94112) Full Text: DOI