Shuichi Katsumata
Shuichi Katsumata
Bestätigte E-Mail-Adresse bei aist.go.jp - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps
S Katsumata, S Yamada
International Conference on the Theory and Application of Cryptology and …, 2016
482016
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
S Katsumata, T Matsuda, A Takayasu
Theoretical Computer Science 809, 103-136, 2020
232020
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2019
182019
Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices
A El Kaafarani, S Katsumata
IACR International Workshop on Public Key Cryptography, 89-119, 2018
152018
Model inversion attacks for prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
2017 15th Annual Conference on Privacy, Security and Trust (PST), 115-11509, 2017
142017
Robust cost sensitive support vector machine
S Katsumata, A Takeda
Artificial intelligence and statistics, 434-443, 2015
142015
Tighter security proofs for GPV-IBE in the quantum random oracle model
S Katsumata, S Yamada, T Yamakawa
Journal of Cryptology 34 (1), 1-46, 2021
102021
Group signatures without NIZK: from lattices in the standard model
S Katsumata, S Yamada
Annual international conference on the theory and applications of …, 2019
102019
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
S Katsumata, S Yamada
IACR International Workshop on Public Key Cryptography, 158-188, 2019
102019
Constrained PRFs for Bit-fixing (and More) from OWFs with Adaptive Security and Constant Collusion Resistance
A Davidson, S Katsumata, R Nishimaki, S Yamada
Cryptology ePrint Archive, Report 2018/982, 2018. https://eprint. iacr. org …, 2019
82019
Anonymous reputation systems achieving full dynamicity from lattices
A El Kaafarani, S Katsumata, R Solomon
International Conference on Financial Cryptography and Data Security, 388-406, 2018
82018
Exploring constructions of compact NIZKs from various assumptions
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Annual International Cryptology Conference, 639-669, 2019
72019
On the untapped potential of encoding predicates by arithmetic circuits and their applications
S Katsumata
International Conference on the Theory and Application of Cryptology and …, 2017
72017
Attribute-based signatures for unbounded languages from standard assumptions
Y Sakai, S Katsumata, N Attrapadung, G Hanaoka
International Conference on the Theory and Application of Cryptology and …, 2018
62018
Lossy CSI-FiSh: Efficient signature scheme with tight reduction to decisional CSIDH-512
A El Kaafarani, S Katsumata, F Pintore
IACR International Conference on Public-Key Cryptography, 157-186, 2020
42020
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices
K Emura, S Katsumata, Y Watanabe
European symposium on research in computer security, 113-133, 2019
42019
Model inversion attacks for online prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
IEICE Transactions on Information and Systems 101 (11), 2665-2676, 2018
42018
Non-interactive zero-knowledge in pairing-free groups from weaker assumptions
G Couteau, S Katsumata, B Ursu
Annual International Conference on the Theory and Applications of …, 2020
32020
Compact NIZKs from standard assumptions on bilinear maps
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2020
32020
Scalable ciphertext compression techniques for post-quantum KEMs and their applications
S Katsumata, K Kwiatkowski, F Pintore, T Prest
International Conference on the Theory and Application of Cryptology and …, 2020
22020
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20