Nuttapong Attrapadung

Orcid: 0000-0003-4116-1751

According to our database1, Nuttapong Attrapadung authored at least 81 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Privacy-Preserving Verifiable CNNs.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Maliciously circuit-private multi-key FHE and MPC based on LWE.
Des. Codes Cryptogr., May, 2023

Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.
IACR Cryptol. ePrint Arch., 2023

Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials.
IACR Cryptol. ePrint Arch., 2023

Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
IACR Cryptol. ePrint Arch., 2023

Two-Dimensional Dynamic Fusion for Continuous Authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Proc. Priv. Enhancing Technol., 2022

Secure Parallel Computation on Privately Partitioned Data and Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Oblivious Linear Group Actions and Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

2019
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019

Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2019

MOBIUS: Model-Oblivious Binarized Neural Networks.
IEEE Access, 2019

Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Client-Aided Two-Party Secure Interval Test Protocol.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Practical attribute-based signature schemes for circuits from bilinear map.
IET Inf. Secur., 2018

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Attribute-Based Encryption for Range Attributes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018

Adaptively Single-Key Secure Constrained PRFs for NC1.
IACR Cryptol. ePrint Arch., 2018

Constrained PRFs for NC1 in Traditional Groups.
IACR Cryptol. ePrint Arch., 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Tree-based Secure Comparison of Secret Shared Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Embedding Lemmas for Functional Encryption.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Constant-Round Client-Aided Secure Comparison Protocol.
Proceedings of the Computer Security, 2018

Constrained PRFs for \mathrmNC^1 in Traditional Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Private Similarity Searchable Encryption for Euclidean Distance.
IEICE Trans. Inf. Syst., 2017

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits.
IACR Cryptol. ePrint Arch., 2017

2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016

Attribute-Based Signatures for Circuits from Bilinear Map.
IACR Cryptol. ePrint Arch., 2016

Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Attribute Based Encryption with Direct Efficiency Tradeoff.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Privacy-preserving search for chemical compound databases.
BMC Bioinform., December, 2015

A Framework for Identity-Based Encryption with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2015

Dual System Encryption Framework in Prime-Order Groups.
IACR Cryptol. ePrint Arch., 2015

Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.
IACR Cryptol. ePrint Arch., 2015

Conversions among Several Classes of Predicate Encryption and Their Applications.
IACR Cryptol. ePrint Arch., 2015

Revocable Group Signature with Constant-Size Revocation List.
Comput. J., 2015

Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2014

Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps.
IACR Cryptol. ePrint Arch., 2014

Dual System Encryption via Doubly Selective Security: Framework, Fully-secure Functional Encryption for Regular Languages, and More.
IACR Cryptol. ePrint Arch., 2014

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Attribute-based encryption schemes with constant-size ciphertexts.
Theor. Comput. Sci., 2012

Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
J. Math. Cryptol., 2012

Time-Specific Encryption from Forward-Secure Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Computing on Authenticated Data: New Privacy Definitions and Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Homomorphic Network Coding Signatures in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

2010
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Proceedings of the Public Key Cryptography, 2010

2009
Conjunctive Broadcast and Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography, 2009

Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes.
Proceedings of the Cryptography and Coding, 2009

Dual-Policy Attribute Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008

A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low.
Proceedings of the Progress in Cryptology, 2008

2007
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Efficient Identity-Based Encryption with Tight Security Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007

Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

2006
Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2006

2005
Relations Among Notions of Security for Identity Based Encryption Schemes.
IACR Cryptol. ePrint Arch., 2005

Efficient Identity-Based Encryption with Tight Security Reduction.
IACR Cryptol. ePrint Arch., 2005

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Proceedings of the Advances in Cryptology, 2005

2003
Broadcast encryption with short keys and transmissions.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003


  Loading...