Akinori Kawachi

According to our database1, Akinori Kawachi authored at least 43 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Threshold-Blind Signature Scheme and Its Application in Blockchain-Based Systems.
IEEE Access, 2024

2023
Quantum Query Lower Bounds for Key Recovery Attacks on the Even-Mansour Cipher.
Proceedings of the Computing and Combinatorics - 29th International Conference, 2023

2021
Randomness Bounds for Private Simultaneous Messages and Conditional Disclosure of Secrets.
IACR Cryptol. ePrint Arch., 2021

Communication Complexity of Private simultaneous Quantum Messages Protocols.
IACR Cryptol. ePrint Arch., 2021

Recent Progress in Private Simultaneous Messages Protocols.
Proceedings of the IEEE Information Theory Workshop, 2021

2020
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Hamming Weight of Product of Random Sparse Polynomials.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Secure Primitive for Big Data Utilization.
Proceedings of the Security Infrastructure Technology for Integrated Utilization of Big Data, 2020

2019
Generalized predecessor existence problems for Boolean finite dynamical systems on directed graphs.
Theor. Comput. Sci., 2019

Quantum Query Complexity of Unitary Operator Discrimination.
IEICE Trans. Inf. Syst., 2019

String commitment scheme with low output locality.
Proceedings of the 14th Asia Joint Conference on Information Security, 2019

2018
Circuit lower bounds from learning-theoretic approaches.
Theor. Comput. Sci., 2018

2017
The Query Complexity of Witness Finding.
Theory Comput. Syst., 2017

General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction.
Comput. J., 2017

Generalized Predecessor Existence Problems for Boolean Finite Dynamical Systems.
Proceedings of the 42nd International Symposium on Mathematical Foundations of Computer Science, 2017

2016
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes.
Proceedings of the Advances in Information and Computer Security, 2016

2015
A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes.
IEICE Trans. Inf. Syst., 2015

Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

2013
Hard Functions for Low-Degree Polynomials over Prime Fields.
ACM Trans. Comput. Theory, 2013

2012
Computational Indistinguishability Between Quantum States and Its Cryptographic Application.
J. Cryptol., 2012

Estimating the Gowers Norm of Modulo Functions over Prime Fields.
IEICE Trans. Inf. Syst., 2012

Query Complexity and Error Tolerance of Witness Finding Algorithms.
Electron. Colloquium Comput. Complex., 2012

Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability.
Proceedings of the Advances in Information and Computer Security, 2012

2011
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity.
IACR Cryptol. ePrint Arch., 2011

Derandomizing Arthur-Merlin Games and Approximate Counting Implies Exponential-Size Lower Bounds.
Comput. Complex., 2011

2010
Quantum Hardcore Functions by Complexity-Theoretical Quantum List Decoding.
SIAM J. Comput., 2010

Security of Encryption Schemes in Weakened Random Oracle Models.
IACR Cryptol. ePrint Arch., 2010

2009
Strong Hardness Preserving Reduction from a P-Samplable Distribution to the Uniform Distribution for NP-Search Problems.
Electron. Colloquium Comput. Complex., 2009

Derandomizing Arthur-Merlin Games and Approximate Counting Implies Exponential-Size Lower Bounds.
Electron. Colloquium Comput. Complex., 2009

2008
Quantum measurements for hidden subgroup problems with optimal sample complexity.
Quantum Inf. Comput., 2008

On the Power of Quantum Encryption Keys.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
Proceedings of the Advances in Cryptology, 2008

2007
Improved algorithms for quantum identification of Boolean oracles.
Theor. Comput. Sci., 2007

Multi-bit Cryptosystems Based on Lattice Problems.
Proceedings of the Public Key Cryptography, 2007

2006
Progress in Quantum Computational Cryptography.
J. Univers. Comput. Sci., 2006

Quantum Biased Oracles.
Inf. Media Technol., 2006

2005
Universal test for quantum one-way permutations.
Theor. Comput. Sci., 2005

Quantum Sampling for Balanced Allocations.
IEICE Trans. Inf. Syst., 2005

Compact Routing with Stretch Factor of Less Than Three.
IEICE Trans. Inf. Syst., 2005

2004
Quantum Identification of Boolean Oracles.
Proceedings of the STACS 2004, 2004

Approximated Two Choices in Randomized Load Balancing.
Proceedings of the Algorithms and Computation, 15th International Symposium, 2004

2003
A New Quantum Claw-finding Algorithm for Three Functions.
New Gener. Comput., 2003

2000
Compact routing with stretch factor of less than three (brief announcement).
Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, 2000


  Loading...