2023
Improved lattice enumeration algorithms by primal and dual reordering methods.
IET Inf. Secur., January, 2023
2022
Improving Practical UC-Secure Commitments based on the DDH Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
2020
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
2018
2016
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
IACR Cryptol. ePrint Arch., 2015
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
2014
Non-malleable Multiple Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Secure Integration of Asymmetric and Symmetric Encryption Schemes.
J. Cryptol., 2013
2012
A Multi-Trapdoor Commitment Scheme from the RSA Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
An Efficient Non-interactive Universally Composable String-Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Sub-Linear Size Traceable Ring Signatures without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
A Framework for Efficient Fully-Equipped UC Commitments.
IACR Cryptol. ePrint Arch., 2012
New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Efficient Non-interactive Universally Composable String-Commitment Schemes.
Proceedings of the Provable Security, Third International Conference, 2009
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.
Proceedings of the Provable Security, Third International Conference, 2009
2008
Traceable Ring Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007
2006
Plaintext Simulatability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006
2004
RSA-OAEP Is Secure under the RSA Assumption.
J. Cryptol., 2004
2002
A Simple Approach to Secretly Sharing a Factoring Witness in a Publicly-Verifiable Manner.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order.
Proceedings of the Advances in Cryptology, 2002
2001
An Integer Commitment Scheme based on Groups with Hidden Order.
IACR Cryptol. ePrint Arch., 2001
1999
How to Enhance the Security of Public-Key Encryption at Minimum Cost.
Proceedings of the Public Key Cryptography, 1999
1998
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
1997
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations.
Proceedings of the Advances in Cryptology, 1997
1996
Practical Escrow Cash System.
Proceedings of the Security Protocols, 1996
How to Date Blind Signatures.
Proceedings of the Advances in Cryptology, 1996
1992
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z<sub>n</sub>.
Proceedings of the Advances in Cryptology, 1992