Fuyuki Kitagawa
According to our database1,
Fuyuki Kitagawa
authored at least 40 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
2022
J. Cryptol., 2022
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
IACR Cryptol. ePrint Arch., 2022
2021
J. Cryptol., 2021
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Provable Security, 2018
2017
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2017
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
Proceedings of the Topics in Cryptology, 2015
2014
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014