Junichi Tomida

Orcid: 0000-0001-7995-877X

According to our database1, Junichi Tomida authored at least 23 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Modular Approach to Registered ABE for Unbounded Predicates.
IACR Cryptol. ePrint Arch., 2024

Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
IACR Cryptol. ePrint Arch., 2024

2023
Attribute-Based Multi-Input FE (and more) for Attribute-Weighted Sums.
IACR Cryptol. ePrint Arch., 2023

Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Communication-Efficient Inner Product Private Join and Compute with Cardinality.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Unbounded Quadratic Functional Encryption and More from Pairings.
IACR Cryptol. ePrint Arch., 2022

Private Intersection-Weighted-Sum.
IACR Cryptol. ePrint Arch., 2022

Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
IACR Cryptol. ePrint Arch., 2022

Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
IACR Cryptol. ePrint Arch., 2022

2021
Towards Practical Inner Product Functional Encryption.
PhD thesis, 2021

Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Fast, compact, and expressive attribute-based encryption.
Des. Codes Cryptogr., 2021

Multi-Party Functional Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Revocable Hierarchical Identity-Based Authenticated Key Exchange.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

Multi-input Quadratic Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Tightly secure inner product functional encryption: Multi-input and function-hiding constructions.
Theor. Comput. Sci., 2020

Efficient Inner Product Functional Encryption with Full-Hiding Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

Multi-Input Quadratic Functional Encryption from Pairings.
IACR Cryptol. ePrint Arch., 2020

2018
Unbounded Inner Product Functional Encryption from Bilinear Maps.
IACR Cryptol. ePrint Arch., 2018

Full-Hiding (Unbounded) Multi-Input Inner Product Functional Encryption from the k-Linear Assumption.
IACR Cryptol. ePrint Arch., 2018

2016
Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security.
Proceedings of the Information Security - 19th International Conference, 2016


  Loading...