Keisuke Tanaka
Orcid: 0000-0003-1330-4495
According to our database1,
Keisuke Tanaka
authored at least 145 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023
Auditable Attribute-Based Credentials Scheme and Its Applications in Contact Tracing.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2022
J. Cryptol., 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Generic transformation from broadcast encryption to round-optimal deniable ring authentication.
Des. Codes Cryptogr., 2022
Environmental Adaptive Privacy Preserving Contact Tracing System: A Construction From Public Key Rerandomizable BLS Signatures.
IEEE Access, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
J. Cryptol., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Artif. Life Robotics, 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
Environmental Adaptive Privacy Preserving Contact Tracing System for Respiratory Infectious Diseases.
Proceedings of the Cyberspace Safety and Security - 13th International Symposium, 2021
2020
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Artif. Life Robotics, 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019
Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019
2018
Performance analysis of robust watermarking using linear and nonlinear feature matching.
Multim. Tools Appl., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
2017
An image zero-watermarking algorithm based on the encryption of visual map feature with watermark information.
Multim. Tools Appl., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2017
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction.
Comput. J., 2017
Proceedings of the Post-Quantum Cryptography - 8th International Workshop, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
Generic transformations for existentially unforgeable signature schemes in the bounded leakage model.
Secur. Commun. Networks, 2016
Multim. Tools Appl., 2016
How to Obtain Fully Structure-Preserving (Automorphic) Signatures from Structure-Preserving Ones.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Lower Bounds for Key Length of k-wise Almost Independent Permutations and Certain Symmetric-Key Encryption Schemes.
Proceedings of the Advances in Information and Computer Security, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Blind Watermarking using QIM and the Quantized SVD Domain based on the <i>q-</i>Logarithm Function.
Proceedings of the VISAPP 2015, 2015
Proceedings of the 2015 Seventh International Conference on Knowledge and Systems Engineering, 2015
Proceedings of the Topics in Cryptology, 2015
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Leakage Resiliency.
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the 25th IEEE Annual International Symposium on Personal, 2014
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
2013
Approximation and parameterized algorithms for common subtrees and edit distance between unordered trees.
Theor. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Theory and Applications of Models of Computation, 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the 2013 IEEE International Solid-State Circuits Conference, 2013
Proceedings of the Topics in Cryptology - CT-RSA 2013, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Reduction-Centric Non-programmable Security Proof for the Full Domain Hash in the Random Oracle Model.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
J. Internet Serv. Inf. Secur., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Characterization of the relations between information-theoretic non-malleability, secrecy, and authenticity.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Public Key Cryptography, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
Proceedings of the Public Key Cryptography, 2008
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Proceedings of the IEEE Virtual Reality Conference, 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Information Security Applications, 7th International Workshop, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
Inf. Process. Lett., 2004
Proceedings of the Public Key Cryptography, 2004
2003
New Gener. Comput., 2003
Proceedings of the Intelligent Agents and Multi-Agent Systems, 2003
Mimicry: Another Approach for Interactive Comedy.
Proceedings of the 4th International Conference on Intelligent Games and Simulation (GAME-ON 2003), 2003
2002
2000
1999
Minimizing maximum absolute lateness and range of lateness under generalizeddue dates on a single machine.
Ann. Oper. Res., 1999
1998
1996
Inf. Process. Lett., 1996
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996
1995
IEICE Trans. Inf. Syst., 1995
Proceedings of the Twenty-Seventh Annual ACM Symposium on Theory of Computing, 1995
1994
Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, 1994