Masayuki Fukumitsu
According to our database1,
Masayuki Fukumitsu
authored at least 31 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
On Multi-user Security of Lattice-based Signature under Adaptive Corruptions and Key Leakages.
IACR Cryptol. ePrint Arch., 2024
2023
Int. J. Netw. Comput., 2023
Int. J. Netw. Comput., 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, 2023
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023
2022
Int. J. Netw. Comput., 2022
Group Signatures with Designated Traceability over Openers' Attributes in Bilinear Groups.
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022
2021
Int. J. Netw. Comput., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Impossibility on the Schnorr Signature from the One-More DL Assumption in the Non-Programmable Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
A Lattice-based Provably Secure Multisignature Scheme in Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Security and Trust Management - 17th International Workshop, 2021
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
2019
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019
2018
Black-Box Separations on Fiat-Shamir-Type Signatures in the Non-Programmable Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
A Galindo-Garcia-Like Identity-Based Signature with Tight Security Reduction, Revisited.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018
2017
Impossibility of the Provable Security of the Schnorr Signature from the One-More DL Assumption in the Non-programmable Random Oracle Model.
Proceedings of the Provable Security, 2017
A Method for Constructing an Autonomous Decentralized P2P Storage with High Confidentiality and Reliability.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
Proceedings of the Fifth International Symposium on Computing and Networking, 2017
A Proposal of a Secure P2P-Type Storage Scheme by Using the Secret Sharing and the Blockchain.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Impossibility on the Provable Security of the Fiat-Shamir-Type Signatures in the Non-programmable Random Oracle Model.
Proceedings of the Information Security - 19th International Conference, 2016
A generic construction of tight security signatures in the non-programmable random oracle model.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
A Proposal of a Password Manager Satisfying Security and Usability by Using the Secret Sharing and a Personal Server.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2010
A Proposal of an Associating Image-Based Password Creating Method and a Development of a Password Creating Support System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010