Masayuki Tezuka

Orcid: 0009-0003-5260-3372

According to our database1, Masayuki Tezuka authored at least 13 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
On the Relationship between FuncCPA and FuncCPA+.
IACR Cryptol. ePrint Arch., 2024

Universally Composable Relaxed Asymmetric Password-Authenticated Key Exchange.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

2023
Forward Secure Message Franking with Updatable Reporting Tags.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

Quantum Search-to-Decision Reduction for the LWE Problem.
IACR Cryptol. ePrint Arch., 2023

1-out-of-n Oblivious Signatures: Security Revisited and a Generic Construction with an Efficient Communication Cost.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

2022
Pointcheval-Sanders Signature-Based Synchronized Aggregate Signature.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

2021
Redactable Signature with Compactness from Set-Commitment.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Watermarkable Signature with Computational Function Preserving.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Forward Secure Message Franking.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Security Definitions on Time-Lock Puzzles.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
A t-out-of-n Redactable Signature Scheme.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Weakened Random Oracle Models with Target Prefix.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2018


  Loading...