Toi Tomita

Orcid: 0000-0002-8449-1753

According to our database1, Toi Tomita authored at least 13 papers between 2019 and 2025.

Collaborative distances:

Timeline

2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
2
1
2
1
1
2
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
How to use your brain for cryptography without trustworthy machines.
IACR Cryptol. ePrint Arch., 2025

Homomorphic Signature With Designated Evaluator.
IEEE Access, 2025

2024
Compact and Tightly Secure (Anonymous) IBE from Module LWE in the QROM.
IACR Cryptol. ePrint Arch., 2024

Efficient Identity-Based Encryption with Tight Adaptive Anonymity from RLWE.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Direct computation of branching programs and its applications to more efficient lattice-based cryptography.
Des. Codes Cryptogr., February, 2023

Compact Signature Aggregation from Module-Lattices.
IACR Cryptol. ePrint Arch., 2023

Lattice-Based Multi-entity Identification Protocols.
Proceedings of the Mobile Internet Security - 7th International Conference, 2023

2022
Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2020
CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

2019
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions.
IACR Cryptol. ePrint Arch., 2019

Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption.
IACR Cryptol. ePrint Arch., 2019

CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions.
Proceedings of the Advances in Information and Computer Security, 2019


  Loading...