Yusuke Sakai

Orcid: 0000-0002-5115-8292

Affiliations:
  • National Institute of Advanced Industrial Science and Technology, AIST, Japan


According to our database1, Yusuke Sakai authored at least 57 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2024

On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures.
IACR Cryptol. ePrint Arch., 2024

Privacy-Preserving Verifiable CNNs.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters.
IACR Cryptol. ePrint Arch., 2023

Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022

Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic Proofs.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022

2021
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Fully Anonymous Group Signature with Verifier-Local Revocation.
IACR Cryptol. ePrint Arch., 2021

Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021

2020
Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020

Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019

Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
IACR Cryptol. ePrint Arch., 2019

Recent Advances in Attribute-Based Signatures.
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019

2018
Practical attribute-based signature schemes for circuits from bilinear map.
IET Inf. Secur., 2018

Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening.
IEICE Trans. Inf. Syst., 2018

Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018

Fully Anonymous Group Signature with Verifier-Local Revocation.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Proceedings of the Provable Security, 2018

A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017

Group Signature with Deniability: How to Disavow a Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016

Attribute-Based Signatures for Circuits from Bilinear Map.
IACR Cryptol. ePrint Arch., 2016

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016

2015
Disavowable Public Key Encryption with Non-Interactive Opening.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Revocable Group Signature with Constant-Size Revocation List.
Comput. J., 2015

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec., 2014

Privacy-preserving smart metering with verifiability for both billing and energy management.
Proceedings of the ASIAPKC'14, 2014

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Methods for Restricting Message Space in Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A group signature scheme with unbounded message-dependent opening.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
IACR Cryptol. ePrint Arch., 2012

Group Signatures with Message-Dependent Opening.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

2011
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems.
J. Internet Serv. Inf. Secur., 2011

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Towards Restricting Plaintext Space in Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Proceedings of the Advances in Information and Computer Security, 2010

Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
Proceedings of the Advances in Information and Computer Security, 2010


  Loading...