Yusuke Sakai
Orcid: 0000-0002-5115-8292Affiliations:
- National Institute of Advanced Industrial Science and Technology, AIST, Japan
According to our database1,
Yusuke Sakai
authored at least 57 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Financial Cryptography and Data Security, 2023
2022
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst., November, 2022
Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic Proofs.
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
Proceedings of the Attacks and Defenses for the Internet-of-Things, 2022
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Proceedings of the Applied Cryptography and Network Security Workshops, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch., 2020
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019
2018
IET Inf. Secur., 2018
IEICE Trans. Inf. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Provable Security, 2018
A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Int. J. Inf. Sec., 2014
Privacy-preserving smart metering with verifiability for both billing and energy management.
Proceedings of the ASIAPKC'14, 2014
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
2011
J. Internet Serv. Inf. Secur., 2011
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Advances in Information and Computer Security, 2011
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
2010
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Advances in Information and Computer Security, 2010