フォロー
Katsuyuki Takashima
Katsuyuki Takashima
確認したメール アドレス: waseda.jp
タイトル
引用先
引用先
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
EUROCRYPT 2010, 62-91, 2010
16402010
Fully secure functional encryption with general relations from the decisional linear assumption
T Okamoto, K Takashima
CRYPTO 2010, 191-208, 2010
6302010
Hierarchical predicate encryption for inner-products
T Okamoto, K Takashima
ASIACRYPT 2009, 214-231, 2009
3742009
Efficient attribute-based signatures for non-monotone predicates in the standard model
T Okamoto, K Takashima
IEEE Transactions on Cloud Computing 2 (4), 409-421, 2014
2302014
Adaptively attribute-hiding (hierarchical) inner product encryption
T Okamoto, K Takashima
EUROCRYPT 2012, 591-608, 2012
2232012
Fully secure unbounded inner-product and attribute-based encryption
T Okamoto, K Takashima
ASIACRYPT 2012, 349-366, 2012
2222012
Homomorphic encryption and signatures from vector decomposition
T Okamoto, K Takashima
International conference on pairing-based cryptography, 57-74, 2008
1732008
Decentralized attribute-based signatures
T Okamoto, K Takashima
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
1712013
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
T Okamoto, K Takashima
Designs, Codes and Cryptography 77, 725-771, 2015
1582015
Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
K Takashima
SCN 2014, 298-317, 2014
462014
Efficient algorithms for isogeny sequences and their cryptographic applications
K Takashima
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math …, 2018
302018
Fully-anonymous functional proxy-re-encryption
Y Kawai, K Takashima
Cryptology ePrint Archive, 2013
302013
Predicate-and attribute-hiding inner product encryption in a public key setting
Y Kawai, K Takashima
International Conference on Pairing-Based Cryptography, 113-130, 2013
282013
Supersingular isogeny Diffie–Hellman authenticated key exchange
A Fujioka, K Takashima, S Terada, K Yoneyama
Information Security and Cryptology–ICISC 2018: 21st International …, 2019
262019
Scaling security of elliptic curves with fast pairing using efficient endomorphisms
K Takashima
IEICE transactions on fundamentals of electronics, communications and …, 2007
232007
Efficient (hierarchical) inner-product encryption tightly reduced from the decisional linear assumption
T Okamoto, K Takashima
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
222013
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders
K Takashima, A Takayasu
International Conference on Provable Security - ProvSec 2015, 412-431, 2015
202015
Adaptively attribute-hiding (hierarchical) inner product encryption
T Okamoto, K Takashima
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
182016
Provably-secure cancelable biometrics using 2-DNF evaluation
M Hattori, N Matsuda, T Ito, Y Shibata, K Takashima, T Yoneda
Information and Media Technologies 7 (2), 749-760, 2012
182012
Efficiently computable distortion maps for supersingular curves
K Takashima
International Algorithmic Number Theory Symposium - ANTS VIII, 88-101, 2008
172008
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20