Follow
Keitaro Hashimoto
Title
Cited by
Cited by
Year
An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure, and deniable
K Hashimoto, S Katsumata, K Kwiatkowski, T Prest
Journal of Cryptology 35 (3), 17, 2022
462022
Unrestricted and compact certificateless aggregate signature scheme
K Hashimoto, W Ogata
Information Sciences 487, 97-114, 2019
332019
A concrete treatment of efficient continuous group key agreement via multi-recipient PKEs
K Hashimoto, S Katsumata, E Postlethwaite, T Prest, B Westerbaan
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
242021
How to hide MetaData in MLS-like secure group messaging: simple, modular, and post-quantum
K Hashimoto, S Katsumata, T Prest
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
102022
An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure and deniable
K Hashimoto, S Katsumata, K Kwiatkowski, T Prest
Cryptology ePrint Archive, Report 2021/616, 2021
6*2021
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions
S Chiku, K Hashimoto, K Hara, J Shikata
Cryptology ePrint Archive, 2023
22023
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext
K Takahashi, K Hashimoto, W Ogata
Designs, Codes and Cryptography 92 (2), 277-301, 2024
12024
A Generic Construction of Deletable Registered Attribute-Based Encryption from Slotted Registered Attribute-Based Encryption
K Asano, K Hara, K Hashimoto, N Attrapadung, Y Watanabe
2024
How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption
S Chiku, K Hara, K Hashimoto, T Tomita, J Shikata
International Conference on Cryptology and Network Security, 145-165, 2024
2024
Security Model for Authenticated Key Exchange, Reconsidered
X Zhang, K Hashimoto, W Ogata
International Conference on Security and Cryptography for Networks, 251-271, 2024
2024
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions
H Yoshioka, W Ogata, K Hashimoto
Cryptology ePrint Archive, 2024
2024
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption
K Hashimoto, W Ogata, T Tomita
Cryptology ePrint Archive, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–12