An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure, and deniable K Hashimoto, S Katsumata, K Kwiatkowski, T Prest Journal of Cryptology 35 (3), 17, 2022 | 46 | 2022 |
Unrestricted and compact certificateless aggregate signature scheme K Hashimoto, W Ogata Information Sciences 487, 97-114, 2019 | 33 | 2019 |
A concrete treatment of efficient continuous group key agreement via multi-recipient PKEs K Hashimoto, S Katsumata, E Postlethwaite, T Prest, B Westerbaan Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 24 | 2021 |
How to hide MetaData in MLS-like secure group messaging: simple, modular, and post-quantum K Hashimoto, S Katsumata, T Prest Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 10 | 2022 |
An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure and deniable K Hashimoto, S Katsumata, K Kwiatkowski, T Prest Cryptology ePrint Archive, Report 2021/616, 2021 | 6* | 2021 |
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions S Chiku, K Hashimoto, K Hara, J Shikata Cryptology ePrint Archive, 2023 | 2 | 2023 |
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext K Takahashi, K Hashimoto, W Ogata Designs, Codes and Cryptography 92 (2), 277-301, 2024 | 1 | 2024 |
A Generic Construction of Deletable Registered Attribute-Based Encryption from Slotted Registered Attribute-Based Encryption K Asano, K Hara, K Hashimoto, N Attrapadung, Y Watanabe | | 2024 |
How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption S Chiku, K Hara, K Hashimoto, T Tomita, J Shikata International Conference on Cryptology and Network Security, 145-165, 2024 | | 2024 |
Security Model for Authenticated Key Exchange, Reconsidered X Zhang, K Hashimoto, W Ogata International Conference on Security and Cryptography for Networks, 251-271, 2024 | | 2024 |
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions H Yoshioka, W Ogata, K Hashimoto Cryptology ePrint Archive, 2024 | | 2024 |
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption K Hashimoto, W Ogata, T Tomita Cryptology ePrint Archive, 2019 | | 2019 |