Follow
Shota Yamada
Shota Yamada
Verified email at aist.go.jp - Homepage
Title
Cited by
Cited by
Year
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011
982011
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
972014
Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps
S Katsumata, S Yamada
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
822016
Adaptively secure identity-based encryption from lattices with asymptotically shorter public parameters
S Yamada
Annual International Conference on the Theory and Applications of …, 2016
752016
Asymptotically compact adaptively secure lattice IBEs and verifiable random functions via generalized partitioning techniques
S Yamada
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
742017
Optimal broadcast encryption from pairings and LWE
S Agrawal, S Yamada
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
622020
A framework for identity-based encryption with almost tight security
N Attrapadung, G Hanaoka, S Yamada
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
602015
Duality in ABE: converting attribute based encryption for dual predicate and dual policy via computational encodings
N Attrapadung, S Yamada
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
562015
Conversions among several classes of predicate encryption and applications to ABE with various compactness tradeoffs
N Attrapadung, G Hanaoka, S Yamada
Advances in Cryptology--ASIACRYPT 2015: 21st International Conference on the …, 2015
502015
Efficient public trace and revoke from standard assumptions
S Agrawal, S Bhattacherjee, DH Phan, D Stehlé, S Yamada
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
462017
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
452012
Group signatures without NIZK: from lattices in the standard model
S Katsumata, S Yamada
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
362019
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
T Yamakawa, S Yamada, G Hanaoka, N Kunihiro
Algorithmica 79 (4), 1286-1317, 2017
362017
Attribute based encryption (and more) for nondeterministic finite automata from LWE
S Agrawal, M Maitra, S Yamada
Annual International Cryptology Conference, 765-797, 2019
332019
Tighter security proofs for GPV-IBE in the quantum random oracle model
S Katsumata, S Yamada, T Yamakawa
Journal of Cryptology 34, 1-46, 2021
312021
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
302019
Attribute-based encryption for range attributes
N Attrapadung, G Hanaoka, K Ogawa, G Ohtake, H Watanabe, S Yamada
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
272018
Constrained PRFs for in traditional groups
N Attrapadung, T Matsuda, R Nishimaki, S Yamada, T Yamakawa
Annual International Cryptology Conference, 543-574, 2018
272018
Optimal broadcast encryption from LWE and pairings in the standard model
S Agrawal, D Wichs, S Yamada
Theory of Cryptography: 18th International Conference, TCC 2020, Durham, NC …, 2020
232020
Chosen ciphertext secure keyed-homomorphic public-key encryption
K Emura, G Hanaoka, G Ohtake, T Matsuda, S Yamada
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
222013
The system can't perform the operation now. Try again later.
Articles 1–20