What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Shota Yamada
Google Scholar
51
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/joc
Compact NIZKs from Standard Assumptions on Bilinear Maps.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2024
conf/crypto
Attribute Based Encryption for Turing Machines from Lattices.
Shweta Agrawal
Simran Kumari
Shota Yamada
2024
conf/asiacrypt
Registered FE Beyond Predicates: (Attribute-Based) Linear Functions and More.
Pratish Datta
Tapas Pal
Shota Yamada
2024
conf/tcc
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort.
Goichiro Hanaoka
Shuichi Katsumata
Kei Kimura
Kaoru Takemure
Shota Yamada
2023
conf/crypto
Constant Input Attribute Based (and Predicate) Encryption from Evasive and Tensor LWE.
Shweta Agrawal
Mélissa Rossi
Anshu Yadav
Shota Yamada
2023
conf/fc
Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Ryuya Hayashi
Taiki Asano
Junichiro Hayata
Takahiro Matsuda
Shota Yamada
Shuichi Katsumata
Yusuke Sakai
Tadanori Teruya
Jacob C. N. Schuldt
Nuttapong Attrapadung
Goichiro Hanaoka
Kanta Matsuura
Tsutomu Matsumoto
2023
conf/eurocrypt
Broadcast, Trace and Revoke with Optimal Parameters from Polynomial Hardness.
Shweta Agrawal
Simran Kumari
Anshu Yadav
Shota Yamada
2023
conf/eurocrypt
Public Key Encryption with Secure Key Leasing.
Shweta Agrawal
Fuyuki Kitagawa
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2022
conf/crypto
Multi-input Attribute Based Encryption and Predicate Encryption.
Shweta Agrawal
Anshu Yadav
Shota Yamada
2022
conf/tcc
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Shweta Agrawal
Fuyuki Kitagawa
Anuja Modi
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2021
journals/joc
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2021
journals/joc
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model.
Shuichi Katsumata
Shota Yamada
Takashi Yamakawa
2021
conf/crypto
Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions.
Reo Eriguchi
Kazuma Ohara
Shota Yamada
Koji Nuida
2021
conf/crypto
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWE.
Shweta Agrawal
Monosij Maitra
Narasimha Sai Vempati
Shota Yamada
2021
conf/eurocrypt
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2020
conf/crypto
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.
Alex Davidson
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2020
conf/esorics
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
Goichiro Hanaoka
Misaki Komatsu
Kazuma Ohara
Yusuke Sakai
Shota Yamada
2020
conf/eurocrypt
Compact NIZKs from Standard Assumptions on Bilinear Maps.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2020
conf/eurocrypt
Optimal Broadcast Encryption from Pairings and LWE.
Shweta Agrawal
Shota Yamada
2020
conf/asiacrypt
Adaptively Secure Inner Product Encryption from LWE.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2020
conf/tcc
Optimal Broadcast Encryption from LWE and Pairings in the Standard Model.
Shweta Agrawal
Daniel Wichs
Shota Yamada
2020
conf/tcc
CP-ABE for Circuits (and More) in the Symmetric Key Setting.
Shweta Agrawal
Shota Yamada
2019
conf/crypto
Exploring Constructions of Compact NIZKs from Various Assumptions.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2019
conf/crypto
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.
Shweta Agrawal
Monosij Maitra
Shota Yamada
2019
conf/wisa
An Extended CTRT for AES-256.
SeongHan Shin
Shota Yamada
Goichiro Hanaoka
Yusuke Ishida
Atsushi Kunii
Junichi Oketani
Shimpei Kunii
Kiyoshi Tomomura
2019
conf/pkc
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR.
Shuichi Katsumata
Shota Yamada
2019
conf/pkc
Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1.
Nuttapong Attrapadung
Takahiro Matsuda
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2019
conf/eurocrypt
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.
Shuichi Katsumata
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2019
conf/eurocrypt
Group Signatures Without NIZK: From Lattices in the Standard Model.
Shuichi Katsumata
Shota Yamada
2019
conf/tcc
Attribute Based Encryption for Deterministic Finite Automata from \mathsfDLIN.
Shweta Agrawal
Monosij Maitra
Shota Yamada
2018
conf/crypto
Constrained PRFs for \mathrmNC^1 in Traditional Groups.
Nuttapong Attrapadung
Takahiro Matsuda
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2018
conf/asiacrypt
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model.
Shuichi Katsumata
Shota Yamada
Takashi Yamakawa
2017
conf/ccs
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.
Shweta Agrawal
Sanjay Bhattacherjee
Duong Hieu Phan
Damien Stehlé
Shota Yamada
2017
conf/crypto
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques.
Shota Yamada
2016
conf/crypto
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
Takashi Yamakawa
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2016
conf/acns
Attribute Based Encryption with Direct Efficiency Tradeoff.
Nuttapong Attrapadung
Goichiro Hanaoka
Tsutomu Matsumoto
Tadanori Teruya
Shota Yamada
2016
conf/eurocrypt
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters.
Shota Yamada
2016
conf/asiacrypt
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps.
Shuichi Katsumata
Shota Yamada
2015
conf/ctrsa
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.
Nuttapong Attrapadung
Shota Yamada
2015
conf/asiacrypt
A Framework for Identity-Based Encryption with Almost Tight Security.
Nuttapong Attrapadung
Goichiro Hanaoka
Shota Yamada
2015
conf/asiacrypt
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Nuttapong Attrapadung
Goichiro Hanaoka
Shota Yamada
2014
conf/crypto
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Takashi Yamakawa
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2014
conf/pkc
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
Shota Yamada
Nuttapong Attrapadung
Goichiro Hanaoka
Noboru Kunihiro
2014
conf/icics
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security.
Nuttapong Attrapadung
Goichiro Hanaoka
Shota Yamada
2013
conf/ccs
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Takashi Yamakawa
Shota Yamada
Takahiro Matsuda
Goichiro Hanaoka
Noboru Kunihiro
2013
conf/pkc
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
Keita Emura
Goichiro Hanaoka
Go Ohtake
Takahiro Matsuda
Shota Yamada
2012
conf/pkc
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Shota Yamada
Nuttapong Attrapadung
Bagus Santoso
Jacob C. N. Schuldt
Goichiro Hanaoka
Noboru Kunihiro
2012
conf/pkc
Space Efficient Signature Schemes from the RSA Assumption.
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2012
conf/ctrsa
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2011
conf/pkc
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Shota Yamada
Nuttapong Attrapadung
Goichiro Hanaoka
Noboru Kunihiro
2010
conf/provsec
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
Coauthors
Alex Davidson
(1)
Anshu Yadav
(3)
Anuja Modi
(1)
Atsushi Kunii
(1)
Bagus Santoso
(1)
Damien Stehlé
(1)
Daniel Wichs
(1)
Duong Hieu Phan
(1)
Fuyuki Kitagawa
(2)
Go Ohtake
(1)
Goichiro Hanaoka
(18)
Jacob C. N. Schuldt
(2)
Junichi Oketani
(1)
Junichiro Hayata
(1)
Kanta Matsuura
(1)
Kaoru Takemure
(1)
Kazuma Ohara
(2)
Kei Kimura
(1)
Keita Emura
(1)
Kiyoshi Tomomura
(1)
Koji Nuida
(1)
Mélissa Rossi
(1)
Misaki Komatsu
(1)
Monosij Maitra
(3)
Narasimha Sai Vempati
(1)
Noboru Kunihiro
(9)
Nuttapong Attrapadung
(11)
Pratish Datta
(1)
Reo Eriguchi
(1)
Ryo Nishimaki
(12)
Ryuya Hayashi
(1)
Sanjay Bhattacherjee
(1)
SeongHan Shin
(1)
Shimpei Kunii
(1)
Shota Yamada
(51)
Shuichi Katsumata
(15)
Shweta Agrawal
(13)
Simran Kumari
(2)
Tadanori Teruya
(2)
Taiki Asano
(1)
Takahiro Matsuda
(5)
Takashi Yamakawa
(17)
Tapas Pal
(1)
Tsutomu Matsumoto
(2)
Yusuke Ishida
(1)
Yusuke Sakai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to