What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Junichi Tomida
Google Scholar
18
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
Nuttapong Attrapadung
Junichi Tomida
2024
conf/crypto
A Modular Approach to Registered ABE for Unbounded Predicates.
Nuttapong Attrapadung
Junichi Tomida
2023
conf/latincrypt
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Kohei Nakagawa
Atsushi Fujioka
Akira Nagai
Junichi Tomida
Keita Xagawa
Kan Yasuda
2023
conf/ccs
Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Gilad Asharov
Koki Hamada
Ryo Kikuchi
Ariel Nof
Benny Pinkas
Junichi Tomida
2023
conf/crypto
Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums.
Shweta Agrawal
Junichi Tomida
Anshu Yadav
2023
conf/asiaccs
Communication-Efficient Inner Product Private Join and Compute with Cardinality.
Koji Chida
Koki Hamada
Atsunori Ichikawa
Masanobu Kii
Junichi Tomida
2023
conf/eurocrypt
Unbounded Quadratic Functional Encryption and More from Pairings.
Junichi Tomida
2022
conf/ccs
Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
Gilad Asharov
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Ariel Nof
Benny Pinkas
Katsumi Takahashi
Junichi Tomida
2022
conf/tcc
Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
Shweta Agrawal
Rishab Goyal
Junichi Tomida
2021
conf/crypto
Multi-input Quadratic Functional Encryption from Pairings.
Shweta Agrawal
Rishab Goyal
Junichi Tomida
2021
conf/icisc
Revocable Hierarchical Identity-Based Authenticated Key Exchange.
Yuki Okano
Junichi Tomida
Akira Nagai
Kazuki Yoneyama
Atsushi Fujioka
Koutarou Suzuki
2021
conf/tcc
Multi-Party Functional Encryption.
Shweta Agrawal
Rishab Goyal
Junichi Tomida
2020
conf/pkc
Fast, Compact, and Expressive Attribute-Based Encryption.
Junichi Tomida
Yuto Kawahara
Ryo Nishimaki
2020
conf/asiacrypt
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
Nuttapong Attrapadung
Junichi Tomida
2019
conf/esorics
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.
Junichi Tomida
Atsushi Fujioka
Akira Nagai
Koutarou Suzuki
2019
conf/asiacrypt
Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions.
Junichi Tomida
2018
conf/pkc
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption.
Pratish Datta
Tatsuaki Okamoto
Junichi Tomida
2018
conf/asiacrypt
Unbounded Inner Product Functional Encryption from Bilinear Maps.
Junichi Tomida
Katsuyuki Takashima
Coauthors
Akira Nagai
(3)
Anshu Yadav
(1)
Ariel Nof
(2)
Atsunori Ichikawa
(1)
Atsushi Fujioka
(3)
Benny Pinkas
(2)
Dai Ikarashi
(1)
Gilad Asharov
(2)
Junichi Tomida
(18)
Kan Yasuda
(1)
Katsumi Takahashi
(1)
Katsuyuki Takashima
(1)
Kazuki Yoneyama
(1)
Keita Xagawa
(1)
Kohei Nakagawa
(1)
Koji Chida
(1)
Koki Hamada
(3)
Koutarou Suzuki
(2)
Masanobu Kii
(1)
Nuttapong Attrapadung
(3)
Pratish Datta
(1)
Rishab Goyal
(3)
Ryo Kikuchi
(2)
Ryo Nishimaki
(1)
Shweta Agrawal
(4)
Tatsuaki Okamoto
(1)
Yuki Okano
(1)
Yuto Kawahara
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to