What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yusuke Sakai
Google Scholar
28
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiapkc
On Key Substitution Attacks against Aggregate Signatures and Multi-Signatures.
Yuuki Fujita
Yusuke Sakai
Kyosuke Yamashita
Goichiro Hanaoka
2025
conf/esorics
Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures.
Nuttapong Attrapadung
Goichiro Hanaoaka
Ryo Hiromasa
Yoshihiro Koseki
Takahiro Matsuda
Yutaro Nishida
Yusuke Sakai
Jacob C. N. Schuldt
Satoshi Yasuda
2024
conf/fc
Anonymous Reputation Systems with Revocation, Revisited.
Ryuya Hayashi
Shuichi Katsumata
Yusuke Sakai
2024
conf/acns
Privacy-Preserving Verifiable CNNs.
Nuttapong Attrapadung
Goichiro Hanaoka
Ryo Hiromasa
Yoshihiro Koseki
Takahiro Matsuda
Yutaro Nishida
Yusuke Sakai
Jacob C. N. Schuldt
Satoshi Yasuda
2023
conf/fc
Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Ryuya Hayashi
Taiki Asano
Junichiro Hayata
Takahiro Matsuda
Shota Yamada
Shuichi Katsumata
Yusuke Sakai
Tadanori Teruya
Jacob C. N. Schuldt
Nuttapong Attrapadung
Goichiro Hanaoka
Kanta Matsuura
Tsutomu Matsumoto
2023
conf/asiacrypt
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions.
Shuichi Katsumata
Michael Reichle
Yusuke Sakai
2021
conf/acns
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
Ryu Ishii
Kyosuke Yamashita
Yusuke Sakai
Takahiro Matsuda
Tadanori Teruya
Goichiro Hanaoka
Kanta Matsuura
Tsutomu Matsumoto
2020
conf/provsec
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
Kaoru Takemure
Yusuke Sakai
Bagus Santoso
Goichiro Hanaoka
Kazuo Ohta
2020
conf/esorics
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
Goichiro Hanaoka
Misaki Komatsu
Kazuma Ohara
Yusuke Sakai
Shota Yamada
2019
conf/ccs
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
Ai Ishida
Yusuke Sakai
Keita Emura
Goichiro Hanaoka
Keisuke Tanaka
2019
conf/ccs
Recent Advances in Attribute-Based Signatures.
Yusuke Sakai
2019
conf/acisp
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
Ryo Kikuchi
Nuttapong Attrapadung
Koki Hamada
Dai Ikarashi
Ai Ishida
Takahiro Matsuda
Yusuke Sakai
Jacob C. N. Schuldt
2019
conf/iwsec
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions.
Junichiro Hayata
Fuyuki Kitagawa
Yusuke Sakai
Goichiro Hanaoka
Kanta Matsuura
2018
conf/ccs
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Nuttapong Attrapadung
Goichiro Hanaoka
Shigeo Mitsunari
Yusuke Sakai
Kana Shimizu
Tadanori Teruya
2018
conf/provsec
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Satoshi Yasuda
Yoshihiro Koseki
Yusuke Sakai
Fuyuki Kitagawa
Yutaka Kawai
Goichiro Hanaoka
2018
conf/asiacrypt
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
Yusuke Sakai
Shuichi Katsumata
Nuttapong Attrapadung
Goichiro Hanaoka
2016
conf/pkc
Attribute-Based Signatures for Circuits from Bilinear Map.
Yusuke Sakai
Nuttapong Attrapadung
Goichiro Hanaoka
2016
conf/iwsec
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Takato Hirano
Mitsuhiro Hattori
Yutaka Kawai
Nori Matsuda
Mitsugu Iwamoto
Kazuo Ohta
Yusuke Sakai
Tatsuji Munaka
2016
conf/cans
Group Signature with Deniability: How to Disavow a Signature.
Ai Ishida
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
Keisuke Tanaka
2015
conf/ccs
Disavowable Public Key Encryption with Non-interactive Opening.
Ai Ishida
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
Keisuke Tanaka
2015
conf/acisp
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Yusuke Sakai
Keita Emura
Jacob C. N. Schuldt
Goichiro Hanaoka
Kazuo Ohta
2014
conf/ccs
Privacy-preserving smart metering with verifiability for both billing and energy management.
Kazuma Ohara
Yusuke Sakai
Fumiaki Yoshida
Mitsugu Iwamoto
Kazuo Ohta
2014
conf/acns
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Nuttapong Attrapadung
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
2013
conf/ccs
A group signature scheme with unbounded message-dependent opening.
Kazuma Ohara
Yusuke Sakai
Keita Emura
Goichiro Hanaoka
2012
conf/pkc
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
Yusuke Sakai
Jacob C. N. Schuldt
Keita Emura
Goichiro Hanaoka
Kazuo Ohta
2011
conf/iwsec
Towards Restricting Plaintext Space in Public Key Encryption.
Yusuke Sakai
Keita Emura
Goichiro Hanaoka
Yutaka Kawai
Kazumasa Omote
2010
conf/iwsec
Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
2010
conf/iwsec
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
Yusuke Sakai
Goichiro Hanaoka
Kaoru Kurosawa
Kazuo Ohta
Coauthors
Ai Ishida
(4)
Bagus Santoso
(1)
Dai Ikarashi
(1)
Fumiaki Yoshida
(1)
Fuyuki Kitagawa
(2)
Goichiro Hanaoaka
(1)
Goichiro Hanaoka
(21)
Jacob C. N. Schuldt
(6)
Junichiro Hayata
(2)
Kana Shimizu
(1)
Kanta Matsuura
(3)
Kaoru Kurosawa
(1)
Kaoru Takemure
(1)
Kazuma Ohara
(3)
Kazumasa Omote
(1)
Kazuo Ohta
(6)
Keisuke Tanaka
(3)
Keita Emura
(9)
Koki Hamada
(1)
Kyosuke Yamashita
(2)
Michael Reichle
(1)
Misaki Komatsu
(1)
Mitsugu Iwamoto
(2)
Mitsuhiro Hattori
(1)
Nori Matsuda
(1)
Nuttapong Attrapadung
(8)
Ryo Hiromasa
(2)
Ryo Kikuchi
(1)
Ryu Ishii
(1)
Ryuya Hayashi
(2)
Satoshi Yasuda
(3)
Shigeo Mitsunari
(1)
Shota Yamada
(2)
Shuichi Katsumata
(4)
Tadanori Teruya
(3)
Taiki Asano
(1)
Takahiro Matsuda
(5)
Takato Hirano
(1)
Tatsuji Munaka
(1)
Tsutomu Matsumoto
(2)
Yoshihiro Koseki
(3)
Yusuke Sakai
(28)
Yutaka Kawai
(3)
Yutaro Nishida
(2)
Yuuki Fujita
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to