Author of the publication

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.

, , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (9): 1101-1117 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage., , , and . CODASPY, page 312-323. ACM, (2022)How to Make a Secure Index for Searchable Symmetric Encryption, Revisited., , , , , , and . IACR Cryptol. ePrint Arch., (2021)Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition., , , , and . ESORICS (2), volume 12309 of Lecture Notes in Computer Science, page 65-85. Springer, (2020)Generalizing the SPDZ Compiler For Other Protocols., , , , , , and . ACM Conference on Computer and Communications Security, page 880-895. ACM, (2018)How to Choose Suitable Secure Multiparty Computation Using Generalized SPDZ., , , , , and . ACM Conference on Computer and Communications Security, page 2198-2200. ACM, (2018)Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (9): 1079-1090 (2019)Privacy-preserving smart metering with verifiability for both billing and energy management., , , , and . AsiaPKC@AsiaCCS, page 23-32. ACM, (2014)Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization., , , , and . AsiaCCS, page 858-872. ACM, (2022)Efficient Two-Party Exponentiation from Quotient Transfer., , , , and . ACNS, volume 13269 of Lecture Notes in Computer Science, page 643-662. Springer, (2022)High-Throughput Semi-Honest Secure Three-Party Computation with an Honest Majority., , , , and . ACM Conference on Computer and Communications Security, page 805-817. ACM, (2016)