Eiichiro Fujisaki

According to our database1, Eiichiro Fujisaki authored at least 34 papers between 1992 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2018
All-But-Many Encryption.
J. Cryptol., 2018

2017
A Constant-Size Signature Scheme with Tighter Reduction from CDH Assumption.
Proceedings of the Information Security - 20th International Conference, 2017

2016
Improving Practical UC-Secure Commitments Based on the DDH Assumption.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
IACR Cryptol. ePrint Arch., 2015

Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
Non-malleable Multiple Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2012
An Efficient Non-interactive Universally Composable String-Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Framework for Efficient Fully-Equipped UC Commitments.
IACR Cryptol. ePrint Arch., 2012

New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Sub-linear Size Traceable Ring Signatures without Random Oracles.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

2010
A Multi-trapdoor Commitment Scheme from the RSA Assumption.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Efficient Non-interactive Universally Composable String-Commitment Schemes.
Proceedings of the Provable Security, Third International Conference, 2009

On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.
Proceedings of the Provable Security, Third International Conference, 2009

2007
Security of ESIGN-PSS.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IACR Cryptol. ePrint Arch., 2007

Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007

Traceable Ring Signature.
Proceedings of the Public Key Cryptography, 2007

2006
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006

2004
Plaintext-Simulatability.
IACR Cryptol. ePrint Arch., 2004

2002
A Simple Approach to Secretly Sharing a Factoring Witness in a Publicly-Verifiable Manner.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order.
Proceedings of the Advances in Cryptology, 2002

2001
An Integer Commitment Scheme based on Groups with Hidden Order.
IACR Cryptol. ePrint Arch., 2001

RSA-OAEP Is Secure under the RSA Assumption.
Proceedings of the Advances in Cryptology, 2001

1999
How to Enhance the Security of Public-Key Encryption at Minimum Cost.
Proceedings of the Public Key Cryptography, 1999

Secure Integration of Asymmetric and Symmetric Encryption Schemes.
Proceedings of the Advances in Cryptology, 1999

1998
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations.
Proceedings of the Advances in Cryptology, 1997

1996
Practical Escrow Cash System.
Proceedings of the Security Protocols, 1996

How to Date Blind Signatures.
Proceedings of the Advances in Cryptology, 1996

1992
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z<sub>n</sub>.
Proceedings of the Advances in Cryptology, 1992


  Loading...