Eiichiro Fujisaki

According to our database1, Eiichiro Fujisaki authored at least 34 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improved lattice enumeration algorithms by primal and dual reordering methods.
IET Inf. Secur., January, 2023

2022
Improving Practical UC-Secure Commitments based on the DDH Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

2020
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

2018
All-But-Many Encryption.
J. Cryptol., 2018

2016
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
IACR Cryptol. ePrint Arch., 2015

Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

2014
Non-malleable Multiple Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

All-But-Many Encryption - A New Framework for Fully-Equipped UC Commitments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Secure Integration of Asymmetric and Symmetric Encryption Schemes.
J. Cryptol., 2013

2012
A Multi-Trapdoor Commitment Scheme from the RSA Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

An Efficient Non-interactive Universally Composable String-Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Sub-Linear Size Traceable Ring Signatures without Random Oracles.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A Framework for Efficient Fully-Equipped UC Commitments.
IACR Cryptol. ePrint Arch., 2012

New Constructions of Efficient Simulation-Sound Commitments Using Encryption and Their Applications.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2009
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Efficient Non-interactive Universally Composable String-Commitment Schemes.
Proceedings of the Provable Security, Third International Conference, 2009

On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.
Proceedings of the Provable Security, Third International Conference, 2009

2008
Traceable Ring Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2007
Security of ESIGN-PSS.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Formal Security Treatments for Signatures from Identity-Based Encryption.
Proceedings of the Provable Security, 2007

2006
Plaintext Simulatability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006

2004
RSA-OAEP Is Secure under the RSA Assumption.
J. Cryptol., 2004

2002
A Simple Approach to Secretly Sharing a Factoring Witness in a Publicly-Verifiable Manner.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order.
Proceedings of the Advances in Cryptology, 2002

2001
An Integer Commitment Scheme based on Groups with Hidden Order.
IACR Cryptol. ePrint Arch., 2001

1999
How to Enhance the Security of Public-Key Encryption at Minimum Cost.
Proceedings of the Public Key Cryptography, 1999

1998
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1997
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations.
Proceedings of the Advances in Cryptology, 1997

1996
Practical Escrow Cash System.
Proceedings of the Security Protocols, 1996

How to Date Blind Signatures.
Proceedings of the Advances in Cryptology, 1996

1992
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Z<sub>n</sub>.
Proceedings of the Advances in Cryptology, 1992


  Loading...