Fuyuki Kitagawa

Orcid: 0000-0002-9268-087X

According to our database1, Fuyuki Kitagawa authored at least 51 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Copy Protecting Cryptographic Functionalities over Entropic Inputs.
IACR Cryptol. ePrint Arch., 2025

Foundations of Single-Decryptor Encryption.
IACR Cryptol. ePrint Arch., 2025

Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption.
IACR Cryptol. ePrint Arch., 2025

White-Box Watermarking Signatures against Quantum Adversaries and Its Applications.
IACR Cryptol. ePrint Arch., 2025

Adaptive TDF from PKE with Randomness Recoverability and Pseudorandom Ciphertext Property.
IACR Cryptol. ePrint Arch., 2025

A Unified Approach to Quantum Key Leasing with a Classical Lessor.
IACR Cryptol. ePrint Arch., 2025

Untelegraphable Encryption and its Applications.
IACR Cryptol. ePrint Arch., 2025

Multi-Copy Security in Unclonable Cryptography.
IACR Cryptol. ePrint Arch., 2025

Copy-Protection from Unclonable Puncturable Obfuscation, Revisited.
IACR Cryptol. ePrint Arch., 2025

Adaptive TDF from any TDF via Pseudorandom-Ciphertext PKE.
IACR Commun. Cryptol., 2025

Non-committing Identity Based Encryption: Constructions and Applications.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

A Simple Framework for Secure Key Leasing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

PKE and ABE with Collusion-Resistant Secure Key Leasing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Watermarking PRFs and PKE Against Quantum Adversaries.
J. Cryptol., September, 2024

Robust Combiners and Universal Constructions for Quantum Cryptography.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
NIZK from SNARGs.
J. Cryptol., April, 2023

Publicly Verifiable Deletion from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Obfuscation of Pseudo-Deterministic Quantum Circuits.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Public Key Encryption with Secure Key Leasing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Watermarking PRFs Against Quantum Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Functional Encryption with Secure Key Leasing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Secure Software Leasing from Standard Assumptions.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

NIZK from SNARG.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Circular Security Is Complete for KDM Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
CPA-to-CCA Transformation for KDM Security.
Proceedings of the Theory of Cryptography - 17th International Conference, 2019

Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions.
Proceedings of the Advances in Information and Computer Security, 2019

Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

CCA Security and Trapdoor Functions via Key-Dependent-Message Security.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Simple and Efficient KDM-CCA Secure Public Key Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Proceedings of the Provable Security, 2018

Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Simple and Generic Constructions of Succinct Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Obfustopia Built on Secret-Key Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

A Framework for Achieving KDM-CCA Secure Public-Key Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017

Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Constructions for the IND-CCA1 Secure Fully Homomorphic Encryption.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.
Proceedings of the Topics in Cryptology, 2015

2014
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014


  Loading...