Fuyuki Kitagawa

According to our database1, Fuyuki Kitagawa authored at least 37 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
NIZK from SNARGs.
J. Cryptol., April, 2023

Publicly Verifiable Deletion from Minimal Assumptions.
IACR Cryptol. ePrint Arch., 2023

One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More.
IACR Cryptol. ePrint Arch., 2023

Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
IACR Cryptol. ePrint Arch., 2023

Robust Combiners and Universal Constructions for Quantum Cryptography.
IACR Cryptol. ePrint Arch., 2023

Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More.
IACR Cryptol. ePrint Arch., 2023

Obfuscation of Pseudo-Deterministic Quantum Circuits.
IACR Cryptol. ePrint Arch., 2023

Public Key Encryption with Secure Key Leasing.
IACR Cryptol. ePrint Arch., 2023

2022
Obfustopia Built on Secret-Key Functional Encryption.
J. Cryptol., 2022

CCA Security and Trapdoor Functions via Key-Dependent-Message Security.
J. Cryptol., 2022

Functional Encryption with Secure Key Leasing.
IACR Cryptol. ePrint Arch., 2022

Watermarking PRFs against Quantum Adversaries.
IACR Cryptol. ePrint Arch., 2022

Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
IACR Cryptol. ePrint Arch., 2022

2021
Simple and Generic Constructions of Succinct Functional Encryption.
J. Cryptol., 2021

Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
IACR Cryptol. ePrint Arch., 2021

2020
Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

Secure Software Leasing from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020

NIZK from SNARG.
IACR Cryptol. ePrint Arch., 2020

Circular Security Is Complete for KDM Security.
IACR Cryptol. ePrint Arch., 2020

Secret Sharing with Statistical Privacy and Computational Relaxed Non-malleability.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019

Non-Committing Encryption with Quasi-Optimal Ciphertext-Rate Based on the DDH Problem.
IACR Cryptol. ePrint Arch., 2019

Simple and Efficient KDM-CCA Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2019

CPA-to-CCA Transformation for KDM Security.
IACR Cryptol. ePrint Arch., 2019

2018
A Framework for Achieving KDM-CCA Secure Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2018

Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
IACR Cryptol. ePrint Arch., 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Proceedings of the Provable Security, 2018

2017
Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017

Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Constructions for the IND-CCA1 Secure Fully Homomorphic Encryption.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions.
IACR Cryptol. ePrint Arch., 2016

2015
Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.
Proceedings of the Topics in Cryptology, 2015

2014
Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014


  Loading...