Junichi Tomida

Orcid: 0000-0001-7995-877X

According to our database1, Junichi Tomida authored at least 24 papers between 2016 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Fully Adaptive Decentralized MA-ABE: Simplified, Optimized, ASP Supported.
IACR Cryptol. ePrint Arch., 2025

2024
Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
IACR Cryptol. ePrint Arch., 2024

A Modular Approach to Registered ABE for Unbounded Predicates.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

Unbounded Quadratic Functional Encryption and More from Pairings.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Attribute-Based Multi-input FE (and More) for Attribute-Weighted Sums.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Communication-Efficient Inner Product Private Join and Compute with Cardinality.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Private Intersection-Weighted-Sum.
IACR Cryptol. ePrint Arch., 2022

Multi-Input Quadratic Functional Encryption: Stronger Security, Broader Functionality.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Towards Practical Inner Product Functional Encryption.
PhD thesis, 2021

Multi-Party Functional Encryption.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Revocable Hierarchical Identity-Based Authenticated Key Exchange.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

Multi-input Quadratic Functional Encryption from Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Efficient Inner Product Functional Encryption with Full-Hiding Security.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Multi-Input Quadratic Functional Encryption from Pairings.
IACR Cryptol. ePrint Arch., 2020

Fast, Compact, and Expressive Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Strongly Secure Identity-Based Key Exchange with Single Pairing Operation.
Proceedings of the Computer Security - ESORICS 2019, 2019

Tightly Secure Inner Product Functional Encryption: Multi-input and Function-Hiding Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Unbounded Inner Product Functional Encryption from Bilinear Maps.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2016
Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security.
Proceedings of the Information Security - 19th International Conference, 2016


  Loading...