Katsuyuki Takashima

Orcid: 0000-0001-5216-2229

According to our database1, Katsuyuki Takashima authored at least 49 papers between 2004 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.
IACR Cryptol. ePrint Arch., 2022

2021
Improved supersingularity testing of elliptic curves.
JSIAM Lett., 2021

Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves.
CoRR, 2021

Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption.
IEICE Trans. Inf. Syst., 2020

Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Decentralized Attribute-Based Encryption and Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH.
IACR Cryptol. ePrint Arch., 2020

Counting superspecial Richelot isogenies and its cryptographic application.
CoRR, 2020

Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption.
J. Cryptol., 2019

Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Unbounded Inner Product Functional Encryption from Bilinear Maps.
IACR Cryptol. ePrint Arch., 2018

One-Round Authenticated Group Key Exchange from Isogenies.
IACR Cryptol. ePrint Arch., 2018

Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2018

Multi-party Key Exchange Protocols from Supersingular Isogenies.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
Constructing an efficient hash function from $3$-isogenies.
JSIAM Lett., 2017

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Efficient Algorithms for Isogeny Sequences and Their Cryptographic Applications.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups.
IACR Cryptol. ePrint Arch., 2016

2015
Dual Pairing Vector Spaces and Their Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
IACR Cryptol. ePrint Arch., 2015

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application.
IACR Cryptol. ePrint Arch., 2015

Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption.
Des. Codes Cryptogr., 2015

2014
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model.
IEEE Trans. Cloud Comput., 2014

Heuristic counting of Kachisa-Schaefer-Scott curves.
JSIAM Lett., 2014

Recent Topics on Practical Functional Encryption.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
Computing a Sequence of 2-Isogenies on Supersingular Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting.
IACR Cryptol. ePrint Arch., 2013

Fully-Anonymous Functional Proxy-Re-Encryption.
IACR Cryptol. ePrint Arch., 2013

2012
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation.
J. Inf. Process., 2012

Fully Secure Unbounded Inner-Product and Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2012

2011
Decentralized Attribute-Based Signatures.
IACR Cryptol. ePrint Arch., 2011

Some Key Techniques on Pairing Vector Spaces.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
IACR Cryptol. ePrint Arch., 2010

Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
IACR Cryptol. ePrint Arch., 2010

2009
Hierarchical Predicate Encryption for Inner-Products.
Proceedings of the Advances in Cryptology, 2009

2008
Homomorphic Encryption and Signatures from Vector Decomposition.
Proceedings of the Pairing-Based Cryptography, 2008

Simple Algorithms for Computing a Sequence of 2-Isogenies.
Proceedings of the Information Security and Cryptology, 2008

Efficiently Computable Distortion Maps for Supersingular Curves.
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008

2007
Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Practical Application of Lattice Basis Reduction Algorithm to Side-Channel Analysis on (EC)DSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.
Proceedings of the Information Security and Cryptology, 2004


  Loading...