Keitaro Hashimoto

Orcid: 0000-0002-2232-9443

According to our database1, Keitaro Hashimoto authored at least 18 papers between 2019 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Signatures with Tight Adaptive Corruptions from Search Assumptions.
IACR Cryptol. ePrint Arch., 2025

Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol.
IACR Cryptol. ePrint Arch., 2025

Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs.
IACR Cryptol. ePrint Arch., 2025

Round-Optimal Authenticated Key Exchange with Full Forward Privacy.
IACR Commun. Cryptol., 2025

Bundled Authenticated Key Exchange: A Concrete Treatment of Signal's Handshake Protocol and Post-Quantum Security.
Proceedings of the 34th USENIX Security Symposium, 2025

Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable.
Proceedings of the 34th USENIX Security Symposium, 2025

Key Revocation in Registered Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Foundations of Multi-Designated Verifier Signature Comprehensive Formalization and New Constructions in Subset Simulation.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

2024
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext.
Des. Codes Cryptogr., February, 2024

Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions.
IACR Cryptol. ePrint Arch., 2024

Security Model for Authenticated Key Exchange, Reconsidered.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

2023
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2023

2022
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2019
Unrestricted and compact certificateless aggregate signature scheme.
Inf. Sci., 2019

Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption.
IACR Cryptol. ePrint Arch., 2019


  Loading...