Masahito Ishizaka

According to our database1, Masahito Ishizaka authored at least 16 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Wildcarded identity-based ring signatures based on linearly homomorphic signatures.
J. Inf. Secur. Appl., June, 2023

Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications.
IACR Cryptol. ePrint Arch., 2023

Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications.
IACR Cryptol. ePrint Arch., 2023

2022
Multi-dimensional sub/super-range signatures.
J. Inf. Secur. Appl., 2022

Attribute-Based Signatures for Range of Inner Product and Its Applications.
IACR Cryptol. ePrint Arch., 2022

Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding.
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022

2021
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs.
IACR Cryptol. ePrint Arch., 2021

Automatic Security Inspection Framework for Trustworthy Supply Chain.
Proceedings of the 19th IEEE/ACIS International Conference on Software Engineering Research, 2021

2020
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Time-Specific Signatures.
IACR Cryptol. ePrint Arch., 2020

Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption.
IACR Cryptol. ePrint Arch., 2020

Consideration on Data Conformance Toward Building Trust in Supply Chain.
Proceedings of the 2020 European Conference on Networks and Communications, 2020

2019
A Framework for Secure and Trustworthy Data Management in Supply Chain.
Proceedings of the Mobile Web and Intelligent Information Systems, 2019

2018
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2018

Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions.
Proceedings of the Information Security - 21st International Conference, 2018

Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018


  Loading...