Masayuki Abe

According to our database1, Masayuki Abe authored at least 89 papers between 1977 and 2018.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 1999, "For contributions to III-V compound semiconductor optoelectronic and high-speed devices.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
New Bleichenbacher Records: Practical Fault Attacks on qDSA Signatures.
IACR Cryptology ePrint Archive, 2018

Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications.
IACR Cryptology ePrint Archive, 2018

Lower Bounds on Structure-Preserving Signatures for Bilateral Messages.
IACR Cryptology ePrint Archive, 2018

Lower Bounds on Structure-Preserving Signatures for Bilateral Messages.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

2017
Variations of Even-Goldreich-Micali Framework for Signature Schemes.
IEICE Transactions, 2017

Compact Structure-preserving Signatures with Almost Tight Security.
IACR Cryptology ePrint Archive, 2017

Compact Structure-Preserving Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Structure-Preserving Signatures and Commitments to Group Elements.
J. Cryptology, 2016

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
J. Cryptology, 2016

Packing Messages and Optimizing Bootstrapping in GSW-FHE.
IEICE Transactions, 2016

Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming.
IACR Cryptology ePrint Archive, 2016

Efficient Functional Encryption for Inner-Product Values with Full-Hiding Security.
Proceedings of the Information Security - 19th International Conference, 2016

Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Fully Structure-Preserving Signatures and Shrinking Commitments.
IACR Cryptology ePrint Archive, 2015

Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
IACR Cryptology ePrint Archive, 2015

Packing Messages and Optimizing Bootstrapping in GSW-FHE.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Fully Structure-Preserving Signatures and Shrinking Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

2014
Structure-Preserving Signatures from Type II Pairings.
IACR Cryptology ePrint Archive, 2014

Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
IACR Cryptology ePrint Archive, 2014

Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

On the Impossibility of Structure-Preserving Deterministic Primitives.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Structure-Preserving Signatures from Type II Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Double-trapdoor anonymous tags for traceable signatures.
Int. J. Inf. Sec., 2013

Message Recovery Signature Schemes from Sigma-Protocols.
IEICE Transactions, 2013

Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Proceedings of the DIM'13, 2013

2012
A framework for universally composable non-committing blind signatures.
IJACT, 2012

High-Performance Modulation-Doped Heterostructure-Thermopiles for Uncooled Infrared Image-Sensor Application.
IEICE Transactions, 2012

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
IACR Cryptology ePrint Archive, 2012

Tools over Bilinear Groups for Modular Design of Cryptographic Tasks.
Proceedings of the Provable Security - 6th International Conference, 2012

Group to Group Commitments Do Not Shrink.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

A Signature Scheme with Efficient Proof of Validity.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Separating Short Structure-Preserving Signatures from Non-interactive Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Double-Trapdoor Anonymous Tags for Traceable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Chosen Ciphertext Security with Optimal Ciphertext Overhead.
IEICE Transactions, 2010

Modulation-Doped Heterostructure-Thermopiles for Uncooled Infrared Image-Sensor Application.
IEICE Transactions, 2010

Signing on Elements in Bilinear Groups for Modular Protocol Design.
IACR Cryptology ePrint Archive, 2010

Efficient hybrid encryption from ID-based encryption.
Des. Codes Cryptography, 2010

Efficient Message Space Extension for Automorphic Signatures.
Proceedings of the Information Security - 13th International Conference, 2010

Structure-Preserving Signatures and Commitments to Group Elements.
Proceedings of the Advances in Cryptology, 2010

2009
Tag-KEM from Set Partial Domain One-Way Permutations.
IEICE Transactions, 2009

A Framework for Universally Composable Non-Committing Blind Signatures.
IACR Cryptology ePrint Archive, 2009

Compact CCA-Secure Encryption for Messages of Arbitrary Length.
Proceedings of the Public Key Cryptography, 2009

A Framework for Universally Composable Non-committing Blind Signatures.
Proceedings of the Advances in Cryptology, 2009

2008
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
J. Cryptology, 2008

On the Definitions of Anonymity for Ring Signatures.
IEICE Transactions, 2008

Chosen Ciphertext Security with Optimal Ciphertext Overhead.
IACR Cryptology ePrint Archive, 2008

Chosen Ciphertext Security with Optimal Ciphertext Overhead.
Proceedings of the Advances in Cryptology, 2008

2007
Efficient Hybrid Encryption from ID-Based Encryption.
IACR Cryptology ePrint Archive, 2007

Perfect NIZK with Adaptive Soundness.
Proceedings of the Theory of Cryptography, 4th Theory of Cryptography Conference, 2007

2006
Cubic GaN/AlGaN HEMTs on 3C-SiC Substrate for Normally-Off Operation.
IEICE Transactions, 2006

Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions.
IEICE Transactions, 2006

Perfect NIZK with Adaptive Soundness.
IACR Cryptology ePrint Archive, 2006

On the Definition of Anonymity for Ring Signatures.
Proceedings of the Progressin Cryptology, 2006

Tag-KEM from Set Partial Domain One-Way Permutations.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2005
Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext.
IEICE Transactions, 2005

Tag-KEM/DEM: A New Framework for Hybrid Encryption.
IACR Cryptology ePrint Archive, 2005

Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Proceedings of the Advances in Cryptology, 2005

2004
1-out-of-n Signatures from a Variety of Keys.
IEICE Transactions, 2004

Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography.
IACR Cryptology ePrint Archive, 2004

Combining Encryption and Proof of Knowledge in the Random Oracle Model.
Comput. J., 2004

Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography.
Proceedings of the Advances in Cryptology, 2004

2003
Flaws in Some Robust Optimistic Mix-Nets.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication Masayuki Abe and Masayuki Kanda.
Comput. J., 2002

M+1-st Price Auction Using Homomorphic Encryption.
Proceedings of the Public Key Cryptography, 2002

Receipt-Free Sealed-Bid Auction.
Proceedings of the Information Security, 5th International Conference, 2002

Securing "Encryption + Proof of Knowledge" in the Random Oracle Model.
Proceedings of the Topics in Cryptology, 2002

1-out-of-n Signatures from a Variety of Keys.
Proceedings of the Advances in Cryptology, 2002

Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments.
Proceedings of the Advances in Cryptology, 2002

2001
Remarks on Mix-Network Based on Permutation Networks.
Proceedings of the Public Key Cryptography, 2001

Lenient/Strict Batch Verification in Several Groups.
Proceedings of the Information Security, 4th International Conference, 2001

A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures.
Proceedings of the Advances in Cryptology, 2001

Provably Secure Fair Blind Signatures with Tight Revocation.
Proceedings of the Advances in Cryptology, 2001

2000
Provably Secure Partially Blind Signatures.
Proceedings of the Advances in Cryptology, 2000

A Length-Invariant Hybrid Mix.
Proceedings of the Advances in Cryptology, 2000

A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000

1999
An Improvement on a Practical Secret Voting Scheme.
Proceedings of the Information Security, Second International Workshop, 1999

Delegation Chains Secure up to Constant Length.
Proceedings of the Information and Communication Security, Second International Conference, 1999

Robust Distributed Multiplicaton with out Interaction.
Proceedings of the Advances in Cryptology, 1999

A Signature Scheme with Message Recovery as Secure as Discrete Logarithm.
Proceedings of the Advances in Cryptology, 1999

Mix-Networks on Permutation Networks.
Proceedings of the Advances in Cryptology, 1999

1998
Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

1996
How to Date Blind Signatures.
Proceedings of the Advances in Cryptology, 1996

1994
Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources.
Proceedings of the Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28, 1994

1992
Present status of HEMT LSI technology.
Future Generation Comp. Syst., 1992

1977
Packet switched network in Japan.
Proceedings of the American Federation of Information Processing Societies: 1977 National Computer Conference, 1977


  Loading...