Miyako Ohkubo

According to our database1, Miyako Ohkubo authored at least 50 papers between 1999 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
Scalable Mixnets from Mercurial Signatures on Randomizable Ciphertexts.
IACR Cryptol. ePrint Arch., 2024

Critical Round in Multi-Round Proofs: Compositions and Transformation to Trapdoor Commitments.
IACR Cryptol. ePrint Arch., 2024

Hybrid Zero-Knowledge from Garbled Circuits.
IACR Cryptol. ePrint Arch., 2024

Hybrid Zero-Knowledge from Garbled Circuits and Circuit-Based Composition of Σ-Protocols.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

CDS Composition of Multi-round Protocols.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2021
Acyclicity Programming for Sigma-Protocols.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

2020
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Non-interactive Composition of Sigma-Protocols via Share-then-Hash.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
J. Cryptol., 2019

Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Fast and Scalable Bilinear-Type Conversion Method for Large Scale Crypto Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments.
IACR Cryptol. ePrint Arch., 2019

Shorter QA-NIZK and SPS with Tighter Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Lower Bounds on Structure-Preserving Signatures for Bilateral Messages.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Improved (Almost) Tightly-Secure Structure-Preserving Signatures.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Compact Structure-Preserving Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

2015
Fully Structure-Preserving Signatures and Shrinking Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

The Limits of Composable Crypto with Transferable Setup Devices.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Proceedings of the Theory of Cryptography - 11th Theory of Cryptography Conference, 2014

Structure-Preserving Signatures from Type II Pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Introduction of structure-preserving signatures.
Proceedings of the ASIAPKC'14, 2014

2013
A Forward Privacy Model for RFID Authentication Protocols.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

2012
Group to Group Commitments Do Not Shrink.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Relations among Notions of Privacy for RFID Authentication Protocols.
Proceedings of the Computer Security - ESORICS 2012, 2012

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Proceedings of the Financial Cryptography and Data Security, 2011

Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

A Signature Scheme with Efficient Proof of Validity.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Separating Short Structure-Preserving Signatures from Non-interactive Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Double-Trapdoor Anonymous Tags for Traceable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2011

2010
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility.
IACR Cryptol. ePrint Arch., 2010

Signing on Elements in Bilinear Groups for Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2010

Leakage-Resilient RFID Authentication with Forward-Privacy.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Efficient Message Space Extension for Automorphic Signatures.
Proceedings of the Information Security - 13th International Conference, 2010

Structure-Preserving Signatures and Commitments to Group Elements.
Proceedings of the Advances in Cryptology, 2010

2009
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Public Key Cryptography, 2009

A Framework for Universally Composable Non-committing Blind Signatures.
Proceedings of the Advances in Cryptology, 2009

2008
On the Definitions of Anonymity for Ring Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2006
On the Definition of Anonymity for Ring Signatures.
Proceedings of the Progressin Cryptology, 2006

2005
RFID privacy issues and technical challenges.
Commun. ACM, 2005

2002
1-out-of-n Signatures from a Variety of Keys.
Proceedings of the Advances in Cryptology, 2002

2001
Provably Secure Fair Blind Signatures with Tight Revocation.
Proceedings of the Advances in Cryptology, 2001

2000
A Length-Invariant Hybrid Mix.
Proceedings of the Advances in Cryptology, 2000

1999
An Improvement on a Practical Secret Voting Scheme.
Proceedings of the Information Security, Second International Workshop, 1999


  Loading...