Miyako Ohkubo

According to our database1, Miyako Ohkubo authored at least 44 papers between 1999 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Compact Structure-Preserving Signatures with Almost Tight Security.
J. Cryptol., October, 2023

2021
Non-Interactive Composition of Sigma-Protocols via Share-then-Hash.
IACR Cryptol. ePrint Arch., 2021

Acyclicity Programming for Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2021

2020
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
J. Cryptol., 2019

Opcount: A Pseudo-Code Performance Estimation System for Pairing-Based Cryptography.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Fast and Scalable Bilinear-Type Conversion Method for Large Scale Crypto Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Shorter QA-NIZK and SPS with Tighter Security.
IACR Cryptol. ePrint Arch., 2019

Black-Box Language Extension of Non-Interactive Zero-Knowledge Arguments.
IACR Cryptol. ePrint Arch., 2019

2018
Improved (Almost) Tightly-Secure Structure-Preserving Signatures.
IACR Cryptol. ePrint Arch., 2018

Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications.
IACR Cryptol. ePrint Arch., 2018

Lower Bounds on Structure-Preserving Signatures for Bilateral Messages.
IACR Cryptol. ePrint Arch., 2018

2016
Structure-Preserving Signatures and Commitments to Group Elements.
J. Cryptol., 2016

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
J. Cryptol., 2016

Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion using Integer Programming.
IACR Cryptol. ePrint Arch., 2016

2015
Fully Structure-Preserving Signatures and Shrinking Commitments.
IACR Cryptol. ePrint Arch., 2015

Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
IACR Cryptol. ePrint Arch., 2015

The Limits of Composable Crypto with Transferable Setup Devices.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Relations among Notions of Privacy for RFID Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Structure-Preserving Signatures from Type II Pairings.
IACR Cryptol. ePrint Arch., 2014

Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
IACR Cryptol. ePrint Arch., 2014

Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Introduction of structure-preserving signatures.
Proceedings of the ASIAPKC'14, 2014

2013
Double-trapdoor anonymous tags for traceable signatures.
Int. J. Inf. Sec., 2013

A Forward Privacy Model for RFID Authentication Protocols.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

2012
A framework for universally composable non-committing blind signatures.
Int. J. Appl. Cryptogr., 2012

Group to Group Commitments Do Not Shrink.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2011
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication.
Proceedings of the Financial Cryptography and Data Security, 2011

Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

A Signature Scheme with Efficient Proof of Validity.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

Separating Short Structure-Preserving Signatures from Non-interactive Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Robust RFID Authentication Protocol with Formal Proof and Its Feasibility.
IACR Cryptol. ePrint Arch., 2010

Signing on Elements in Bilinear Groups for Modular Protocol Design.
IACR Cryptol. ePrint Arch., 2010

Leakage-Resilient RFID Authentication with Forward-Privacy.
Proceedings of the Radio Frequency Identification: Security and Privacy Issues, 2010

Efficient Message Space Extension for Automorphic Signatures.
Proceedings of the Information Security - 13th International Conference, 2010

2009
Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts.
Proceedings of the Public Key Cryptography, 2009

2008
On the Definitions of Anonymity for Ring Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

2006
On the Definition of Anonymity for Ring Signatures.
Proceedings of the Progressin Cryptology, 2006

2005
RFID privacy issues and technical challenges.
Commun. ACM, 2005

2004
1-out-of-n Signatures from a Variety of Keys.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2001
Provably Secure Fair Blind Signatures with Tight Revocation.
Proceedings of the Advances in Cryptology, 2001

2000
A Length-Invariant Hybrid Mix.
Proceedings of the Advances in Cryptology, 2000

1999
An Improvement on a Practical Secret Voting Scheme.
Proceedings of the Information Security, Second International Workshop, 1999


  Loading...