Nuttapong Attrapadung

Orcid: 0000-0003-4116-1751

According to our database1, Nuttapong Attrapadung authored at least 86 papers between 2003 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Fast and Private 1-to-$N$ Face Identification Protocols.
IEEE Open J. Comput. Soc., 2025

Key Revocation in Registered Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures.
Proceedings of the Computer Security - ESORICS 2025, 2025

2024
A Modular Approach to Registered ABE for Unbounded Predicates.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Secure Parallel Computation with Oblivious State Transitions.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

Privacy-Preserving Verifiable CNNs.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Maliciously circuit-private multi-key FHE and MPC based on LWE.
Des. Codes Cryptogr., May, 2023

Two-Dimensional Dynamic Fusion for Continuous Authentication.
Proceedings of the IEEE International Joint Conference on Biometrics, 2023

Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Proceedings of the Financial Cryptography and Data Security, 2023

2022
Secure Parallel Computation on Privately Partitioned Data and Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
IACR Cryptol. ePrint Arch., 2021

Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.
Proceedings of the Advances in Information and Computer Security, 2021

Oblivious Linear Group Actions and Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Efficient Secure Neural Network Prediction Protocol Reducing Accuracy Degradation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Constructive t-secure Homomorphic Secret Sharing for Low Degree Polynomials.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

MOBIUS: Model-Oblivious Binarized Neural Networks.
IEEE Access, 2019

Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Client-Aided Two-Party Secure Interval Test Protocol.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Practical attribute-based signature schemes for circuits from bilinear map.
IET Inf. Secur., 2018

Adaptively Single-Key Secure Constrained PRFs for NC1.
IACR Cryptol. ePrint Arch., 2018

Constrained PRFs for NC1 in Traditional Groups.
IACR Cryptol. ePrint Arch., 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Tree-based Secure Comparison of Secret Shared Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Embedding Lemmas for Functional Encryption.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Constant-Round Client-Aided Secure Comparison Protocol.
Proceedings of the Computer Security, 2018

Constrained PRFs for \mathrmNC^1 in Traditional Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
A Taxonomy of Secure Two-Party Comparison Protocols and Efficient Constructions.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
Proceedings of the Computer Security - ESORICS 2017, 2017

2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016

Attribute-Based Encryption for Range Attributes.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Attribute-Based Signatures for Circuits from Bilinear Map.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Private similarity searchable encryption for Euclidean distance.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

Attribute Based Encryption with Direct Efficiency Tradeoff.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Privacy-preserving search for chemical compound databases.
BMC Bioinform., December, 2015

Dual System Encryption Framework in Prime-Order Groups.
IACR Cryptol. ePrint Arch., 2015

Conversions among Several Classes of Predicate Encryption and Their Applications.
IACR Cryptol. ePrint Arch., 2015

Revocable Group Signature with Constant-Size Revocation List.
Comput. J., 2015

Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.
Proceedings of the Topics in Cryptology, 2015

Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

A Framework for Identity-Based Encryption with Almost Tight Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Fully Secure and Succinct Attribute Based Encryption for Circuits from Multi-linear Maps.
IACR Cryptol. ePrint Arch., 2014

A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the Information Security, 16th International Conference, 2013

2012
Attribute-based encryption schemes with constant-size ciphertexts.
Theor. Comput. Sci., 2012

Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
J. Math. Cryptol., 2012

Time-Specific Encryption from Forward-Secure Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Computing on Authenticated Data: New Privacy Definitions and Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Homomorphic Network Coding Signatures in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

2010
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Proceedings of the Public Key Cryptography, 2010

2009
Conjunctive Broadcast and Attribute-Based Encryption.
Proceedings of the Pairing-Based Cryptography, 2009

Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes.
Proceedings of the Cryptography and Coding, 2009

Dual-Policy Attribute Based Encryption.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions.
IEICE Trans. Inf. Syst., 2008

A Fuzzy ID-Based Encryption Efficient When Error Rate Is Low.
Proceedings of the Progress in Cryptology, 2008

2007
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Proceedings of the Provable Security, 2007

Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

2006
Relations among Notions of Security for Identity Based Encryption Schemes.
Inf. Media Technol., 2006

Relations Among Notions of Security for Identity Based Encryption Schemes.
Proceedings of the LATIN 2006: Theoretical Informatics, 2006

Efficient Identity-Based Encryption with Tight Security Reduction.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Advances in Cryptology, 2006

2005
Efficient Identity-Based Encryption with Tight Security Reduction.
IACR Cryptol. ePrint Arch., 2005

Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Proceedings of the Advances in Cryptology, 2005

2003
Broadcast encryption with short keys and transmissions.
Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, 2003

Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003


  Loading...