Ryo Nishimaki

Orcid: 0000-0002-5144-4619

According to our database1, Ryo Nishimaki authored at least 74 papers between 2006 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Collusion-Resistant Quantum Secure Key Leasing Beyond Decryption.
IACR Cryptol. ePrint Arch., 2025

White-Box Watermarking Signatures against Quantum Adversaries and Its Applications.
IACR Cryptol. ePrint Arch., 2025

Untelegraphable Encryption and its Applications.
IACR Cryptol. ePrint Arch., 2025

Multi-Copy Security in Unclonable Cryptography.
IACR Cryptol. ePrint Arch., 2025

MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations.
IACR Cryptol. ePrint Arch., 2025

Non-committing Identity Based Encryption: Constructions and Applications.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

PKE and ABE with Collusion-Resistant Secure Key Leasing.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Watermarking PRFs and PKE Against Quantum Adversaries.
J. Cryptol., September, 2024

A Note on Security Definitions for Secret Sharing with Certified Deletion.
IACR Cryptol. ePrint Arch., 2024

Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
IACR Cryptol. ePrint Arch., 2024

Robust Combiners and Universal Constructions for Quantum Cryptography.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Publicly Verifiable Deletion from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Obfuscation of Pseudo-Deterministic Quantum Circuits.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Public Key Encryption with Secure Key Leasing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Certified Everlasting Functional Encryption.
IACR Cryptol. ePrint Arch., 2022

Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

The Direction of Updatable Encryption Does Matter.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

KDM Security for the Fujisaki-Okamoto Transformations in the QROM.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

Watermarking PRFs Against Quantum Adversaries.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Certified Everlasting Zero-Knowledge Proof for QMA.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Functional Encryption with Secure Key Leasing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings.
J. Cryptol., 2021

Quantum Encryption with Certified Deletion: Public Key and Attribute-Based.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013.
IACR Cryptol. ePrint Arch., 2021

Secure Software Leasing from Standard Assumptions.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

Universal Proxy Re-Encryption.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Fast, Compact, and Expressive Attribute-Based Encryption.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Compact NIZKs from Standard Assumptions on Bilinear Maps.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Adaptively Secure Inner Product Encryption from LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
How to Watermark Cryptographic Functions by Bilinear Maps.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Exploring Constructions of Compact NIZKs from Various Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
A Bit-fixing PRF with O(1) Collusion-Resistance from LWE.
IACR Cryptol. ePrint Arch., 2018

Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance.
IACR Cryptol. ePrint Arch., 2018

Adaptively Single-Key Secure Constrained PRFs for NC1.
IACR Cryptol. ePrint Arch., 2018

Constrained PRFs for NC1 in Traditional Groups.
IACR Cryptol. ePrint Arch., 2018

Simple and Generic Constructions of Succinct Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Obfustopia Built on Secret-Key Functional Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Constrained PRFs for \mathrmNC^1 in Traditional Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017

Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017

Compact Structure-Preserving Signatures with Almost Tight Security.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
From Cryptomania to Obfustopia Through Secret-Key Functional Encryption.
Proceedings of the Theory of Cryptography - 14th International Conference, 2016

Watermarking cryptographic capabilities.
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016

Watermarking Cryptographic Programs.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
Key-Private Proxy Re-Encryption from Lattices, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Watermarking Cryptographic Programs Against Arbitrary Removal Strategies.
IACR Cryptol. ePrint Arch., 2015

Generalizing Efficient Multiparty Computation.
Proceedings of the Information Theoretic Security - 8th International Conference, 2015

2014
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

How to Watermark Cryptographic Functions.
Proceedings of the Advances in Cryptology, 2013

Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Proceedings of the DIM'13, 2013

2012
An Efficient Non-interactive Universally Composable String-Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2010
CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.
Proceedings of the Public Key Cryptography, 2010

A Multi-trapdoor Commitment Scheme from the RSA Assumption.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Efficient Non-interactive Universally Composable String-Commitment Schemes.
Proceedings of the Provable Security, Third International Conference, 2009

On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions.
Proceedings of the Provable Security, Third International Conference, 2009

Security on Hybrid Encryption with the Tag-KEM/DEM Framework.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2006
Universally Composable Identity-Based Encryption.
Proceedings of the Progressin Cryptology, 2006


  Loading...