Seiko Arita

According to our database1, Seiko Arita authored at least 22 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Fully Homomorphic Encryption Scheme Based on Decomposition Ring.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

2018
Witness-Indistinguishable Arguments with Σ-Protocols for Bundled Witness Spaces and its Application to Global Identities.
IACR Cryptol. ePrint Arch., 2018

Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Fully Homomorphic Encryption for Classification in Machine Learning.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

A Homomorphic Signature Scheme for Quadratic Polynomials.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Anonymous Authentication Scheme with Decentralized Multi-Authorities.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Subring Homomorphic Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

2016
Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptol. ePrint Arch., 2016

Fully Homomorphic Encryption for Point Numbers.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

2015
Attribute-Based Two-Tier Signatures: Definition and Construction.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Two applications of multilinear maps: group key exchange and witness encryption.
Proceedings of the ASIAPKC'14, 2014

Attribute-based signatures without pairings via the fiat-shamir paradigm.
Proceedings of the ASIAPKC'14, 2014

2013
Attribute-Based Identification: Definitions and Efficient Constructions.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Flexible Attribute-Based Encryption.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
A constant-round resettably-sound resettable zero-knowledge argument in the BPK model.
IACR Cryptol. ePrint Arch., 2011

Identification Schemes from Key Encapsulation Mechanisms.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
Proceedings of the Provable Security - 4th International Conference, 2010

2009
An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme.
IACR Cryptol. ePrint Arch., 2009

Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2007
An Identification Scheme with Tight Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A Straight-Line Extractable Non-malleable Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007


  Loading...