Seiko Arita

According to our database1, Seiko Arita authored at least 22 papers between 2007 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Fully Homomorphic Encryption Scheme Based on Decomposition Ring.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

2018
Witness-Indistinguishable Arguments with Σ-Protocols for Bundled Witness Spaces and its Application to Global Identities.
IACR Cryptol. ePrint Arch., 2018

Witness-Indistinguishable Arguments with ∑-Protocols for Bundled Witness Spaces and Its Application to Global Identities.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

2017
Subring Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2017

Short CCA-Secure Ciphertext-Policy Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

Fully Homomorphic Encryption for Classification in Machine Learning.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

A Homomorphic Signature Scheme for Quadratic Polynomials.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

Anonymous Authentication Scheme with Decentralized Multi-Authorities.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

2016
Fully Homomorphic Encryption for Point Numbers.
IACR Cryptol. ePrint Arch., 2016

Proof of Knowledge on Monotone Predicates and its Application to Attribute-Based Identifications and Signatures.
IACR Cryptol. ePrint Arch., 2016

2015
Attribute-Based Two-Tier Signatures: Definition and Construction.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

2014
Attribute-Based Identification: Definitions and Efficient Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Two applications of multilinear maps: group key exchange and witness encryption.
Proceedings of the ASIAPKC'14, 2014

Attribute-based signatures without pairings via the fiat-shamir paradigm.
Proceedings of the ASIAPKC'14, 2014

2012
A Constant-Round Resettably-Sound Resettable Zero-Knowledge Argument in the BPK Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Identification Schemes from Key Encapsulation Mechanisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Flexible Attribute-Based Encryption.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

2011
An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks.
Proceedings of the Provable Security - 4th International Conference, 2010

2009
Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2007
An Identification Scheme with Tight Reduction.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

A Straight-Line Extractable Non-malleable Commitment Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007


  Loading...