Shuichi Katsumata
Orcid: 0000-0002-8496-0476
According to our database1,
Shuichi Katsumata
authored at least 54 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Concrete Treatment of Signal Handshake's Deniability: Efficient Post-Quantum Deniable Ring Signature.
IACR Cryptol. ePrint Arch., 2025
Bundled Authenticated Key Exchange: A Concrete Treatment of (Post-Quantum) Signal's Handshake Protocol.
IACR Cryptol. ePrint Arch., 2025
Exploring How to Authenticate Application Messages in MLS: More Efficient, Post-Quantum, and Anonymous Blocklistable.
IACR Cryptol. ePrint Arch., 2025
Revisiting PQ WireGuard: A Comprehensive Security Analysis With a New Design Using Reinforced KEMs.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Unmasking TRaccoon: A Lattice-Based Threshold Signature with An Efficient Identifiable Abort Protocol.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Proceedings of the Financial Cryptography and Data Security, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Direct computation of branching programs and its applications to more efficient lattice-based cryptography.
Des. Codes Cryptogr., February, 2023
Proceedings of the Financial Cryptography and Data Security, 2023
CSI -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
2022
Identity-based encryption with security against the KGC: A formal model and its instantiations.
Theor. Comput. Sci., 2022
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
J. Cryptol., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques.
Proc. Priv. Enhancing Technol., 2020
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
IEICE Trans. Inf. Syst., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Financial Cryptography and Data Security, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
Proceedings of the Eighteenth International Conference on Artificial Intelligence and Statistics, 2015
2014
Proceedings of the Provable Security - 8th International Conference, 2014