Susumu Kiyoshima

According to our database1, Susumu Kiyoshima authored at least 17 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
No-Signaling Linear PCPs.
J. Cryptol., April, 2023

Holographic SNARGs for P and Batch-NP from (Polynomially Hard) Learning with Errors.
IACR Cryptol. ePrint Arch., 2023

2022
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.
J. Cryptol., 2022

Public-Coin 3-Round Zero-Knowledge from Learning with Errors and Keyless Multi-Collision-Resistant Hash.
IACR Cryptol. ePrint Arch., 2022

2021
Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial Hardness.
IACR Cryptol. ePrint Arch., 2021

2020
Statistical Concurrent Non-Malleable Zero-Knowledge from One-Way Functions.
J. Cryptol., 2020

Round-optimal Black-box Commit-and-prove with Succinct Communication.
IACR Cryptol. ePrint Arch., 2020

2019
Non-black-box Simulation in the Fully Concurrent Setting, Revisited.
J. Cryptol., 2019

Round-Efficient Black-Box Construction of Composable Multi-Party Computation.
J. Cryptol., 2019

2018
A New Approach to Black-Box Concurrent Secure Computation.
IACR Cryptol. ePrint Arch., 2018

2017
A Unified Approach to Constructing Black-box UC Protocols in Trusted Setup Models.
IACR Cryptol. ePrint Arch., 2017

On the Exact Round Complexity of Self-Composable Two-Party Computation.
IACR Cryptol. ePrint Arch., 2017

2016
Garbling Scheme for Formulas with Constant Size of Garbled Gates.
IACR Cryptol. ePrint Arch., 2016

2015
An Alternative Approach to Non-black-box Simulation in Fully Concurrent Setting.
IACR Cryptol. ePrint Arch., 2015

2013
Constant-Round Black-Box Construction of Composable Multi-Party Computation Protocol.
IACR Cryptol. ePrint Arch., 2013

2012
Constant-Time Approximation Algorithms for the Knapsack Problem.
Proceedings of the Theory and Applications of Models of Computation, 2012

Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security.
Proceedings of the Advances in Information and Computer Security, 2012


  Loading...