Takashi Yamakawa

Orcid: 0000-0003-1712-3026

According to our database1, Takashi Yamakawa authored at least 91 papers between 1998 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Quantum Cryptography and Hardness of Non-Collapsing Measurements.
IACR Cryptol. ePrint Arch., 2025

From Worst-Case Hardness of NP to Quantum Cryptography via Quantum Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2025

Almost-Total Puzzles and Their Applications.
IACR Cryptol. ePrint Arch., 2025

Copy Protecting Cryptographic Functionalities over Entropic Inputs.
IACR Cryptol. ePrint Arch., 2025

Foundations of Single-Decryptor Encryption.
IACR Cryptol. ePrint Arch., 2025

A Unified Approach to Quantum Key Leasing with a Classical Lessor.
IACR Cryptol. ePrint Arch., 2025

Proofs of quantum memory.
IACR Cryptol. ePrint Arch., 2025

Round-Efficient Composable Two-Party Quantum Computation.
IACR Cryptol. ePrint Arch., 2025

Untelegraphable Encryption and its Applications.
IACR Cryptol. ePrint Arch., 2025

Multi-Copy Security in Unclonable Cryptography.
IACR Cryptol. ePrint Arch., 2025

MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations.
IACR Cryptol. ePrint Arch., 2025

Copy-Protection from Unclonable Puncturable Obfuscation, Revisited.
IACR Cryptol. ePrint Arch., 2025

A Note on Output Length of One-Way State Generators and EFIs.
IACR Commun. Cryptol., 2025

Cryptographic Characterization of Quantum Advantage.
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025

Non-committing Identity Based Encryption: Constructions and Applications.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

A Simple Framework for Secure Key Leasing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Quantum Lifting for Invertible Permutations and Ideal Ciphers.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

The Round Complexity of Black-Box Post-quantum Secure Computation.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
CountCrypt: Quantum Cryptography between QCMA and PP.
IACR Cryptol. ePrint Arch., 2024

Anonymous Public-Key Quantum Money and Quantum Voting.
IACR Cryptol. ePrint Arch., 2024

One-Wayness in Quantum Cryptography.
Proceedings of the 19th Conference on the Theory of Quantum Computation, 2024

Revocable Quantum Digital Signatures.
Proceedings of the 19th Conference on the Theory of Quantum Computation, 2024

Robust Combiners and Universal Constructions for Quantum Cryptography.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Exponential Quantum One-Wayness and EFI Pairs.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

Classical vs Quantum Advice and Proofs Under Classically-Accessible Oracle.
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024

Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

Quantum Advantage from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Unconditionally Secure Commitments with Quantum Auxiliary Inputs.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Quantum Complexity for Discrete Logarithms and Related Problems.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

Quantum Unpredictability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
NIZK from SNARGs.
J. Cryptol., April, 2023

A Note on Output Length of One-Way State Generators.
CoRR, 2023

Classical vs Quantum Advice under Classically-Accessible Oracle.
CoRR, 2023

Publicly Verifiable Deletion from Minimal Assumptions.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Obfuscation of Pseudo-Deterministic Quantum Circuits.
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023

Proofs of Quantumness from Trapdoor Permutations.
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023

A New Approach to Post-Quantum Non-Malleability.
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023

From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Public Key Encryption with Secure Key Leasing.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Certified Everlasting Functional Encryption.
IACR Cryptol. ePrint Arch., 2022

Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022

Verifiable Quantum Advantage without Structure.
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022

Quantum Commitments and Signatures Without One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Certified Everlasting Zero-Knowledge Proof for QMA.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

Classically Verifiable NIZK for QMA with Preprocessing.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings.
J. Cryptol., 2021

Quantum Encryption with Certified Deletion: Public Key and Attribute-Based.
IACR Cryptol. ePrint Arch., 2021

On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds.
IACR Cryptol. ePrint Arch., 2021

Classically Verifiable (Dual-Mode) NIZK for QMA with Preprocessing.
CoRR, 2021

Secure Software Leasing from Standard Assumptions.
Proceedings of the Theory of Cryptography - 19th International Conference, 2021

On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Round.
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021

Classical vs Quantum Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Generic hardness of inversion on ring and its relation to self-bilinear map.
Theor. Comput. Sci., 2020

A Note on Separating Classical and Quantum Random Oracles.
IACR Cryptol. ePrint Arch., 2020

A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Round.
CoRR, 2020

NIZK from SNARG.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Classical Verification of Quantum Computations with Efficient Verifier.
Proceedings of the Theory of Cryptography - 18th International Conference, 2020

Compact NIZKs from Standard Assumptions on Bilinear Maps.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Adaptively Secure Constrained Pseudorandom Functions in the Standard Model.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Adaptively Secure Inner Product Encryption from LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Exploring Constructions of Compact NIZKs from Various Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Quantum Random Oracle Model with Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Adaptively Single-Key Secure Constrained PRFs for NC1.
IACR Cryptol. ePrint Arch., 2018

Constrained PRFs for NC1 in Traditional Groups.
IACR Cryptol. ePrint Arch., 2018

Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Constrained PRFs for \mathrmNC^1 in Traditional Groups.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Towards Ideal Self-bilinear Map.
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018

Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Secur. Commun. Networks, 2016

Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2014
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

A Short Fail-Stop Signature Scheme from Factoring.
Proceedings of the Provable Security - 8th International Conference, 2014

Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Proceedings of the SECRYPT 2013, 2013

Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length.
Proceedings of the Information Security, 16th International Conference, 2013

Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

1998
STM Publications in Japan - a market analysis.
Learn. Publ., 1998


  Loading...