Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption A Lewko, T Okamoto, A Sahai, K Takashima, B Waters EUROCRYPT 2010, 62-91, 2010 | 1604 | 2010 |
Fully secure functional encryption with general relations from the decisional linear assumption T Okamoto, K Takashima CRYPTO 2010, 191-208, 2010 | 620 | 2010 |
Hierarchical predicate encryption for inner-products T Okamoto, K Takashima ASIACRYPT 2009, 214-231, 2009 | 365 | 2009 |
Efficient attribute-based signatures for non-monotone predicates in the standard model T Okamoto, K Takashima IEEE Transactions on Cloud Computing 2 (4), 409-421, 2014 | 221 | 2014 |
Fully secure unbounded inner-product and attribute-based encryption T Okamoto, K Takashima ASIACRYPT 2012, 349-366, 2012 | 217 | 2012 |
Adaptively attribute-hiding (hierarchical) inner product encryption T Okamoto, K Takashima EUROCRYPT 2012, 591-608, 2012 | 215 | 2012 |
Decentralized attribute-based signatures T Okamoto, K Takashima Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013 | 172 | 2013 |
Homomorphic encryption and signatures from vector decomposition T Okamoto, K Takashima International conference on pairing-based cryptography, 57-74, 2008 | 171 | 2008 |
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption T Okamoto, K Takashima Designs, Codes and Cryptography 77, 725-771, 2015 | 151 | 2015 |
Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption K Takashima SCN 2014, 298-317, 2014 | 48 | 2014 |
Efficient algorithms for isogeny sequences and their cryptographic applications K Takashima Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math …, 2018 | 30 | 2018 |
Fully-anonymous functional proxy-re-encryption Y Kawai, K Takashima Cryptology ePrint Archive, 2013 | 30 | 2013 |
Unbounded inner product functional encryption from bilinear maps J Tomida, K Takashima Japan Journal of Industrial and Applied Mathematics 37, 723-779, 2020 | 29 | 2020 |
Supersingular isogeny Diffie–Hellman authenticated key exchange A Fujioka, K Takashima, S Terada, K Yoneyama Information Security and Cryptology–ICISC 2018: 21st International …, 2019 | 25 | 2019 |
Predicate-and attribute-hiding inner product encryption in a public key setting Y Kawai, K Takashima International Conference on Pairing-Based Cryptography, 113-130, 2013 | 25 | 2013 |
Scaling security of elliptic curves with fast pairing using efficient endomorphisms K Takashima IEICE transactions on fundamentals of electronics, communications and …, 2007 | 23 | 2007 |
Efficient (hierarchical) inner-product encryption tightly reduced from the decisional linear assumption T Okamoto, K Takashima IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 20 | 2013 |
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders K Takashima, A Takayasu International Conference on Provable Security - ProvSec 2015, 412-431, 2015 | 18 | 2015 |
Provably-secure cancelable biometrics using 2-DNF evaluation M Hattori, N Matsuda, T Ito, Y Shibata, K Takashima, T Yoneda Information and Media Technologies 7 (2), 749-760, 2012 | 18 | 2012 |
Adaptively attribute-hiding (hierarchical) inner product encryption T Okamoto, K Takashima IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016 | 17 | 2016 |