Follow
Katsuyuki Takashima
Katsuyuki Takashima
Verified email at waseda.jp
Title
Cited by
Cited by
Year
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
A Lewko, T Okamoto, A Sahai, K Takashima, B Waters
EUROCRYPT 2010, 62-91, 2010
15342010
Fully secure functional encryption with general relations from the decisional linear assumption
T Okamoto, K Takashima
CRYPTO 2010, 191-208, 2010
5932010
Hierarchical predicate encryption for inner-products
T Okamoto, K Takashima
ASIACRYPT 2009, 214-231, 2009
3522009
Adaptively attribute-hiding (hierarchical) inner product encryption
T Okamoto, K Takashima
EUROCRYPT 2012, 591-608, 2012
2062012
Efficient attribute-based signatures for non-monotone predicates in the standard model
T Okamoto, K Takashima
IEEE Transactions on Cloud Computing 2 (4), 409-421, 2014
2052014
Fully secure unbounded inner-product and attribute-based encryption
T Okamoto, K Takashima
ASIACRYPT 2012, 349-366, 2012
1972012
Homomorphic encryption and signatures from vector decomposition
T Okamoto, K Takashima
International conference on pairing-based cryptography, 57-74, 2008
1642008
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption
T Okamoto, K Takashima
Designs, Codes and Cryptography 77 (2), 725-771, 2015
1542015
Decentralized attribute-based signatures
T Okamoto, K Takashima
International Workshop on Public Key Cryptography, 125-142, 2013
1522013
Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption
K Takashima
SCN 2014, 298-317, 2014
452014
Fully-anonymous functional proxy-re-encryption
Y Kawai, K Takashima
Cryptology ePrint Archive, 2013
312013
Predicate-and attribute-hiding inner product encryption in a public key setting
Y Kawai, K Takashima
International Conference on Pairing-Based Cryptography, 113-130, 2013
252013
Supersingular isogeny Diffie–Hellman authenticated key exchange
A Fujioka, K Takashima, S Terada, K Yoneyama
International Conference on Information Security and Cryptology, 177-195, 2018
242018
Scaling security of elliptic curves with fast pairing using efficient endomorphisms
K Takashima
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2007
242007
Efficient (hierarchical) inner-product encryption tightly reduced from the decisional linear assumption
T Okamoto, K Takashima
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
202013
Efficient algorithms for isogeny sequences and their cryptographic applications
K Takashima
Mathematical modelling for next-generation cryptography, 97-114, 2018
192018
Provably-secure cancelable biometrics using 2-DNF evaluation
M Hattori, N Matsuda, T Ito, Y Shibata, K Takashima, T Yoneda
Information and Media Technologies 7 (2), 749-760, 2012
192012
Unbounded inner product functional encryption from bilinear maps
J Tomida, K Takashima
Japan Journal of Industrial and Applied Mathematics 37 (3), 723-779, 2020
182020
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders
K Takashima, A Takayasu
International Conference on Provable Security - ProvSec 2015, 412-431, 2015
172015
Adaptively attribute-hiding (hierarchical) inner product encryption
T Okamoto, K Takashima
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20