What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Masayuki Abe
Google Scholar
62
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/esorics
A Certified-Input Mixnet from Two-Party Mercurial Signatures on Randomizable Ciphertexts.
Masayuki Abe
Masaya Nanri
Miyako Ohkubo
Octavio Perez-Kempner
Daniel Slamanig
Mehdi Tibouchi
2024
conf/crypto
CDS Composition of Multi-round Protocols.
Masayuki Abe
Andrej Bogdanov
Miyako Ohkubo
Alon Rosen
Zehua Shang
Mehdi Tibouchi
2024
conf/pkc
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme.
Xiuhan Lin
Moeto Suzuki
Shiduo Zhang
Thomas Espitau
Yang Yu
Mehdi Tibouchi
Masayuki Abe
2024
conf/asiacrypt
Interactive Threshold Mercurial Signatures and Applications.
Masayuki Abe
Masaya Nanri
Octavio Perez-Kempner
Mehdi Tibouchi
2023
journals/joc
Compact Structure-Preserving Signatures with Almost Tight Security.
Masayuki Abe
Dennis Hofheinz
Ryo Nishimaki
Miyako Ohkubo
Jiaxin Pan
2023
conf/acisp
Quantum-Access Security of Hash-Based Signature Schemes.
Quan Yuan
Mehdi Tibouchi
Masayuki Abe
2022
journals/tches
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage.
Chao Sun
Thomas Espitau
Mehdi Tibouchi
Masayuki Abe
2021
conf/tcc
Acyclicity Programming for Sigma-Protocols.
Masayuki Abe
Miguel Ambrona
Andrej Bogdanov
Miyako Ohkubo
Alon Rosen
2020
conf/ccs
WI is Almost Enough: Contingent Payment All Over Again.
Ky Nguyen
Miguel Ambrona
Masayuki Abe
2020
conf/acisp
Revisiting the Hardness of Binary Error LWE.
Chao Sun
Mehdi Tibouchi
Masayuki Abe
2020
conf/pkc
On Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation Soundness.
Masayuki Abe
Miguel Ambrona
Miyako Ohkubo
2020
conf/asiacrypt
Non-interactive Composition of Sigma-Protocols via Share-then-Hash.
Masayuki Abe
Miguel Ambrona
Andrej Bogdanov
Miyako Ohkubo
Alon Rosen
2019
journals/joc
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Jens Groth
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2019
journals/joc
On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe
Jan Camenisch
Rafael Dowsley
Maria Dubovitskaya
2019
conf/provsec
A Coin-Free Oracle-Based Augmented Black Box Framework.
Kyosuke Yamashita
Mehdi Tibouchi
Masayuki Abe
2019
conf/asiacrypt
Shorter QA-NIZK and SPS with Tighter Security.
Masayuki Abe
Charanjit S. Jutla
Miyako Ohkubo
Jiaxin Pan
Arnab Roy
Yuyu Wang
2018
journals/tches
New Bleichenbacher Records: Fault Attacks on qDSA Signatures.
Akira Takahashi
Mehdi Tibouchi
Masayuki Abe
2018
conf/asiacrypt
Improved (Almost) Tightly-Secure Simulation-Sound QA-NIZK with Applications.
Masayuki Abe
Charanjit S. Jutla
Miyako Ohkubo
Arnab Roy
2017
conf/crypto
Compact Structure-Preserving Signatures with Almost Tight Security.
Masayuki Abe
Dennis Hofheinz
Ryo Nishimaki
Miyako Ohkubo
Jiaxin Pan
2016
journals/joc
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe
Melissa Chase
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2016
journals/joc
Structure-Preserving Signatures and Commitments to Group Elements.
Masayuki Abe
Georg Fuchsbauer
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2016
conf/crypto
Design in Type-I, Run in Type-III: Fast and Scalable Bilinear-Type Conversion Using Integer Programming.
Masayuki Abe
Fumitaka Hoshino
Miyako Ohkubo
2015
conf/pkc
Packing Messages and Optimizing Bootstrapping in GSW-FHE.
Ryo Hiromasa
Masayuki Abe
Tatsuaki Okamoto
2015
conf/eurocrypt
Fully Structure-Preserving Signatures and Shrinking Commitments.
Masayuki Abe
Markulf Kohlweiss
Miyako Ohkubo
Mehdi Tibouchi
2014
conf/crypto
Converting Cryptographic Schemes from Symmetric to Asymmetric Bilinear Groups.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Takeya Tango
2014
conf/crypto
Structure-Preserving Signatures from Type II Pairings.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Mehdi Tibouchi
2014
conf/tcc
Unified, Minimal and Selectively Randomizable Structure-Preserving Signatures.
Masayuki Abe
Jens Groth
Miyako Ohkubo
Mehdi Tibouchi
2014
conf/tcc
On the Impossibility of Structure-Preserving Deterministic Primitives.
Masayuki Abe
Jan Camenisch
Rafael Dowsley
Maria Dubovitskaya
2013
conf/pkc
Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Masayuki Abe
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2012
conf/provsec
Tools over Bilinear Groups for Modular Design of Cryptographic Tasks.
Masayuki Abe
2012
conf/eurocrypt
Group to Group Commitments Do Not Shrink.
Masayuki Abe
Kristiyan Haralambiev
Miyako Ohkubo
2012
conf/asiacrypt
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Masayuki Abe
Melissa Chase
Bernardo David
Markulf Kohlweiss
Ryo Nishimaki
Miyako Ohkubo
2011
conf/crypto
Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups.
Masayuki Abe
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2011
conf/acns
Double-Trapdoor Anonymous Tags for Traceable Signatures.
Masayuki Abe
Sherman S. M. Chow
Kristiyan Haralambiev
Miyako Ohkubo
2011
conf/asiacrypt
Separating Short Structure-Preserving Signatures from Non-interactive Assumptions.
Masayuki Abe
Jens Groth
Miyako Ohkubo
2010
conf/crypto
Structure-Preserving Signatures and Commitments to Group Elements.
Masayuki Abe
Georg Fuchsbauer
Jens Groth
Kristiyan Haralambiev
Miyako Ohkubo
2009
conf/pkc
Compact CCA-Secure Encryption for Messages of Arbitrary Length.
Masayuki Abe
Eike Kiltz
Tatsuaki Okamoto
2009
conf/asiacrypt
A Framework for Universally Composable Non-committing Blind Signatures.
Masayuki Abe
Miyako Ohkubo
2008
journals/joc
Tag-KEM/DEM: A New Framework for Hybrid Encryption.
Masayuki Abe
Rosario Gennaro
Kaoru Kurosawa
2008
conf/asiacrypt
Chosen Ciphertext Security with Optimal Ciphertext Overhead.
Masayuki Abe
Eike Kiltz
Tatsuaki Okamoto
2007
conf/tcc
Perfect NIZK with Adaptive Soundness.
Masayuki Abe
Serge Fehr
2006
conf/acisp
Tag-KEM from Set Partial Domain One-Way Permutations.
Masayuki Abe
Yang Cui
Hideki Imai
Kaoru Kurosawa
2005
conf/eurocrypt
Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM.
Masayuki Abe
Rosario Gennaro
Kaoru Kurosawa
Victor Shoup
2004
conf/crypto
Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography.
Masayuki Abe
Serge Fehr
2003
conf/acisp
Flaws in Some Robust Optimistic Mix-Nets.
Masayuki Abe
Hideki Imai
2002
conf/pkc
M+1-st Price Auction Using Homomorphic Encryption.
Masayuki Abe
Koutarou Suzuki
2002
conf/ctrsa
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model.
Masayuki Abe
2002
conf/asiacrypt
1-out-of-n Signatures from a Variety of Keys.
Masayuki Abe
Miyako Ohkubo
Koutarou Suzuki
2002
conf/asiacrypt
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments.
Masayuki Abe
Ronald Cramer
Serge Fehr
2001
conf/pkc
Remarks on Mix-Network Based on Permutation Networks.
Masayuki Abe
Fumitaka Hoshino
2001
conf/eurocrypt
A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures.
Masayuki Abe
2001
conf/asiacrypt
Provably Secure Fair Blind Signatures with Tight Revocation.
Masayuki Abe
Miyako Ohkubo
2000
conf/acisp
A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication.
Masayuki Abe
Masayuki Kanda
2000
conf/crypto
Provably Secure Partially Blind Signatures.
Masayuki Abe
Tatsuaki Okamoto
2000
conf/asiacrypt
A Length-Invariant Hybrid Mix.
Miyako Ohkubo
Masayuki Abe
1999
conf/crypto
Robust Distributed Multiplicaton with out Interaction.
Masayuki Abe
1999
conf/icics
Delegation Chains Secure up to Constant Length.
Masayuki Abe
Tatsuaki Okamoto
1999
conf/asiacrypt
Mix-Networks on Permutation Networks.
Masayuki Abe
1999
conf/asiacrypt
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm.
Masayuki Abe
Tatsuaki Okamoto
1998
conf/eurocrypt
Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers.
Masayuki Abe
1996
conf/asiacrypt
How to Date Blind Signatures.
Masayuki Abe
Eiichiro Fujisaki
1994
conf/asiacrypt
Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources.
Masayuki Abe
Hikaru Morita
Coauthors
Akira Takahashi
(1)
Alon Rosen
(3)
Andrej Bogdanov
(3)
Arnab Roy
(2)
Bernardo David
(3)
Chao Sun
(2)
Charanjit S. Jutla
(2)
Daniel Slamanig
(1)
Dennis Hofheinz
(2)
Eiichiro Fujisaki
(1)
Eike Kiltz
(2)
Fumitaka Hoshino
(2)
Georg Fuchsbauer
(2)
Hideki Imai
(2)
Hikaru Morita
(1)
Jan Camenisch
(2)
Jens Groth
(8)
Jiaxin Pan
(3)
Kaoru Kurosawa
(3)
Koutarou Suzuki
(2)
Kristiyan Haralambiev
(5)
Ky Nguyen
(1)
Kyosuke Yamashita
(1)
Maria Dubovitskaya
(2)
Markulf Kohlweiss
(5)
Masaya Nanri
(2)
Masayuki Abe
(62)
Masayuki Kanda
(1)
Mehdi Tibouchi
(13)
Melissa Chase
(2)
Miguel Ambrona
(4)
Miyako Ohkubo
(28)
Moeto Suzuki
(1)
Octavio Perez-Kempner
(2)
Quan Yuan
(1)
Rafael Dowsley
(2)
Ronald Cramer
(1)
Rosario Gennaro
(2)
Ryo Hiromasa
(1)
Ryo Nishimaki
(5)
Serge Fehr
(3)
Sherman S. M. Chow
(1)
Shiduo Zhang
(1)
Takeya Tango
(1)
Tatsuaki Okamoto
(6)
Thomas Espitau
(2)
Victor Shoup
(1)
Xiuhan Lin
(1)
Yang Cui
(1)
Yang Yu
(1)
Yuyu Wang
(1)
Zehua Shang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to