What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Nuttapong Attrapadung
Google Scholar
48
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/joc
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
Nuttapong Attrapadung
Junichi Tomida
2025
conf/pkc
Key Revocation in Registered Attribute-Based Encryption.
Kyoichi Asano
Nuttapong Attrapadung
Keisuke Hara
Keitaro Hashimoto
Yohei Watanabe
2025
conf/esorics
Abuse-Resistant Evaluation of AI-as-a-Service via Function-Hiding Homomorphic Signatures.
Nuttapong Attrapadung
Goichiro Hanaoaka
Ryo Hiromasa
Yoshihiro Koseki
Takahiro Matsuda
Yutaro Nishida
Yusuke Sakai
Jacob C. N. Schuldt
Satoshi Yasuda
2024
conf/ccs
Secure Parallel Computation with Oblivious State Transitions.
Nuttapong Attrapadung
Kota Isayama
Kunihiko Sadakane
Kazunari Tozawa
2024
conf/crypto
A Modular Approach to Registered ABE for Unbounded Predicates.
Nuttapong Attrapadung
Junichi Tomida
2024
conf/acns
Privacy-Preserving Verifiable CNNs.
Nuttapong Attrapadung
Goichiro Hanaoka
Ryo Hiromasa
Yoshihiro Koseki
Takahiro Matsuda
Yutaro Nishida
Yusuke Sakai
Jacob C. N. Schuldt
Satoshi Yasuda
2023
conf/fc
Signature for Objects: Formalizing How to Authenticate Physical Data and More.
Ryuya Hayashi
Taiki Asano
Junichiro Hayata
Takahiro Matsuda
Shota Yamada
Shuichi Katsumata
Yusuke Sakai
Tadanori Teruya
Jacob C. N. Schuldt
Nuttapong Attrapadung
Goichiro Hanaoka
Kanta Matsuura
Tsutomu Matsumoto
2022
journals/popets
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Nuttapong Attrapadung
Koki Hamada
Dai Ikarashi
Ryo Kikuchi
Takahiro Matsuda
Ibuki Mishina
Hiraku Morita
Jacob C. N. Schuldt
2022
conf/ccs
Secure Parallel Computation on Privately Partitioned Data and Applications.
Nuttapong Attrapadung
Hiraku Morita
Kazuma Ohara
Jacob C. N. Schuldt
Tadanori Teruya
Kazunari Tozawa
2022
conf/acns
Efficient Oblivious Evaluation Protocol and Conditional Disclosure of Secrets for DFA.
Kittiphop Phalakarn
Nuttapong Attrapadung
Kanta Matsuura
2022
conf/asiaccs
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Nuttapong Attrapadung
Hiraku Morita
Kazuma Ohara
Jacob C. N. Schuldt
Kazunari Tozawa
2021
conf/ccs
Oblivious Linear Group Actions and Applications.
Nuttapong Attrapadung
Goichiro Hanaoka
Takahiro Matsuda
Hiraku Morita
Kazuma Ohara
Jacob C. N. Schuldt
Tadanori Teruya
Kazunari Tozawa
2021
conf/iwsec
Evolving Homomorphic Secret Sharing for Hierarchical Access Structures.
Kittiphop Phalakarn
Vorapong Suppakitpaisarn
Nuttapong Attrapadung
Kanta Matsuura
2020
conf/asiacrypt
Unbounded Dynamic Predicate Compositions in ABE from Standard Assumptions.
Nuttapong Attrapadung
Junichi Tomida
2019
conf/acisp
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
Ryo Kikuchi
Nuttapong Attrapadung
Koki Hamada
Dai Ikarashi
Ai Ishida
Takahiro Matsuda
Yusuke Sakai
Jacob C. N. Schuldt
2019
conf/pkc
Adaptively Single-Key Secure Constrained PRFs for \mathrm NC^1.
Nuttapong Attrapadung
Takahiro Matsuda
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2019
conf/eurocrypt
Unbounded Dynamic Predicate Compositions in Attribute-Based Encryption.
Nuttapong Attrapadung
2019
conf/cans
Client-Aided Two-Party Secure Interval Test Protocol.
Hiraku Morita
Nuttapong Attrapadung
2018
conf/ccs
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
Nuttapong Attrapadung
Goichiro Hanaoka
Shigeo Mitsunari
Yusuke Sakai
Kana Shimizu
Tadanori Teruya
2018
conf/crypto
Constrained PRFs for \mathrmNC^1 in Traditional Groups.
Nuttapong Attrapadung
Takahiro Matsuda
Ryo Nishimaki
Shota Yamada
Takashi Yamakawa
2018
conf/provsec
Token-Based Multi-input Functional Encryption.
Nuttapong Attrapadung
Goichiro Hanaoka
Takato Hirano
Yutaka Kawai
Yoshihiro Koseki
Jacob C. N. Schuldt
2018
conf/esorics
Constant-Round Client-Aided Secure Comparison Protocol.
Hiraku Morita
Nuttapong Attrapadung
Tadanori Teruya
Satsuya Ohata
Koji Nuida
Goichiro Hanaoka
2018
conf/asiacrypt
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
Yusuke Sakai
Shuichi Katsumata
Nuttapong Attrapadung
Goichiro Hanaoka
2017
conf/esorics
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
Kotoko Yamada
Nuttapong Attrapadung
Keita Emura
Goichiro Hanaoka
Keisuke Tanaka
2017
conf/pkc
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits.
Nuttapong Attrapadung
2016
conf/acns
Attribute Based Encryption with Direct Efficiency Tradeoff.
Nuttapong Attrapadung
Goichiro Hanaoka
Tsutomu Matsumoto
Tadanori Teruya
Shota Yamada
2016
conf/pkc
Attribute-Based Signatures for Circuits from Bilinear Map.
Yusuke Sakai
Nuttapong Attrapadung
Goichiro Hanaoka
2016
conf/asiacrypt
Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings.
Nuttapong Attrapadung
2015
conf/ctrsa
Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.
Nuttapong Attrapadung
Shota Yamada
2015
conf/asiacrypt
A Framework for Identity-Based Encryption with Almost Tight Security.
Nuttapong Attrapadung
Goichiro Hanaoka
Shota Yamada
2015
conf/asiacrypt
Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs.
Nuttapong Attrapadung
Goichiro Hanaoka
Shota Yamada
2014
conf/acns
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Nuttapong Attrapadung
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
2014
conf/pkc
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
Shota Yamada
Nuttapong Attrapadung
Goichiro Hanaoka
Noboru Kunihiro
2014
conf/icics
New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security.
Nuttapong Attrapadung
Goichiro Hanaoka
Shota Yamada
2014
conf/eurocrypt
Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More.
Nuttapong Attrapadung
2013
conf/pkc
Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Nuttapong Attrapadung
Benoît Libert
Thomas Peters
2012
conf/pkc
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Shota Yamada
Nuttapong Attrapadung
Bagus Santoso
Jacob C. N. Schuldt
Goichiro Hanaoka
Noboru Kunihiro
2012
conf/asiacrypt
Computing on Authenticated Data: New Privacy Definitions and Constructions.
Nuttapong Attrapadung
Benoît Libert
Thomas Peters
2011
conf/pkc
Homomorphic Network Coding Signatures in the Standard Model.
Nuttapong Attrapadung
Benoît Libert
2011
conf/pkc
Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Nuttapong Attrapadung
Benoît Libert
Elie de Panafieu
2011
conf/pkc
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Shota Yamada
Nuttapong Attrapadung
Goichiro Hanaoka
Noboru Kunihiro
2010
conf/pkc
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Nuttapong Attrapadung
Benoît Libert
2009
conf/acns
Dual-Policy Attribute Based Encryption.
Nuttapong Attrapadung
Hideki Imai
2007
conf/provsec
A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function.
Takahiro Matsuda
Nuttapong Attrapadung
Goichiro Hanaoka
Kanta Matsuura
Hideki Imai
2006
conf/asiacrypt
Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.
Nuttapong Attrapadung
Jun Furukawa
Hideki Imai
2006
conf/cans
Efficient Identity-Based Encryption with Tight Security Reduction.
Nuttapong Attrapadung
Jun Furukawa
Takeshi Gomi
Goichiro Hanaoka
Hideki Imai
Rui Zhang
2005
conf/asiacrypt
Graph-Decomposition-Based Frameworks for Subset-Cover Broadcast Encryption and Efficient Instantiations.
Nuttapong Attrapadung
Hideki Imai
2003
conf/asiacrypt
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes.
Nuttapong Attrapadung
Kazukuni Kobara
Hideki Imai
Coauthors
Ai Ishida
(1)
Bagus Santoso
(1)
Benoît Libert
(5)
Dai Ikarashi
(2)
Elie de Panafieu
(1)
Goichiro Hanaoaka
(1)
Goichiro Hanaoka
(19)
Hideki Imai
(6)
Hiraku Morita
(6)
Ibuki Mishina
(1)
Jacob C. N. Schuldt
(10)
Jun Furukawa
(2)
Junichi Tomida
(3)
Junichiro Hayata
(1)
Kana Shimizu
(1)
Kanta Matsuura
(4)
Kazukuni Kobara
(1)
Kazuma Ohara
(3)
Kazunari Tozawa
(4)
Keisuke Hara
(1)
Keisuke Tanaka
(1)
Keita Emura
(2)
Keitaro Hashimoto
(1)
Kittiphop Phalakarn
(2)
Koji Nuida
(1)
Koki Hamada
(2)
Kota Isayama
(1)
Kotoko Yamada
(1)
Kunihiko Sadakane
(1)
Kyoichi Asano
(1)
Noboru Kunihiro
(3)
Nuttapong Attrapadung
(48)
Rui Zhang
(1)
Ryo Hiromasa
(2)
Ryo Kikuchi
(2)
Ryo Nishimaki
(2)
Ryuya Hayashi
(1)
Satoshi Yasuda
(2)
Satsuya Ohata
(1)
Shigeo Mitsunari
(1)
Shota Yamada
(11)
Shuichi Katsumata
(2)
Tadanori Teruya
(6)
Taiki Asano
(1)
Takahiro Matsuda
(9)
Takashi Yamakawa
(2)
Takato Hirano
(1)
Takeshi Gomi
(1)
Thomas Peters
(2)
Tsutomu Matsumoto
(2)
Vorapong Suppakitpaisarn
(1)
Yohei Watanabe
(1)
Yoshihiro Koseki
(3)
Yusuke Sakai
(8)
Yutaka Kawai
(1)
Yutaro Nishida
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to