Follow
Shuichi Katsumata
Shuichi Katsumata
PQShield Ltd.
Verified email at pqshield.com - Homepage
Title
Cited by
Cited by
Year
Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
W Beullens, S Katsumata, F Pintore
International Conference on the Theory and Application of Cryptology and …, 2020
852020
Partitioning via non-linear polynomial functions: more compact IBEs from ideal lattices and bilinear maps
S Katsumata, S Yamada
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
802016
Model inversion attacks for prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
2017 15th Annual Conference on Privacy, Security and Trust (PST), 115-11509, 2017
712017
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
S Katsumata, T Matsuda, A Takayasu
Theoretical Computer Science 809, 103-136, 2020
572020
Group signatures without NIZK: from lattices in the standard model
S Katsumata, S Yamada
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
352019
An efficient and generic construction for signal’s handshake (X3DH): post-quantum, state leakage secure, and deniable
K Hashimoto, S Katsumata, K Kwiatkowski, T Prest
Journal of Cryptology 35 (3), 17, 2022
312022
Attribute-based signatures for unbounded circuits in the ROM and efficient instantiations from lattices
A El Kaafarani, S Katsumata
Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018
302018
Group signatures and more from isogenies and lattices: generic, simple, and efficient
W Beullens, S Dobson, S Katsumata, YF Lai, F Pintore
Designs, Codes and Cryptography, 1-60, 2023
292023
Tighter security proofs for GPV-IBE in the quantum random oracle model
S Katsumata, S Yamada, T Yamakawa
Journal of Cryptology 34, 1-46, 2021
292021
Lossy CSI-FiSh: efficient signature scheme with tight reduction to decisional CSIDH-512
A El Kaafarani, S Katsumata, F Pintore
IACR International Conference on Public-Key Cryptography, 157-186, 2020
292020
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
292019
A new framework for more efficient round-optimal lattice-based (partially) blind signature via trapdoor sampling
R del Pino, S Katsumata
Annual International Cryptology Conference, 306-336, 2022
282022
Robust cost sensitive support vector machine
S Katsumata, A Takeda
Artificial intelligence and statistics, 434-443, 2015
272015
Non-interactive zero-knowledge in pairing-free groups from weaker assumptions
G Couteau, S Katsumata, B Ursu
Annual International Conference on the Theory and Applications of …, 2020
212020
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices
K Emura, S Katsumata, Y Watanabe
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
202019
Model inversion attacks for online prediction systems: Without knowledge of non-sensitive attributes
S Hidano, T Murakami, S Katsumata, S Kiyomoto, G Hanaoka
IEICE TRANSACTIONS on Information and Systems 101 (11), 2665-2676, 2018
202018
Non-zero inner product encryption schemes from various assumptions: LWE, DDH and DCR
S Katsumata, S Yamada
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
182019
Attribute-based signatures for unbounded languages from standard assumptions
Y Sakai, S Katsumata, N Attrapadung, G Hanaoka
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
182018
On the untapped potential of encoding predicates by arithmetic circuits and their applications
S Katsumata
International Conference on the Theory and Application of Cryptology and …, 2017
182017
Scalable ciphertext compression techniques for post-quantum KEMs and their applications
S Katsumata, K Kwiatkowski, F Pintore, T Prest
International Conference on the Theory and Application of Cryptology and …, 2020
172020
The system can't perform the operation now. Try again later.
Articles 1–20