Follow
Ryo Nishimaki
Ryo Nishimaki
Verified email at hco.ntt.co.jp - Homepage
Title
Cited by
Cited by
Year
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Asiacrypt, 2012
125*2012
Watermarking cryptographic capabilities
A Cohen, J Holmgren, R Nishimaki, V Vaikuntanathan, D Wichs
Proceedings of the forty-eighth annual ACM symposium on Theory of Computing …, 2016
1032016
Tagged one-time signatures: Tight security and optimal tag size
M Abe, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
902013
From cryptomania to obfustopia through secret-key functional encryption
N Bitansky, R Nishimaki, A Passelegue, D Wichs
Journal of Cryptology 33 (2), 357-405, 2020
672020
CCA proxy re-encryption without bilinear maps in the standard model
T Matsuda, R Nishimaki, K Tanaka
Public Key Cryptography–PKC 2010, 261-278, 2010
662010
Anonymous traitor tracing: how to embed arbitrary information in a key
R Nishimaki, D Wichs, M Zhandry
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
582016
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
542014
Compact structure-preserving signatures with almost tight security
M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan
Advances in Cryptology–CRYPTO 2017: 37th Annual International Cryptology …, 2017
402017
Obfustopia Built on Secret-Key Functional Encryption
F Kitagawa, R Nishimaki, K Tanaka
Journal of Cryptology 35 (3), 1-102, 2022
37*2022
Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key
K Suzuki, R Nishimaki
US Patent 8,619,980, 2013
332013
How to watermark cryptographic functions
R Nishimaki
Advances in Cryptology–EUROCRYPT 2013: 32nd Annual International Conference …, 2013
322013
Secure software leasing from standard assumptions
F Kitagawa, R Nishimaki, T Yamakawa
Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC …, 2021
282021
Key-private proxy re-encryption from lattices, revisited
R Nishimaki, K Xagawa
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2015
272015
Fast, compact, and expressive attribute-based encryption
J Tomida, Y Kawahara, R Nishimaki
Designs, Codes and Cryptography 89, 2577-2626, 2021
262021
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
262019
An efficient non-interactive universally composable string-commitment scheme
R Nishimaki, E Fujisaki, K Tanaka
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2012
252012
Constrained PRFs for in traditional groups
N Attrapadung, T Matsuda, R Nishimaki, S Yamada, T Yamakawa
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
232018
Quantum encryption with certified deletion, revisited: Public key, attribute-based, and classical communication
T Hiroka, T Morimae, R Nishimaki, T Yamakawa
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
202021
Watermarking cryptographic programs against arbitrary removal strategies
R Nishimaki, D Wichs
Cryptology ePrint Archive, 2015
192015
Adaptively secure constrained pseudorandom functions in the standard model
A Davidson, S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
18*2020
The system can't perform the operation now. Try again later.
Articles 1–20