Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Keita
    Last name: Xagawa
    DBLP: 17/5868
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 35 of 35  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Caleb Horst, Ryo Kikuchi, Keita Xagawa.
    Cryptanalysis of Comparable Encryption in SIGMOD'16.
    Proceedings of the 2017 ACM International Conference on Management of Data, SIGMOD Conference 2017, Chicago, IL, USA, May 14-19, 2017 2017 (0) 2017
    Conference paper
    Akinori Hosoyamada, Yu Sasaki, Keita Xagawa.
    Quantum Multicollision-Finding Algorithm.
    Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II 2017 (0) 2017
    Conference paper
    Keita Xagawa.
    Groth-Sahai Proofs Revisited Again: A Bug in "Optimized" Randomization.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Eiichiro Fujisaki, Keita Xagawa.
    Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Keita Xagawa.
    Improved (Hierarchical) Inner-Product Encryption from Lattices.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Ryo Nishimaki, Keita Xagawa.
    Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Journal article
    Ryo Nishimaki, Keita Xagawa.
    Key-Private Proxy Re-Encryption from Lattices, Revisited.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa.
    Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Eiichiro Fujisaki, Keita Xagawa.
    Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.
    Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings 2015 (0) 2015
    Journal article
    Ryo Nishimaki, Keita Xagawa.
    Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES.
    Des. Codes Cryptography 2015, Volume 77 (0) 2015
    Conference paper
    Eiichiro Fujisaki, Keita Xagawa.
    Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama.
    Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
    Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa.
    Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
    Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa.
    Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
    Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa.
    Non-malleable Multiple Public-Key Encryption.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Ryo Nishimaki, Keita Xagawa.
    Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
    Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Keita Xagawa.
    Improved (Hierarchical) Inner-Product Encryption from Lattices.
    Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Keita Xagawa.
    Message Authentication Codes Secure against Additively Related-Key Attacks.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Yosuke Todo, Keita Xagawa.
    Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Security Enhancements by OR-Proof in Identity-Based Identification.
    Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Security Enhancement of Identity-Based Identification with Reversibility.
    Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    IACR Cryptology ePrint Archive 2012, Volume 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
    Cryptology and Network Security, 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa.
    Security of Encryption Schemes in Weakened Random Oracle Models.
    Public Key Cryptography - PKC 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings 2010 (0) 2010
    Conference paper
    Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa.
    Security of Encryption Schemes in Weakened Random Oracle Models.
    IACR Cryptology ePrint Archive 2010, Volume 2010 (0) 2010
    Conference paper
    Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa.
    Efficient Public Key Encryption Based on Ideal Lattices.
    IACR Cryptology ePrint Archive 2009, Volume 2009 (0) 2009
    Conference paper
    Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa.
    Efficient Public Key Encryption Based on Ideal Lattices.
    Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Keita Xagawa, Keisuke Tanaka.
    Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.
    Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings 2009 (0) 2009
    Conference paper
    Akinori Kawachi, Keisuke Tanaka, Keita Xagawa.
    Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
    Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings 2008 (0) 2008
    Conference paper
    Akinori Kawachi, Keisuke Tanaka, Keita Xagawa.
    Multi-bit Cryptosystems Based on Lattice Problems.
    Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings 2007 (0) 2007
    Show item 1 to 35 of 35  

    Your query returned 35 matches in the database.