Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Keita
    Last name: Xagawa
    DBLP: 17/5868
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 34  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Caleb Horst, Ryo Kikuchi, Keita Xagawa.
    Cryptanalysis of Comparable Encryption in SIGMOD'16.
    Proceedings of the 2017 ACM International Conference on Management of Data, SIGMOD Conference 2017, Chicago, IL, USA, May 14-19, 2017 2017 (0) 2017
    Conference paper
    Keita Xagawa.
    Groth-Sahai Proofs Revisited Again: A Bug in "Optimized" Randomization.
    IACR Cryptology ePrint Archive 2016, Volume 2016 (0) 2016
    Conference paper
    Eiichiro Fujisaki, Keita Xagawa.
    Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
    Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I 2016 (0) 2016
    Conference paper
    Keita Xagawa.
    Improved (Hierarchical) Inner-Product Encryption from Lattices.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Ryo Nishimaki, Keita Xagawa.
    Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Journal article
    Ryo Nishimaki, Keita Xagawa.
    Key-Private Proxy Re-Encryption from Lattices, Revisited.
    IEICE Transactions 2015, Volume 98 (0) 2015
    Conference paper
    Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa.
    Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly secure authenticated key exchange from factoring, codes, and lattices.
    Des. Codes Cryptography 2015, Volume 76 (0) 2015
    Conference paper
    Eiichiro Fujisaki, Keita Xagawa.
    Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.
    Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings 2015 (0) 2015
    Journal article
    Ryo Nishimaki, Keita Xagawa.
    Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES.
    Des. Codes Cryptography 2015, Volume 77 (0) 2015
    Conference paper
    Eiichiro Fujisaki, Keita Xagawa.
    Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
    IACR Cryptology ePrint Archive 2015, Volume 2015 (0) 2015
    Conference paper
    Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama.
    Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
    Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers 2015 (0) 2015
    Conference paper
    Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa.
    Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
    Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa.
    Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
    Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings 2014 (0) 2014
    Conference paper
    Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa.
    Non-malleable Multiple Public-Key Encryption.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    IEICE Transactions 2014, Volume 97 (0) 2014
    Conference paper
    Ryo Nishimaki, Keita Xagawa.
    Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
    Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Keita Xagawa.
    Improved (Hierarchical) Inner-Product Encryption from Lattices.
    Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Keita Xagawa.
    Message Authentication Codes Secure against Additively Related-Key Attacks.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
    8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013 2013 (0) 2013
    Conference paper
    Yosuke Todo, Keita Xagawa.
    Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012.
    IACR Cryptology ePrint Archive 2013, Volume 2013 (0) 2013
    Conference paper
    Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama.
    Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
    Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Security Enhancements by OR-Proof in Identity-Based Identification.
    Applied Cryptography and Network Security - 10th International Conference, ACNS 2012, Singapore, June 26-29, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Secure Hierarchical Identity-Based Identification without Random Oracles.
    Information Security - 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings 2012 (0) 2012
    Conference paper
    Atsushi Fujioka, Taiichi Saito, Keita Xagawa.
    Security Enhancement of Identity-Based Identification with Reversibility.
    Information and Communications Security - 14th International Conference, ICICS 2012, Hong Kong, China, October 29-31, 2012. Proceedings 2012 (0) 2012
    Show item 1 to 25 of 34  

    Your query returned 34 matches in the database.