Ryo Nishimaki
Ryo Nishimaki
NTT Secure Platform Laboratories
Verified email at hco.ntt.co.jp - Homepage
Title
Cited by
Cited by
Year
Constant-size structure-preserving signatures: Generic constructions and simple assumptions
M Abe, M Chase, B David, M Kohlweiss, R Nishimaki, M Ohkubo
Asiacrypt, 2012
109*2012
Tagged one-time signatures: Tight security and optimal tag size
M Abe, B David, M Kohlweiss, R Nishimaki, M Ohkubo
International Workshop on Public Key Cryptography, 312-331, 2013
802013
Watermarking cryptographic capabilities
A Cohen, J Holmgren, R Nishimaki, V Vaikuntanathan, D Wichs
SIAM Journal on Computing 47 (6), 2157-2202, 2018
622018
CCA proxy re-encryption without bilinear maps in the standard model
T Matsuda, R Nishimaki, K Tanaka
Public Key Cryptography–PKC 2010, 261-278, 2010
622010
From cryptomania to obfustopia through secret-key functional encryption
N Bitansky, R Nishimaki, A Passelegue, D Wichs
Journal of Cryptology 33 (2), 357-405, 2020
512020
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
372014
Compact structure-preserving signatures with almost tight security
M Abe, D Hofheinz, R Nishimaki, M Ohkubo, J Pan
Annual International Cryptology Conference, 548-580, 2017
312017
Anonymous traitor tracing: how to embed arbitrary information in a key
R Nishimaki, D Wichs, M Zhandry
Annual International Conference on the Theory and Applications of …, 2016
302016
Obfustopia built on secret-key functional encryption
F Kitagawa, R Nishimaki, K Tanaka
Annual International Conference on the Theory and Applications of …, 2018
232018
Information generation apparatus, method, program, and recording medium for deriving a decryption key from another decryption key
K Suzuki, R Nishimaki
US Patent 8,619,980, 2013
232013
How to watermark cryptographic functions
R Nishimaki
Annual International Conference on the Theory and Applications of …, 2013
232013
An efficient non-interactive universally composable string-commitment scheme
R Nishimaki, E Fujisaki, K Tanaka
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2012
222012
Key-private proxy re-encryption from lattices, revisited
R Nishimaki, K Xagawa
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
192015
Designated verifier/prover and preprocessing NIZKs from Diffie-Hellman assumptions
S Katsumata, R Nishimaki, S Yamada, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2019
172019
Watermarking Cryptographic Programs Against Arbitrary Removal Strategies.
R Nishimaki, D Wichs
IACR Cryptol. ePrint Arch. 2015, 344, 2015
172015
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
R Nishimaki, K Xagawa
Designs, Codes and Cryptography 77 (1), 61-98, 2015
172015
Universally composable adaptive oblivious transfer (with access control) from standard assumptions
M Abe, J Camenisch, M Dubovitskaya, R Nishimaki
Proceedings of the 2013 ACM workshop on Digital identity management, 1-12, 2013
152013
Constrained PRFs for in Traditional Groups
N Attrapadung, T Matsuda, R Nishimaki, S Yamada, T Yamakawa
Annual International Cryptology Conference, 543-574, 2018
142018
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
F Kitagawa, R Nishimaki, K Tanaka
IACR Cryptol. ePrint Arch. 2017, 361, 2017
122017
Universally composable identity-based encryption
R Nishimaki, Y Manabe, T Okamoto
IEICE transactions on fundamentals of electronics, communications and …, 2008
102008
The system can't perform the operation now. Try again later.
Articles 1–20