default search action
Shuichi Katsumata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin:
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. Des. Codes Cryptogr. 92(11): 3587-3643 (2024) - [j11]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. J. Cryptol. 37(3): 23 (2024) - [c39]Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:
Two-Round Threshold Signature from Algebraic One-More Learning with Errors. CRYPTO (7) 2024: 387-424 - [c38]Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi:
Raccoon: A Masking-Friendly Signature Proven in the Probing Model. CRYPTO (1) 2024: 409-444 - [c37]Shuichi Katsumata, Michael Reichle, Kaoru Takemure:
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding. CRYPTO (7) 2024: 459-491 - [c36]Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen:
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. EUROCRYPT (2) 2024: 219-248 - [c35]Shuichi Katsumata, Yi-Fu Lai, Michael Reichle:
Breaking Parallel ROS: Implication for Isogeny and Lattice-Based Blind Signatures. Public Key Cryptography (1) 2024: 319-351 - [i37]Rafaël Del Pino, Shuichi Katsumata, Mary Maller, Fabrice Mouhartem, Thomas Prest, Markku-Juhani O. Saarinen:
Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions. IACR Cryptol. ePrint Arch. 2024: 184 (2024) - [i36]Thomas Espitau, Shuichi Katsumata, Kaoru Takemure:
Two-Round Threshold Signature from Algebraic One-More Learning with Errors. IACR Cryptol. ePrint Arch. 2024: 496 (2024) - [i35]Shuichi Katsumata, Michael Reichle, Kaoru Takemure:
Adaptively Secure 5 Round Threshold Signatures from MLWE/MSIS and DL with Rewinding. IACR Cryptol. ePrint Arch. 2024: 1033 (2024) - [i34]Rafaël del Pino, Shuichi Katsumata, Thomas Prest, Mélissa Rossi:
Raccoon: A Masking-Friendly Signature Proven in the Probing Model. IACR Cryptol. ePrint Arch. 2024: 1291 (2024) - [i33]Goichiro Hanaoka, Shuichi Katsumata, Kei Kimura, Kaoru Takemure, Shota Yamada:
Tighter Adaptive IBEs and VRFs: Revisiting Waters' Artificial Abort. IACR Cryptol. ePrint Arch. 2024: 1481 (2024) - 2023
- [j10]Shuichi Katsumata, Toi Tomita, Shota Yamada:
Direct computation of branching programs and its applications to more efficient lattice-based cryptography. Des. Codes Cryptogr. 91(2): 391-431 (2023) - [j9]Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore:
Group signatures and more from isogenies and lattices: generic, simple, and efficient. Des. Codes Cryptogr. 91(6): 2141-2200 (2023) - [c34]Shuichi Katsumata, Michael Reichle, Yusuke Sakai:
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions. ASIACRYPT (2) 2023: 383-417 - [c33]Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin:
CSI -Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist. CRYPTO (3) 2023: 729-761 - [c32]Ryuya Hayashi, Taiki Asano, Junichiro Hayata, Takahiro Matsuda, Shota Yamada, Shuichi Katsumata, Yusuke Sakai, Tadanori Teruya, Jacob C. N. Schuldt, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Tsutomu Matsumoto:
Signature for Objects: Formalizing How to Authenticate Physical Data and More. FC (1) 2023: 182-199 - [i32]Shuichi Katsumata, Yi-Fu Lai, Jason T. LeGrow, Ling Qin:
CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist. IACR Cryptol. ePrint Arch. 2023: 1239 (2023) - [i31]Shuichi Katsumata, Michael Reichle, Yusuke Sakai:
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions. IACR Cryptol. ePrint Arch. 2023: 1447 (2023) - [i30]Shuichi Katsumata, Yi-Fu Lai, Michael Reichle:
Breaking Parallel ROS: Implication for Isogeny and Lattice-based Blind Signatures. IACR Cryptol. ePrint Arch. 2023: 1603 (2023) - 2022
- [j8]Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable. J. Cryptol. 35(3): 17 (2022) - [j7]Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-based encryption with security against the KGC: A formal model and its instantiations. Theor. Comput. Sci. 900: 97-119 (2022) - [c31]Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest:
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. CCS 2022: 1399-1412 - [c30]Rafaël del Pino, Shuichi Katsumata:
A New Framework for More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling. CRYPTO (2) 2022: 306-336 - [c29]Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore:
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient. EUROCRYPT (2) 2022: 95-126 - [i29]Rafaël del Pino, Shuichi Katsumata:
A New Framework For More Efficient Round-Optimal Lattice-Based (Partially) Blind Signature via Trapdoor Sampling. IACR Cryptol. ePrint Arch. 2022: 834 (2022) - [i28]Keitaro Hashimoto, Shuichi Katsumata, Thomas Prest:
How to Hide MetaData in MLS-Like Secure Group Messaging: Simple, Modular, and Post-Quantum. IACR Cryptol. ePrint Arch. 2022: 1533 (2022) - 2021
- [j6]Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. J. Cryptol. 34(1): 5 (2021) - [j5]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact Designated Verifier NIZKs from the CDH Assumption Without Pairings. J. Cryptol. 34(4): 42 (2021) - [c28]Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan:
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. CCS 2021: 1441-1462 - [c27]Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi:
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. CCS 2021: 2046-2065 - [c26]Shuichi Katsumata:
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs. CRYPTO (2) 2021: 580-610 - [c25]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. EUROCRYPT (1) 2021: 404-434 - [c24]Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. Public Key Cryptography (2) 2021: 410-440 - [c23]Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu:
Statistical ZAPs from Group-Based Assumptions. TCC (1) 2021: 466-498 - [i27]Shuichi Katsumata, Takahiro Matsuda, Wataru Nakamura, Kazuma Ohara, Kenta Takahashi:
Revisiting Fuzzy Signatures: Towards a More Risk-Free Cryptographic Authentication System based on Biometrics. CoRR abs/2112.08658 (2021) - [i26]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions. IACR Cryptol. ePrint Arch. 2021: 306 (2021) - [i25]Keitaro Hashimoto, Shuichi Katsumata, Kris Kwiatkowski, Thomas Prest:
An Efficient and Generic Construction for Signal's Handshake (X3DH): Post-Quantum, State Leakage Secure, and Deniable. IACR Cryptol. ePrint Arch. 2021: 616 (2021) - [i24]Geoffroy Couteau, Shuichi Katsumata, Elahe Sadeghi, Bogdan Ursu:
Statistical ZAPs from Group-Based Assumptions. IACR Cryptol. ePrint Arch. 2021: 688 (2021) - [i23]Shuichi Katsumata:
A New Simple Technique to Bootstrap Various Lattice Zero-Knowledge Proofs to QROM Secure NIZKs. IACR Cryptol. ePrint Arch. 2021: 927 (2021) - [i22]Ward Beullens, Samuel Dobson, Shuichi Katsumata, Yi-Fu Lai, Federico Pintore:
Group Signatures and More from Isogenies and Lattices: Generic, Simple, and Efficient. IACR Cryptol. ePrint Arch. 2021: 1366 (2021) - [i21]Keitaro Hashimoto, Shuichi Katsumata, Eamonn W. Postlethwaite, Thomas Prest, Bas Westerbaan:
A Concrete Treatment of Efficient Continuous Group Key Agreement via Multi-Recipient PKEs. IACR Cryptol. ePrint Arch. 2021: 1407 (2021) - 2020
- [j4]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Exposing Private User Behaviors of Collaborative Filtering via Model Inversion Techniques. Proc. Priv. Enhancing Technol. 2020(3): 264-283 (2020) - [j3]Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu:
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance. Theor. Comput. Sci. 809: 103-136 (2020) - [c22]Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest:
Scalable Ciphertext Compression Techniques for Post-quantum KEMs and Their Applications. ASIACRYPT (1) 2020: 289-320 - [c21]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Inner Product Encryption from LWE. ASIACRYPT (3) 2020: 375-404 - [c20]Ward Beullens, Shuichi Katsumata, Federico Pintore:
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. ASIACRYPT (2) 2020: 464-492 - [c19]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. CRYPTO (1) 2020: 559-589 - [c18]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. EUROCRYPT (3) 2020: 379-409 - [c17]Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu:
Non-interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions. EUROCRYPT (3) 2020: 442-471 - [c16]Ali El Kaafarani, Shuichi Katsumata, Federico Pintore:
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. Public Key Cryptography (2) 2020: 157-186 - [i20]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Constrained Pseudorandom Functions in the Standard Model. IACR Cryptol. ePrint Arch. 2020: 111 (2020) - [i19]Ali El Kaafarani, Shuichi Katsumata, Federico Pintore:
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512. IACR Cryptol. ePrint Arch. 2020: 124 (2020) - [i18]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Compact NIZKs from Standard Assumptions on Bilinear Maps. IACR Cryptol. ePrint Arch. 2020: 223 (2020) - [i17]Geoffroy Couteau, Shuichi Katsumata, Bogdan Ursu:
Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker Assumptions. IACR Cryptol. ePrint Arch. 2020: 535 (2020) - [i16]Ward Beullens, Shuichi Katsumata, Federico Pintore:
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices. IACR Cryptol. ePrint Arch. 2020: 646 (2020) - [i15]Shuichi Katsumata, Kris Kwiatkowski, Federico Pintore, Thomas Prest:
Scalable Ciphertext Compression Techniques for Post-Quantum KEMs and their Applications. IACR Cryptol. ePrint Arch. 2020: 1107 (2020) - [i14]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Adaptively Secure Inner Product Encryption from LWE. IACR Cryptol. ePrint Arch. 2020: 1135 (2020)
2010 – 2019
- 2019
- [c15]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Exploring Constructions of Compact NIZKs from Various Assumptions. CRYPTO (3) 2019: 639-669 - [c14]Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices. ESORICS (2) 2019: 113-133 - [c13]Shuichi Katsumata, Shota Yamada:
Group Signatures Without NIZK: From Lattices in the Standard Model. EUROCRYPT (3) 2019: 312-344 - [c12]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. EUROCRYPT (2) 2019: 622-651 - [c11]Shuichi Katsumata, Shota Yamada:
Non-zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. Public Key Cryptography (2) 2019: 158-188 - [c10]Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu:
Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. Public Key Cryptography (2) 2019: 441-471 - [i13]Shuichi Katsumata, Shota Yamada:
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. IACR Cryptol. ePrint Arch. 2019: 36 (2019) - [i12]Shuichi Katsumata, Shota Yamada:
Group Signatures without NIZK: From Lattices in the Standard Model. IACR Cryptol. ePrint Arch. 2019: 221 (2019) - [i11]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. IACR Cryptol. ePrint Arch. 2019: 255 (2019) - [i10]Shuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi Yamakawa:
Exploring Constructions of Compact NIZKs from Various Assumptions. IACR Cryptol. ePrint Arch. 2019: 623 (2019) - [i9]Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations. IACR Cryptol. ePrint Arch. 2019: 1384 (2019) - 2018
- [j2]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Online Prediction Systems: Without Knowledge of Non-Sensitive Attributes. IEICE Trans. Inf. Syst. 101-D(11): 2665-2676 (2018) - [c9]Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. ASIACRYPT (2) 2018: 253-282 - [c8]Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. ASIACRYPT (2) 2018: 493-522 - [c7]Ali El Kaafarani, Shuichi Katsumata, Ravital Solomon:
Anonymous Reputation Systems Achieving Full Dynamicity from Lattices. Financial Cryptography 2018: 388-406 - [c6]Ali El Kaafarani, Shuichi Katsumata:
Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. Public Key Cryptography (2) 2018: 89-119 - [i8]Ali El Kaafarani, Shuichi Katsumata:
Attribute-based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. IACR Cryptol. ePrint Arch. 2018: 22 (2018) - [i7]Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu:
Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance. IACR Cryptol. ePrint Arch. 2018: 420 (2018) - [i6]Shuichi Katsumata, Shota Yamada, Takashi Yamakawa:
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2018: 451 (2018) - [i5]Yusuke Sakai, Shuichi Katsumata, Nuttapong Attrapadung, Goichiro Hanaoka:
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 842 (2018) - [i4]Shuichi Katsumata, Shota Yamada:
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance. IACR Cryptol. ePrint Arch. 2018: 914 (2018) - [i3]Alex Davidson, Shuichi Katsumata, Ryo Nishimaki, Shota Yamada:
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance. IACR Cryptol. ePrint Arch. 2018: 982 (2018) - 2017
- [j1]Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1804-1815 (2017) - [c5]Shuichi Katsumata:
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications. ASIACRYPT (3) 2017: 95-125 - [c4]Seira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro Hanaoka:
Model Inversion Attacks for Prediction Systems: Without Knowledge of Non-Sensitive Attributes. PST 2017: 115-126 - [i2]Shuichi Katsumata:
On the Untapped Potential of Encoding Predicates by Arithmetic Circuits and Their Applications. IACR Cryptol. ePrint Arch. 2017: 808 (2017) - 2016
- [c3]Shuichi Katsumata, Shota Yamada:
Partitioning via Non-linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps. ASIACRYPT (2) 2016: 682-712 - [i1]Shuichi Katsumata, Shota Yamada:
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps. IACR Cryptol. ePrint Arch. 2016: 843 (2016) - 2015
- [c2]Shuichi Katsumata, Akiko Takeda:
Robust Cost Sensitive Support Vector Machine. AISTATS 2015 - 2014
- [c1]Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. ProvSec 2014: 223-242
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:36 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint