Search Results - "Xagawa, Keita"
-
1
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs
Published in IACR transactions on cryptographic hardware and embedded systems (19-11-2021)“…This paper presents a side-channel analysis (SCA) on key encapsulation mechanism (KEM) based on the Fujisaki–Okamoto (FO) transformation and its variants. The…”
Get full text
Journal Article -
2
Strongly secure authenticated key exchange from factoring, codes, and lattices
Published in Designs, codes, and cryptography (01-09-2015)“…An unresolved problem in research on authenticated key exchange (AKE) in the public-key setting is to construct a secure protocol against advanced attacks such…”
Get full text
Journal Article -
3
Cryptanalysis of Boyen’s attribute-based encryption scheme in TCC 2013
Published in Designs, codes, and cryptography (2022)“…In TCC 2013, Boyen suggested the first lattice based construction of attribute based encryption ( ABE ) for the circuit class NC 1 . Unfortunately, soon after,…”
Get full text
Journal Article -
4
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs
Published in IACR transactions on cryptographic hardware and embedded systems (09-06-2023)“…In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its…”
Get full text
Journal Article -
5
Cryptanalysis of a rank-based signature with short public keys
Published in Designs, codes, and cryptography (01-04-2020)“…Following Schnorr framework for obtaining digital signatures, Song et al. recently proposed a new instantiation of a signature scheme featuring small public…”
Get full text
Journal Article -
6
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
Published in Designs, codes, and cryptography (01-10-2015)“…Verifiably encrypted signatures (VES) are encrypted signatures under a public key of a trusted third party. We can verify their validity without decryption…”
Get full text
Journal Article -
7
Quantum Group Actions
Published 07-10-2024“…In quantum cryptography, there could be a new world, Microcrypt, where cryptography is possible but one-way functions (OWFs) do not exist. Although many…”
Get full text
Journal Article -
8
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures
Published in International journal of information security (01-04-2018)“…Let us consider a situation where a client (Alice) frequently buys a certain kind of product from a shop (Bob) (e.g., an online music service sells individual…”
Get full text
Journal Article -
9
Secure multi-party quantum computation protocol for quantum circuits: the exploitation of triply-even quantum error-correcting codes
Published 15-11-2024“…Phys. Rev. A 110, 022444 (2024) Secure multi-party quantum computation (MPQC) protocol is a cryptographic primitive allowing error-free distributed quantum…”
Get full text
Journal Article -
10
An improvement on the versatility of secure multi-party quantum computation protocol: exploitation of triorthogonal quantum error-correcting codes
Published 01-11-2022“…Secure multi-party quantum computation (MPQC) protocol is a versatile tool that enables error-free distributed quantum computation to a group of $n$ mutually…”
Get full text
Journal Article -
11
Quantum Algorithm for the Multicollision Problem
Published 07-11-2019“…The current paper presents a new quantum algorithm for finding multicollisions, often denoted by $\ell$-collisions, where an $\ell$-collision for a function is…”
Get full text
Journal Article -
12
Improved Quantum Multicollision-Finding Algorithm
Published 20-11-2018“…The current paper improves the number of queries of the previous quantum multi-collision finding algorithms presented by Hosoyamada et al. at Asiacrypt 2017…”
Get full text
Journal Article