Katsuyuki Takashima

教授

  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20022021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2005

    Practical modifications of leadbitter et al.'s repeated-bits side-channel analysis on (EC)DSA

    Takashima, K., 2005, Information Security Applications - 6th International Workshop, WISA 2005, Revised Selected Papers. p. 259-270 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 3786 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2008

    Efficiently computable distortion maps for supersingular curves

    Takashima, K., 2008, Algorithmic Number Theory - 8th International Symposium, ANTS-VIII, Proceedings. p. 88-101 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5011 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Homomorphic encryption and signatures from vector decomposition

    Okamoto, T. & Takashima, K., 2008, Pairing-Based Cryptography - Pairing 2008 - Second International Conference, Proceedings. p. 57-74 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5209 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    91 Citations (Scopus)
  • 2009

    Hierarchical predicate encryption for inner-products

    Okamoto, T. & Takashima, K., 2009, Advances in Cryptology - ASIACRYPT 2009 - 15th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 214-231 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5912 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    204 Citations (Scopus)
  • 2010

    Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption

    Lewko, A., Okamoto, T., Sahai, A., Takashima, K. & Waters, B., 2010, Advances in Cryptology - Eurocrypt 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 62-91 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6110 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    887 Citations (Scopus)
  • Fully secure functional encryption with general relations from the decisional linear assumption

    Okamoto, T. & Takashima, K., 2010, Advances in Cryptology - CRYPTO 2010 - 30th Annual Cryptology Conference, Proceedings. p. 191-208 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6223 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    352 Citations (Scopus)
  • 2011

    Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption

    Okamoto, T. & Takashima, K., 2011, Cryptology and Network Security - 10th International Conference, CANS 2011, Proceedings. p. 138-159 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7092 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    58 Citations (Scopus)
  • Efficient attribute-based signatures for non-monotone predicates in the standard model

    Okamoto, T. & Takashima, K., 2011, Public Key Cryptography, PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Proceedings. p. 35-52 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6571 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    125 Citations (Scopus)
  • Some key techniques on pairing vector spaces

    Okamoto, T. & Takashima, K., 2011, Progress in Cryptology, AFRICACRYPT 2011 - 4th International Conference on Cryptology in Africa, Proceedings. p. 380-382 3 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6737 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2012

    Adaptively attribute-hiding (hierarchical) inner product encryption

    Okamoto, T. & Takashima, K., 2012, Advances in Cryptology, EUROCRYPT 2012 - 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. p. 591-608 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7237 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    121 Citations (Scopus)
  • Fully secure unbounded inner-product and attribute-based encryption

    Okamoto, T. & Takashima, K., 2012, Advances in Cryptology, ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. p. 349-366 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7658 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    124 Citations (Scopus)
  • 2013

    Decentralized attribute-based signatures

    Okamoto, T. & Takashima, K., 2013, Public-Key Cryptography, PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Proceedings. p. 125-142 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7778 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    88 Citations (Scopus)
  • 2014

    Expressive attribute-based encryption with constant-size ciphertexts from the decisional linear assumption

    Takashima, K., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 298-317 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    28 Citations (Scopus)
  • Recent topics on practical functional encryption

    Takashima, K., 2014, Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014. Institute of Electrical and Electronics Engineers Inc., p. 21-27 7 p. 7052159. (Proceedings - 2014 2nd International Symposium on Computing and Networking, CANDAR 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2017

    New proof techniques for DLIN-based adaptively secure attribute-based encryption

    Takashima, K., 2017, Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Proceedings. Pieprzyk, J. & Suriadi, S. (eds.). Springer Verlag, p. 85-105 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10342 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2018

    Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption

    Datta, P., Okamoto, T. & Takashima, K., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 640-672 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11273 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Unbounded Inner Product Functional Encryption from Bilinear Maps

    Tomida, J. & Takashima, K., 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Springer Verlag, p. 609-639 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11273 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2019

    Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs

    Datta, P., Okamoto, T. & Takashima, K., 2019, Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Sako, K. & Lin, D. (eds.). Springer Verlag, p. 127-158 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11442 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Multi-party Key Exchange Protocols from Supersingular Isogenies

    Furukawa, S., Kunihiro, N. & Takashima, K., 2019 Mar 8, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 208-212 5 p. 8664316. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • New assumptions on isogenous pairing groups with applications to attribute-based encryption

    Koshiba, T. & Takashima, K., 2019, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer Verlag, p. 3-19 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • One-Round Authenticated Group Key Exchange from Isogenies

    Fujioka, A., Takashima, K. & Yoneyama, K., 2019, Provable Security - 13th International Conference, ProvSec 2019, Proceedings. Steinfeld, R. & Yuen, T. H. (eds.). Springer, p. 330-338 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11821 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Supersingular isogeny diffie–hellman authenticated key exchange

    Fujioka, A., Takashima, K., Terada, S. & Yoneyama, K., 2019, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer Verlag, p. 177-195 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    10 Citations (Scopus)
  • 2020

    Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems

    Moriya, T., Takashima, K. & Takagi, T., 2020, Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Revised Selected Papers. Liu, Z. & Yung, M. (eds.). Springer, p. 86-98 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12020 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem

    Ikematsu, Y., Fukasaku, R., Kudo, M., Yasuda, M., Takashima, K. & Yokoyama, K., 2020 Oct 5, APKC 2020 - Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, Co-located with AsiaCCS 2020. Association for Computing Machinery, Inc, p. 36-44 9 p. (APKC 2020 - Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, Co-located with AsiaCCS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2021

    An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH

    Kawashima, T., Takashima, K., Aikawa, Y. & Takagi, T., 2021, 23rd International Conference, 2020, Proceedings. Hong, D. (ed.). Springer Science and Business Media Deutschland GmbH, p. 58-84 27 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12593 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)