default search action
Masahito Ishizaka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j3]Masahito Ishizaka, Kazuhide Fukushima:
Wildcarded identity-based ring signatures based on linearly homomorphic signatures. J. Inf. Secur. Appl. 75: 103499 (2023) - [c11]Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. ACISP 2023: 291-319 - [c10]Masahito Ishizaka:
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications. ProvSec 2023: 131-156 - [i8]Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. IACR Cryptol. ePrint Arch. 2023: 746 (2023) - [i7]Masahito Ishizaka:
Key-Range Attribute-Based Signatures for Range of Inner Product and Its Applications. IACR Cryptol. ePrint Arch. 2023: 747 (2023) - 2022
- [j2]Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-dimensional sub/super-range signatures. J. Inf. Secur. Appl. 65: 103084 (2022) - [c9]Masahito Ishizaka, Kazuhide Fukushima, Shinsaku Kiyomoto:
Trapdoor Sanitizable and Redactable Signatures with Unlinkability, Invisibility and Strong Context-Hiding. ICISC 2022: 337-362 - [c8]Masahito Ishizaka, Kazuhide Fukushima:
Attribute-Based Signatures for Range of Inner Product and Its Applications. ICISC 2022: 382-407 - [i6]Masahito Ishizaka, Kazuhide Fukushima:
Attribute-Based Signatures for Range of Inner Product and Its Applications. IACR Cryptol. ePrint Arch. 2022: 1451 (2022) - 2021
- [c7]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Takashi Ozu, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Automatic Security Inspection Framework for Trustworthy Supply Chain. SERA 2021: 45-50 - [i5]Masahito Ishizaka, Shinsaku Kiyomoto:
Multi-Dimensional Sub/Super-Range Signatures. IACR Cryptol. ePrint Arch. 2021: 698 (2021) - [i4]Masahito Ishizaka, Shinsaku Kiyomoto:
Downgradable Identity-Based Signatures and Trapdoor Sanitizable Signatures from Downgradable Affine MACs. IACR Cryptol. ePrint Arch. 2021: 1170 (2021) - 2020
- [j1]Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 107-113 (2020) - [c6]Yuto Nakano, Toru Nakamura, Yasuaki Kobayashi, Masahito Ishizaka, Masayuki Hashimoto, Hiroyuki Yokoyama, Yutaka Miyake, Shinsaku Kiyomoto:
Consideration on Data Conformance Toward Building Trust in Supply Chain. EuCNC 2020: 128-132 - [c5]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. ISC 2020: 20-38 - [i3]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Encryption with Constant-Size Secret-Keys Secure under Standard Assumption. IACR Cryptol. ePrint Arch. 2020: 595 (2020) - [i2]Masahito Ishizaka, Shinsaku Kiyomoto:
Time-Specific Signatures. IACR Cryptol. ePrint Arch. 2020: 658 (2020)
2010 – 2019
- 2019
- [c4]Shinsaku Kiyomoto, Yuto Nakano, Atsushi Waseda, Toru Nakamura, Masahito Ishizaka, Yasuaki Kobayashi:
A Framework for Secure and Trustworthy Data Management in Supply Chain. MobiWIS 2019: 148-159 - 2018
- [c3]Masahito Ishizaka, Kanta Matsuura:
Identity-Based Encryption Resilient to Auxiliary Leakage under the Decisional Linear Assumption. CANS 2018: 417-439 - [c2]Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta Matsuura:
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption. ISITA 2018: 707-711 - [c1]Masahito Ishizaka, Kanta Matsuura:
Strongly Unforgeable Signature Resilient to Polynomially Hard-to-Invert Leakage Under Standard Assumptions. ISC 2018: 422-441 - [i1]Masahito Ishizaka, Kanta Matsuura:
Strongly Unforgeable Signatures Resilient to Polynomially Hard-to-Invert Leakage under Standard Assumptions. IACR Cryptol. ePrint Arch. 2018: 1044 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint