Personal information

Activities

Works (45)

Attribute-Based Encryption for Range Attributes

IEICE Transactions
2018 | Journal article
Source: Self-asserted source
Shota Yamada

Chosen ciphertext secure keyed-homomorphic public-key cryptosystems

Des. Codes Cryptography
2018 | Journal article
Source: Self-asserted source
Shota Yamada

Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map

IACR Cryptology ePrint Archive
2018 | Journal article
Source: Self-asserted source
Shota Yamada

Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance

IACR Cryptology ePrint Archive
2018 | Journal article
Source: Self-asserted source
Shota Yamada

Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model

Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II
2018-12 | Journal article
Source: Self-asserted source
Shota Yamada

Constrained PRFs for NC1 in Traditional Groups

Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II
2018-08 | Journal article
Source: Self-asserted source
Shota Yamada

Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques

Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III
2017 | Journal article
Source: Self-asserted source
Shota Yamada

Efficient Public Trace and Revoke from Standard Assumptions

IACR Cryptology ePrint Archive
2017 | Journal article
Source: Self-asserted source
Shota Yamada

Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017
2017 | Conference paper
Source: Self-asserted source
Shota Yamada

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security

IEICE Transactions
2017 | Journal article
Source: Self-asserted source
Shota Yamada

Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation

IEICE Transactions
2017 | Journal article
Source: Self-asserted source
Shota Yamada

Private Similarity Searchable Encryption for Euclidean Distance

IEICE Transactions
2017 | Journal article
Source: Self-asserted source
Shota Yamada

Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017

2017 | Conference paper
Part of ISBN: 978-1-4503-4946-8
Source: Self-asserted source
Shota Yamada

Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications

Algorithmica
2017 | Journal article
Source: Self-asserted source
Shota Yamada

2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016

2016 | Conference paper
Part of ISBN: 978-4-88552-309-0
Source: Self-asserted source
Shota Yamada

Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters

IACR Cryptology ePrint Archive
2016 | Journal article
Source: Self-asserted source
Shota Yamada

Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II

2016 | Conference paper
Part of ISBN: 978-3-662-53889-0
Source: Self-asserted source
Shota Yamada

Advances in Cryptology - CRYPTO 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part II

2016 | Conference paper
Part of ISBN: 978-3-662-53007-8
Source: Self-asserted source
Shota Yamada

Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II

2016 | Conference paper
Part of ISBN: 978-3-662-49895-8
Source: Self-asserted source
Shota Yamada

Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli

IACR Cryptology ePrint Archive
2016 | Journal article
Source: Self-asserted source
Shota Yamada

Applied Cryptography and Network Security - 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings

2016 | Conference paper
Part of ISBN: 978-3-319-39554-8
Source: Self-asserted source
Shota Yamada

Private similarity searchable encryption for Euclidean distance

2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016
2016 | Conference paper
Source: Self-asserted source
Shota Yamada

Security and Cryptography for Networks - 10th International Conference, SCN 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings

2016 | Conference paper
Part of ISBN: 978-3-319-44617-2
Source: Self-asserted source
Shota Yamada

Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps

Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}
2016-12 | Journal article
Source: Self-asserted source
Shota Yamada

A Framework for Identity-Based Encryption with Almost Tight Security

IACR Cryptology ePrint Archive
2015 | Journal article
Source: Self-asserted source
Shota Yamada

Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I

2015 | Conference paper
Part of ISBN: 978-3-662-48796-9
Source: Self-asserted source
Shota Yamada

Conversions among Several Classes of Predicate Encryption and Their Applications

IACR Cryptology ePrint Archive
2015 | Journal article
Source: Self-asserted source
Shota Yamada

Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings

IACR Cryptology ePrint Archive
2015 | Journal article
Source: Self-asserted source
Shota Yamada

Information and Communications Security - 16th International Conference, ICICS 2014, Hong Kong, China, December 16-17, 2014, Revised Selected Papers

2015 | Conference paper
Part of ISBN: 978-3-319-21965-3
Source: Self-asserted source
Shota Yamada

Information Security, 16th International Conference, ISC 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings

2015 | Conference paper
Part of ISBN: 978-3-319-27658-8
Source: Self-asserted source
Shota Yamada

Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications

IACR Cryptology ePrint Archive
2015 | Journal article
Source: Self-asserted source
Shota Yamada

Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings

2015 | Conference paper
Part of ISBN: 978-3-319-16714-5
Source: Self-asserted source
Shota Yamada

A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption

IACR Cryptology ePrint Archive
2014 | Journal article
Source: Self-asserted source
Shota Yamada

Advances in Cryptology - CRYPTO 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II

2014 | Conference paper
Part of ISBN: 978-3-662-44380-4
Source: Self-asserted source
Shota Yamada

Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings

2014 | Conference paper
Part of ISBN: 978-3-642-54630-3
Source: Self-asserted source
Shota Yamada

Security and Cryptography for Networks - 9th International Conference, SCN 2014, Amalfi, Italy, September 3-5, 2014. Proceedings

2014 | Conference paper
Part of ISBN: 978-3-319-10878-0
Source: Self-asserted source
Shota Yamada

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption

IACR Cryptology ePrint Archive
2013 | Journal article
Source: Self-asserted source
Shota Yamada

Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism

Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013
2013 | Conference paper
Source: Self-asserted source
Shota Yamada

Partially Wildcarded Attribute-based Encryption and Its Efficient Construction

SECRYPT 2013 - Proceedings of the 10th International Conference on Security and Cryptography, Reykjavík, Iceland, 29-31 July, 2013
2013 | Conference paper
Source: Self-asserted source
Shota Yamada

Proceedings of the first ACM workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013

2013 | Conference paper
Part of ISBN: 978-1-4503-2069-6
Source: Self-asserted source
Shota Yamada

Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings

2013 | Conference paper
Part of ISBN: 978-3-642-36361-0
Source: Self-asserted source
Shota Yamada

Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings

2012 | Conference paper
Part of ISBN: 978-3-642-27953-9
Source: Self-asserted source
Shota Yamada

Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings

2011 | Conference paper
Part of ISBN: 978-3-642-19378-1
Source: Self-asserted source
Shota Yamada

Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings

2010 | Conference paper
Part of ISBN: 978-3-642-16279-4
Source: Self-asserted source
Shota Yamada

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency

IEICE Transactions
2010 | Journal article
Source: Self-asserted source
Shota Yamada