Personal information

Activities

Works (28)

Attribute Based Encryption with Direct Efficiency Tradeoff

Applied Cryptography and Network Security, Acns 2016
2016 | Book chapter
WOSUID:

WOS:000386324500014

Contributors: Attrapadung, N.; Hanaoka, G.; Matsumoto, T.; Teruya, T.; Yamada, S.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Attribute-Based Encryption for Range Attributes

Security and Cryptography for Networks, Scn 2016
2016 | Book chapter
WOSUID:

WOS:000389516500003

Contributors: Attrapadung, N.; Hanaoka, G.; Ogawa, K.; Ohtake, G.; Watanabe, H.; Yamada, S.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Dual System Encryption Framework in Prime-Order Groups via Computational Pair Encodings

Advances in Cryptology - Asiacrypt 2016, Pt Ii
2016 | Book chapter
WOSUID:

WOS:000389691800020

Contributors: Attrapadung, N.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Private Similarity Searchable Encryption for Euclidean Distance

Proceedings of 2016 International Symposium on Information Theory and Its Applications (Isita 2016)
2016 | Journal article
WOSUID:

WOS:000399119600146

Contributors: Unagami, Y.; Matsuzaki, N.; Yamada, S.; Attrapadungt, N.; Matsuda, T.; Hanaoku, G.; Ieee,
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Time-specific encryption from forward-secure encryption: generic and direct constructions

International Journal of Information Security
2016 | Journal article
WOSUID:

WOS:000383515500006

Contributors: Kasamatsu, K.; Matsuda, T.; Emura, K.; Attrapadung, N.; Hanaoka, G.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

A Framework for Identity-Based Encryption with Almost Tight Security

Advances in Cryptology - Asiacrypt 2015, Pt I
2015 | Book chapter
WOSUID:

WOS:000375148100022

Contributors: Attrapadung, N.; Hanaoka, G.; Yamada, S.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs

Advances in Cryptology - Asiacrypt 2015, Pt I
2015 | Book chapter
WOSUID:

WOS:000375148100024

Contributors: Attrapadung, N.; Hanaoka, G.; Yamada, S.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Efficient and Fully Secure Forward Secure Ciphertext-Policy Attribute-Based Encryption

Information Security
2015 | Book chapter
WOSUID:

WOS:000375849500006

Contributors: Kitagawa, T.; Kojima, H.; Attrapadung, N.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-challenge Security

Information and Communications Security, Icics 2014
2015 | Book chapter
WOSUID:

WOS:000365045200013

Contributors: Attrapadung, N.; Hanaoka, G.; Yamada, S.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Privacy-preserving search for chemical compound databases

Bmc Bioinformatics
2015 | Journal article
WOSUID:

WOS:000367881100007

Contributors: Shimizu, K.; Nuida, K.; Arai, H.; Mitsunari, S.; Attrapadung, N.; Hamada, M.; Tsuda, K.; Hirokawa, T.; Sakuma, J.; Hanaoka, G. et al.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Revocable Group Signature with Constant-Size Revocation List

Computer Journal
2015 | Journal article
WOSUID:

WOS:000362959000035

Contributors: Attrapadung, N.; Emura, K.; Hanaoka, G.; Sakai, Y.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption

Public-Key Cryptography - Pkc 2014
2014 | Book chapter
WOSUID:

WOS:000342284300016

Contributors: Yamada, S.; Attrapadung, N.; Hanaoka, G.; Kunihiro, N.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List

Applied Cryptography and Network Security, Acns 2014
2014 | Book chapter
WOSUID:

WOS:000342831300027

Contributors: Attrapadung, N.; Emura, K.; Hanaoka, G.; Sakai, Y.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Dual System Encryption via Doubly Selective Security: Framework, Fully Secure Functional Encryption for Regular Languages, and More

Advances in Cryptology - Eurocrypt 2014
2014 | Book chapter
WOSUID:

WOS:000352691200031

Contributors: Attrapadung, N.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Attribute-based encryption schemes with constant-size ciphertexts

Theoretical Computer Science
2012 | Journal article
WOSUID:

WOS:000301209500002

Contributors: Attrapadung, N.; Herranz, J.; Laguillaumie, F.; Libert, B.; de Panafieu, E.; Rafols, C.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts

Public Key Cryptography - Pkc 2011
2011 | Book chapter
WOSUID:

WOS:000297040400006

Contributors: Attrapadung, N.; Libert, B.; de Panafieu, E.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption

Public Key Cryptography - Pkc 2011
2011 | Book chapter
WOSUID:

WOS:000297040400005

Contributors: Yamada, S.; Attrapadung, N.; Hanaoka, G.; Kunihiro, N.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Homomorphic Network Coding Signatures in the Standard Model

Public Key Cryptography - Pkc 2011
2011 | Book chapter
WOSUID:

WOS:000297040400002

Contributors: Attrapadung, N.; Libert, B.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Secure Broadcast System with Simultaneous Individual Messaging

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2011 | Journal article
WOSUID:

WOS:000292480700014

Contributors: Fujii, A.; Ohtake, G.; Hanaoka, G.; Attrapadung, N.; Watanabe, H.; Ogawa, K.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2010 | Journal article
WOSUID:

WOS:000274505900013

Contributors: Attrapadung, N.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes

Cryptography and Coding, Proceedings
2009 | Book chapter
WOSUID:

WOS:000278556200017

Contributors: Attrapadung, N.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Conjunctive Broadcast and Attribute-Based Encryption

Pairing-Based Cryptography - Pairing 2009
2009 | Book chapter
WOSUID:

WOS:000271641000016

Contributors: Attrapadung, N.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Dual-Policy Attribute Based Encryption

Applied Cryptography and Network Security
2009 | Book chapter
WOSUID:

WOS:000267695100011

Contributors: Attrapadung, N.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

A strongly unforgeable signature under the CDH assumption without collision resistant hash functions

Ieice Transactions on Information and Systems
2008 | Journal article
WOSUID:

WOS:000256860900027

Contributors: Matsuda, T.; Attrapadung, N.; Hanaoka, G.; Matsuura, K.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

A CDH-based strongly unforgeable signature without collision resistant hash function

Provable Security, Proceedings
2007 | Book chapter
WOSUID:

WOS:000251784900005

Contributors: Matsuda, T.; Attrapadung, N.; Hanaoka, G.; Matsuura, K.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Efficient identity-based encryption with tight security reduction

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2007 | Journal article
WOSUID:

WOS:000250093700011

Contributors: Attrapadung, N.; Furukawa, J.; Gomi, T.; Hanaoka, G.; Imai, H.; Zhang, R.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Practical broadcast encryption from graph-theoretic techniques and subset-incremental-chain structure

Ieice Transactions on Fundamentals of Electronics Communications and Computer Sciences
2007 | Journal article
WOSUID:

WOS:000243703300021

Contributors: Attrapadung, N.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID

Forward-secure and searchable broadcast encryption with short ciphertexts and private keys

Advances in Cryptology - Asiacrypt 2006
2006 | Book chapter
WOSUID:

WOS:000244667200011

Contributors: Attrapadung, N.; Furukawa, J.; Imai, H.
Source: Self-asserted source
Nuttapong Attrapadung via ResearcherID