Ishizaka, Masahito
19  Ergebnisse:
Personensuche X
?
1

Key-Range Attribute-Based Signatures for Range of Inner Pro..:

, In: Provable and Practical Security; Lecture Notes in Computer Science,
Ishizaka, Masahito - p. 131-156 , 2023
 
?
2

Wildcarded identity-based ring signatures based on linearly..:

Ishizaka, Masahito ; Fukushima, Kazuhide
Journal of Information Security and Applications.  75 (2023)  - p. 103499 , 2023
 
?
3

Homomorphic Signatures for Subset and Superset Mixed Predic..:

, In: Information Security and Privacy; Lecture Notes in Computer Science,
Ishizaka, Masahito ; Fukushima, Kazuhide - p. 291-319 , 2023
 
?
4

Attribute-Based Signatures for Range of Inner Product and I..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
Ishizaka, Masahito ; Fukushima, Kazuhide - p. 382-407 , 2023
 
?
5

Trapdoor Sanitizable and Redactable Signatures with Unlinka..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
 
?
6

Multi-dimensional sub/super-range signatures:

Ishizaka, Masahito ; Kiyomoto, Shinsaku
Journal of Information Security and Applications.  65 (2022)  - p. 103084 , 2022
 
?
7

Consideration on Data Conformance Toward Building Trust in ..:

, In: 2020 European Conference on Networks and Communications (EuCNC),
Nakano, Yuto ; Nakamura, Toru ; Kobayashi, Yasuaki... - p. 128-132 , 2020
 
?
8

Generic Construction of Adaptively Secure Anonymous Key-Pol..:

HAYATA, Junichiro ; ISHIZAKA, Masahito ; SAKAI, Yusuke..
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E103.A (2020)  1 - p. 107-113 , 2020
 
?
9

Time-Specific Signatures:

, In: Lecture Notes in Computer Science; Information Security,
 
?
10

A Framework for Secure and Trustworthy Data Management in S..:

, In: Mobile Web and Intelligent Information Systems; Lecture Notes in Computer Science,
Kiyomoto, Shinsaku ; Nakano, Yuto ; Waseda, Atsushi... - p. 148-159 , 2019
 
?
11

Strongly Unforgeable Signature Resilient to Polynomially Ha..:

, In: Developments in Language Theory; Lecture Notes in Computer Science,
Ishizaka, Masahito ; Matsuura, Kanta - p. 422-441 , 2018
 
?
12

Identity-Based Encryption Resilient to Auxiliary Leakage un..:

, In: Cryptology and Network Security; Lecture Notes in Computer Science,
Ishizaka, Masahito ; Matsuura, Kanta - p. 417-439 , 2018
 
1-15