Hierarchical Identity-based Matchmaking Encryption S Chiku, K Hara, J Shikata IEICE Technical Report; IEICE Tech. Rep. 123 (129), 60-67, 2023 | 2 | 2023 |
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions S Chiku, K Hashimoto, K Hara, J Shikata Cryptology ePrint Archive, 2023 | 2 | 2023 |
Identity-Based Matchmaking Encryption Secure Against Key Generation Center S Chiku, K Hara, J Shikata International Conference on Provable Security, 251-273, 2023 | 1 | 2023 |
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities S Chiku, K Hara, J Shikata International Conference on Information Security Practice and Experience …, 2023 | 1 | 2023 |
How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption S Chiku, K Hara, K Hashimoto, T Tomita, J Shikata International Conference on Cryptology and Network Security, 145-165, 2024 | | 2024 |
Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption S Chiku, K Hara, J Shikata Cryptology ePrint Archive, 2024 | | 2024 |