1Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke TanakaAsiaCCS 2019
2Attribute Based Encryption (and more) for Nondeterministic Finite Automata from Learning With ErrorsShweta Agrawal, Monosij Maitra, Shota YamadaCRYPTO 2019
3Exploring Constructions of Compact NIZKs from Various AssumptionsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi YamakawaCRYPTO 2019
4CCA Security and Trapdoor Functions via Key-Dependent-Message SecurityFuyuki Kitagawa, Takahiro Matsuda, Keisuke TanakaCRYPTO 2019
5Field Extension in Secret-Shared Form and Its Applications to Efficient Secure ComputationRyo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C.N. SchuldtACISP 2019
※Best Paper Award受賞
6Efficient Estimation of Number of Short Lattice Vectors in Search Space under Randomness Assumption
Yoshitatsu Matsuda, Tadanori Teruya, Kenji KashiwabaraThe 6th ACM ASIA Public-Key Cryptography Workshop (APKC 2019)
7Equivalence between Non-Malleability against Replayable CCA and Other RCCA-security NotionsJunichiro Hayata, Fuyuki Kitagawa, Yusuke Sakai, Goichiro Hanaoka, Kanta MatsuuraIWSEC 2019
8Privacy-Preserving Deep Learning via Weight TransmissionLe Trieu Phong, Tran Thi PhuongIEEE Transactions on Information Forensics and Security
9Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiation from LatticesKeita Emura, Shuichi Katsumata, Yohei WatanabeESORICS 2019
10Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions
Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Takahiro Matsuda, Kazuma Ohara, Kazumasa Omote, Yusuke Sakai
Security and Communication Networks
11MOBIUS: Model-Oblivious Binarized Neural NetworksH. Kitai, J. Cruz, N. Yanai, N. Nishida, T. Oba, Y. Unagami, T. Teruya, N. Attrapadung, T. Matsuda, G. Hanaoka.IEEE ACCESS
12Client-Aided Two-party Secure Interval Test ProtocolHiraku Morita and Nuttapong AttrapadungCANS 2019
13A New Combiner for Key Encapsulation MechanismsTakahiro Matsuda, Jacob C.N. SchuldtIEICE Transactions
Vol.E102-A,No.12, 2019. 
14Simulation-based receiver selective opening CCA secure PKE from standard computational assumptionsKeisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:Theoretical Computer Science
15Simple and Efficient KDM-CCA Secure Public Key EncryptionFuyuki Kitagawa, Takahiro Matsuda, Keisuke TanakaASIACRYPT 2019
16CPA-to-CCA Transformation for KDM SecurityFuyuki Kitagawa, Takahiro MatsudaTCC 2019
17Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle ModelYusuke SAKAI, Goichiro HANAOKAIEICE Trans. Fundamentals
18Attribute Based Encryption for Deterministic FiniteAutomata fromDLINShweta Agrawal, Monosij Maitra, Shota YamadaTCC 2019
19Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its ApplicationsHiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro HanaokaIEICE Transactions, Vol.E103-A,No.01, 2020.
20Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.Satsuya Ohata, Koji NuidaFC'20
21Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable EncryptionJunichiro Hayata, Masahito Ishizaka, Yusuke Sakai, Goichiro Hanaoka, Kanta MatsuuraIEICE Transactions
22Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512Ali El Kaafarani, Shuichi Katsumata, Federico PintorePKC 2020
23Non-Interactive Zero-Knowledge in Pairing-Free Groups from Weaker AssumptionsGeoffroy Couteau, Shuichi Katsumata, Bogdan UrsuEUROCRYPT 2020
24Compact NIZKs from Standard Assumptions on Bilinear MapsShuichi Katsumata, Ryo Nishimaki, Shota Yamada, Takashi YamakawaEUROCRYPT 2020
25Optimal Broadcast Encryption from Pairings and LWEShweta Agrawal, Shota YamadaEUROCRYPT 2020
26Exposing Private User Behaviors of Collaborative Filtering via Model Inversion TechniquesSeira Hidano, Takao Murakami, Shuichi Katsumata, Shinsaku Kiyomoto, Goichiro HanaokaPoPETS/PETS 2020
27Lattice-based revocable (Hierarchical) IBE with decryption key exposure resistanceShuichi Katsumata, Takahiro Matsuda, AtsushiTakayasuTCS


1Recent Advances in Attribute-Based SignaturesYusuke Sakai