The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Masayuki Abe: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa
    Tag-KEM from Set Partial Domain One-Way Permutations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2006, pp:360-370 [Conf]
  2. Masayuki Abe, Hideki Imai
    Flaws in Some Robust Optimistic Mix-Nets. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:39-50 [Conf]
  3. Masayuki Abe, Masayuki Kanda
    A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2000, pp:163-177 [Conf]
  4. Masayuki Abe
    Mix-Networks on Permutation Networks. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:258-273 [Conf]
  5. Masayuki Abe, Ronald Cramer, Serge Fehr
    Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:206-223 [Conf]
  6. Masayuki Abe, Eiichiro Fujisaki
    How to Date Blind Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:244-251 [Conf]
  7. Masayuki Abe, Hikaru Morita
    Higher Radix Nonrestoring Modular Multiplication Algorithm and Public-key LSI Architecture with Limited Hardware Resources. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:365-375 [Conf]
  8. Masayuki Abe, Miyako Ohkubo
    Provably Secure Fair Blind Signatures with Tight Revocation. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2001, pp:583-602 [Conf]
  9. Masayuki Abe, Tatsuaki Okamoto
    A Signature Scheme with Message Recovery as Secure as Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:378-389 [Conf]
  10. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2002, pp:415-432 [Conf]
  11. Miyako Ohkubo, Masayuki Abe
    A Length-Invariant Hybrid Mix. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:178-191 [Conf]
  12. Masayuki Abe
    Robust Distributed Multiplicaton with out Interaction. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:130-147 [Conf]
  13. Masayuki Abe, Serge Fehr
    Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:317-334 [Conf]
  14. Masayuki Abe, Tatsuaki Okamoto
    Provably Secure Partially Blind Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2000, pp:271-286 [Conf]
  15. Masayuki Abe
    Securing "Encryption + Proof of Knowledge" in the Random Oracle Model. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2002, pp:277-289 [Conf]
  16. Masayuki Abe
    A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2001, pp:136-151 [Conf]
  17. Masayuki Abe
    Universally Verifiable Mix-net with Verification Work Indendent of the Number of Mix-servers. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:437-447 [Conf]
  18. Masayuki Abe, Rosario Gennaro, Kaoru Kurosawa, Victor Shoup
    Tag-KEM/DEM: A New Framework for Hybrid Encryption and A New Analysis of Kurosawa-Desmedt KEM. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2005, pp:128-146 [Conf]
  19. Masayuki Abe, Tatsuaki Okamoto
    Delegation Chains Secure up to Constant Length. [Citation Graph (0, 0)][DBLP]
    ICICS, 1999, pp:144-156 [Conf]
  20. Masayuki Abe, Koutarou Suzuki
    Receipt-Free Sealed-Bid Auction. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:191-199 [Conf]
  21. Fumitaka Hoshino, Masayuki Abe, Tetsutaro Kobayashi
    Lenient/Strict Batch Verification in Several Groups. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:81-94 [Conf]
  22. Miyako Ohkubo, Fumiaki Miura, Masayuki Abe, Atsushi Fujioka, Tatsuaki Okamoto
    An Improvement on a Practical Secret Voting Scheme. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:225-234 [Conf]
  23. Masayuki Abe, Fumitaka Hoshino
    Remarks on Mix-Network Based on Permutation Networks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2001, pp:317-324 [Conf]
  24. Masayuki Abe, Koutarou Suzuki
    M+1-st Price Auction Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:115-124 [Conf]
  25. Masayuki Abe, Serge Fehr
    Perfect NIZK with Adaptive Soundness. [Citation Graph (0, 0)][DBLP]
    TCC, 2007, pp:118-136 [Conf]
  26. Miyako Ohkubo, Masayuki Abe
    On the Definition of Anonymity for Ring Signatures. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:157-174 [Conf]
  27. Masayuki Abe
    Combining Encryption and Proof of Knowledge in the Random Oracle Model. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2004, v:47, n:1, pp:58-70 [Journal]
  28. Masayuki Abe, Masayuki Kanda
    A Key Escrow Scheme with Time-Limited Monitoring for One-way Communication Masayuki Abe and Masayuki Kanda. [Citation Graph (0, 0)][DBLP]
    Comput. J., 2002, v:45, n:6, pp:661-671 [Journal]
  29. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:131-140 [Journal]
  30. Koji Chida, Masayuki Abe
    Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:211-221 [Journal]

  31. Packet switched network in Japan. [Citation Graph (, )][DBLP]


  32. Chosen Ciphertext Security with Optimal Ciphertext Overhead. [Citation Graph (, )][DBLP]


  33. A Framework for Universally Composable Non-committing Blind Signatures. [Citation Graph (, )][DBLP]


  34. Structure-Preserving Signatures and Commitments to Group Elements. [Citation Graph (, )][DBLP]


  35. Compact CCA-Secure Encryption for Messages of Arbitrary Length. [Citation Graph (, )][DBLP]


  36. Efficient hybrid encryption from ID-based encryption. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.303secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002