Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption P Datta, T Okamoto, J Tomida Public-Key Cryptography–PKC 2018: 21st IACR International Conference on …, 2018 | 69 | 2018 |
Efficient functional encryption for inner-product values with full-hiding security J Tomida, M Abe, T Okamoto Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 51 | 2016 |
Fast, compact, and expressive attribute-based encryption J Tomida, Y Kawahara, R Nishimaki Designs, Codes and Cryptography 89, 2577-2626, 2021 | 36 | 2021 |
Multi-input quadratic functional encryption from pairings S Agrawal, R Goyal, J Tomida Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 36 | 2021 |
Tightly secure inner product functional encryption: Multi-input and function-hiding constructions J Tomida Theoretical Computer Science 833, 56-86, 2020 | 36 | 2020 |
Multi-party functional encryption S Agrawal, R Goyal, J Tomida Theory of Cryptography Conference, 224-255, 2021 | 30 | 2021 |
Unbounded inner product functional encryption from bilinear maps J Tomida, K Takashima Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018 | 26 | 2018 |
Unbounded dynamic predicate compositions in ABE from standard assumptions N Attrapadung, J Tomida Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 22* | 2020 |
Efficient secure three-party sorting with applications to data analysis and heavy hitters G Asharov, K Hamada, D Ikarashi, R Kikuchi, A Nof, B Pinkas, ... Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 19 | 2022 |
Multi-input quadratic functional encryption: Stronger security, broader functionality S Agrawal, R Goyal, J Tomida Theory of Cryptography Conference, 711-740, 2022 | 15 | 2022 |
Unbounded inner product functional encryption from bilinear maps J Tomida, K Takashima Japan Journal of Industrial and Applied Mathematics 37, 723-779, 2020 | 14 | 2020 |
Strongly secure identity-based key exchange with single pairing operation J Tomida, A Fujioka, A Nagai, K Suzuki Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 10 | 2019 |
Efficient inner product functional encryption with full-hiding security J Tomida, M Abe, T Okamoto IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020 | 9 | 2020 |
Organ-specific changes in norepinephrine turnover against various stress conditions in thermoneutral mice Y Teramura, A Terao, Y Okada, J Tomida, Y Okamatsu-Ogura, K Kimura Japanese Journal of Veterinary Research 62 (3), 117-127, 2014 | 6 | 2014 |
Unbounded quadratic functional encryption and more from pairings J Tomida Annual International Conference on the Theory and Applications of …, 2023 | 5 | 2023 |
Attribute-based multi-input FE (and more) for attribute-weighted sums S Agrawal, J Tomida, A Yadav Annual International Cryptology Conference, 464-497, 2023 | 4 | 2023 |
Secure statistical analysis on multiple datasets: Join and group-by G Asharov, K Hamada, R Kikuchi, A Nof, B Pinkas, J Tomida Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 3 | 2023 |
Communication-Efficient Inner Product Private Join and Compute with Cardinality K Chida, K Hamada, A Ichikawa, M Kii, J Tomida Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023 | 2 | 2023 |
Adaptively secure functional encryption for inner-product values J Tomida, M Abe, T Okamoto Symposium on cryptography and information security, 2016 | 2 | 2016 |
Revocable hierarchical identity-based authenticated key exchange Y Okano, J Tomida, A Nagai, K Yoneyama, A Fujioka, K Suzuki International Conference on Information Security and Cryptology, 3-27, 2021 | 1 | 2021 |