Login / Signup
Yusuke Sakai
ORCID
Publication Activity (10 Years)
Years Active: 2010-2024
Publications (10 Years): 49
Top Topics
Group Signature
Diffie Hellman
Public Key Encryption
Encryption Scheme
Top Venues
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
IACR Cryptol. ePrint Arch.
ISITA
AsiaCCS
</>
Publications
</>
Kaoru Takemure
,
Yusuke Sakai
,
Bagus Santoso
,
Goichiro Hanaoka
,
Kazuo Ohta
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters for Standardized Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
107 (7) (2024)
Ryuya Hayashi
,
Yusuke Sakai
,
Shota Yamada
Attribute-Based Signatures for Circuits with Optimal Parameter Size from Standard Assumptions.
IACR Cryptol. ePrint Arch.
2024 (2024)
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Ryo Hiromasa
,
Yoshihiro Koseki
,
Takahiro Matsuda
,
Yutaro Nishida
,
Yusuke Sakai
,
Jacob C. N. Schuldt
,
Satoshi Yasuda
Privacy-Preserving Verifiable CNNs.
ACNS (2)
(2024)
Ryu Ishii
,
Kyosuke Yamashita
,
Zihao Song
,
Yusuke Sakai
,
Tadanori Teruya
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
,
Tsutomu Matsumoto
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
107 (4) (2024)
Shuichi Katsumata
,
Michael Reichle
,
Yusuke Sakai
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions.
ASIACRYPT (2)
(2023)
Shuichi Katsumata
,
Michael Reichle
,
Yusuke Sakai
Practical Round-Optimal Blind Signatures in the ROM from Standard Assumptions.
IACR Cryptol. ePrint Arch.
2023 (2023)
Kyosuke Yamashita
,
Ryu Ishii
,
Yusuke Sakai
,
Tadanori Teruya
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
,
Tsutomu Matsumoto
Fault-Tolerant Aggregate Signature Schemes against Bandwidth Consumption Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
106 (9) (2023)
Kaoru Takemure
,
Yusuke Sakai
,
Bagus Santoso
,
Goichiro Hanaoka
,
Kazuo Ohta
More Efficient Two-Round Multi-Signature Scheme with Provably Secure Parameters.
IACR Cryptol. ePrint Arch.
2023 (2023)
Yusuke Sakai
Succinct Attribute-Based Signatures for Bounded-Size Circuits by Combining Algebraic and Arithmetic Proofs.
SCN
(2022)
Ryu Ishii
,
Kyosuke Yamashita
,
Zihao Song
,
Yusuke Sakai
,
Tadanori Teruya
,
Goichiro Hanaoka
,
Kanta Matsuura
,
Tsutomu Matsumoto
Constraints and Evaluations on Signature Transmission Interval for Aggregate Signatures with Interactive Tracing Functionality.
ADIoT
(2022)
Ryu Ishii
,
Kyosuke Yamashita
,
Yusuke Sakai
,
Tadanori Teruya
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
,
Tsutomu Matsumoto
Aggregate Signature Schemes with Traceability of Devices Dynamically Generating Invalid Signatures.
IEICE Trans. Inf. Syst.
(11) (2022)
Ai Kitagawa
,
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Keisuke Tanaka
Fully Anonymous Group Signature with Verifier-Local Revocation.
IACR Cryptol. ePrint Arch.
2021 (2021)
Junichiro Hayata
,
Fuyuki Kitagawa
,
Yusuke Sakai
,
Goichiro Hanaoka
,
Kanta Matsuura
Equivalence between Non-Malleability against Replayable CCA and Other RCCA-Security Notions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2021)
Ryu Ishii
,
Kyosuke Yamashita
,
Yusuke Sakai
,
Takahiro Matsuda
,
Tadanori Teruya
,
Goichiro Hanaoka
,
Kanta Matsuura
,
Tsutomu Matsumoto
Aggregate Signature with Traceability of Devices Dynamically Generating Invalid Signatures.
ACNS Workshops
(2021)
Kaoru Takemure
,
Yusuke Sakai
,
Bagus Santoso
,
Goichiro Hanaoka
,
Kazuo Ohta
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2021)
Kaoru Takemure
,
Yusuke Sakai
,
Bagus Santoso
,
Goichiro Hanaoka
,
Kazuo Ohta
Achieving Pairing-Free Aggregate Signatures using Pre-Communication between Signers.
ProvSec
(2020)
Goichiro Hanaoka
,
Yusuke Sakai
,
Toshiya Shimizu
,
Takeshi Shimoyama
,
SeongHan Shin
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2020)
Satoshi Yasuda
,
Yoshihiro Koseki
,
Yusuke Sakai
,
Fuyuki Kitagawa
,
Yutaka Kawai
,
Goichiro Hanaoka
Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2020)
Yusuke Sakai
,
Goichiro Hanaoka
Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2020)
Junichiro Hayata
,
Masahito Ishizaka
,
Yusuke Sakai
,
Goichiro Hanaoka
,
Kanta Matsuura
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2020)
Goichiro Hanaoka
,
Misaki Komatsu
,
Kazuma Ohara
,
Yusuke Sakai
,
Shota Yamada
Semantic Definition of Anonymity in Identity-Based Encryption and Its Relation to Indistinguishability-Based Definition.
ESORICS (2)
(2020)
Goichiro Hanaoka
,
Kazuo Ohta
,
Yusuke Sakai
,
Bagus Santoso
,
Kaoru Takemure
,
Yunlei Zhao
Cryptanalysis of Aggregate Γ-Signature and Practical Countermeasures in Application to Bitcoin.
IACR Cryptol. ePrint Arch.
2020 (2020)
Ai Ishida
,
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Keisuke Tanaka
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
IACR Cryptol. ePrint Arch.
2019 (2019)
Kazuma Ohara
,
Keita Emura
,
Goichiro Hanaoka
,
Ai Ishida
,
Kazuo Ohta
,
Yusuke Sakai
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2019)
Yusuke Sakai
Recent Advances in Attribute-Based Signatures.
APKC@AsiaCCS
(2019)
Ai Ishida
,
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Keisuke Tanaka
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
AsiaCCS
(2019)
Ryo Kikuchi
,
Nuttapong Attrapadung
,
Koki Hamada
,
Dai Ikarashi
,
Ai Ishida
,
Takahiro Matsuda
,
Yusuke Sakai
,
Jacob C. N. Schuldt
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch.
2019 (2019)
Ryo Kikuchi
,
Nuttapong Attrapadung
,
Koki Hamada
,
Dai Ikarashi
,
Ai Ishida
,
Takahiro Matsuda
,
Yusuke Sakai
,
Jacob C. N. Schuldt
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
ACISP
(2019)
Junichiro Hayata
,
Fuyuki Kitagawa
,
Yusuke Sakai
,
Goichiro Hanaoka
,
Kanta Matsuura
Equivalence Between Non-malleability Against Replayable CCA and Other RCCA-Security Notions.
IWSEC
(2019)
Keita Emura
,
Goichiro Hanaoka
,
Yutaka Kawai
,
Takahiro Matsuda
,
Kazuma Ohara
,
Kazumasa Omote
,
Yusuke Sakai
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks
2019 (2019)
Satoshi Yasuda
,
Yoshihiro Koseki
,
Yusuke Sakai
,
Fuyuki Kitagawa
,
Yutaka Kawai
,
Goichiro Hanaoka
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
ProvSec
(2018)
Ai Ishida
,
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Keisuke Tanaka
Fully Anonymous Group Signature with Verifier-Local Revocation.
SCN
(2018)
Yusuke Sakai
,
Takahiro Matsuda
,
Goichiro Hanaoka
Tag-KEM/DEM Framework for Public-Key Encryption with Non-Interactive Opening.
IEICE Trans. Inf. Syst.
(11) (2018)
Nuttapong Attrapadung
,
Goichiro Hanaoka
,
Shigeo Mitsunari
,
Yusuke Sakai
,
Kana Shimizu
,
Tadanori Teruya
Efficient Two-level Homomorphic Encryption in Prime-order Bilinear Groups and A Fast Implementation in WebAssembly.
AsiaCCS
(2018)
Junichiro Hayata
,
Masahito Ishizaka
,
Yusuke Sakai
,
Goichiro Hanaoka
,
Kanta Matsuura
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption.
ISITA
(2018)
Yusuke Sakai
,
Shuichi Katsumata
,
Nuttapong Attrapadung
,
Goichiro Hanaoka
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
IACR Cryptol. ePrint Arch.
2018 (2018)
Yusuke Sakai
,
Shuichi Katsumata
,
Nuttapong Attrapadung
,
Goichiro Hanaoka
Attribute-Based Signatures for Unbounded Languages from Standard Assumptions.
ASIACRYPT (2)
(2018)
Yusuke Sakai
,
Nuttapong Attrapadung
,
Goichiro Hanaoka
Practical attribute-based signature schemes for circuits from bilinear map.
IET Inf. Secur.
12 (3) (2018)
Yusuke Sakai
,
Goichiro Hanaoka
A Remark on an Identity-Based Encryption Scheme with Non-interactive Opening.
ISITA
(2018)
Ai Ishida
,
Yusuke Sakai
,
Goichiro Hanaoka
A Consideration on the Transformation from Deniable Group Signature to Disavowable PKENO.
ISITA
(2018)
Sanami Nakagawa
,
Takashi Nishide
,
Eiji Okamoto
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Akihisa Kodate
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr.
3 (4) (2017)
Ai Ishida
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Keisuke Tanaka
Group Signature with Deniability: How to Disavow a Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2017)
Yusuke Sakai
,
Takahiro Matsuda
,
Goichiro Hanaoka
Tag-KEM/DEM framework for public-key encryption with non-interactive opening.
ISITA
(2016)
Yusuke Sakai
,
Nuttapong Attrapadung
,
Goichiro Hanaoka
Attribute-Based Signatures for Circuits from Bilinear Map.
IACR Cryptol. ePrint Arch.
2016 (2016)
Yusuke Sakai
,
Keita Emura
,
Jacob C. N. Schuldt
,
Goichiro Hanaoka
,
Kazuo Ohta
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci.
630 (2016)
Yusuke Sakai
,
Nuttapong Attrapadung
,
Goichiro Hanaoka
Attribute-Based Signatures for Circuits from Bilinear Map.
Public Key Cryptography (1)
(2016)
Ai Ishida
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Keisuke Tanaka
Group Signature with Deniability: How to Disavow a Signature.
CANS
(2016)
Takato Hirano
,
Mitsuhiro Hattori
,
Yutaka Kawai
,
Nori Matsuda
,
Mitsugu Iwamoto
,
Kazuo Ohta
,
Yusuke Sakai
,
Tatsuji Munaka
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
IWSEC
(2016)
Kazuma Ohara
,
Keita Emura
,
Goichiro Hanaoka
,
Ai Ishida
,
Kazuo Ohta
,
Yusuke Sakai
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IACR Cryptol. ePrint Arch.
2016 (2016)
Yusuke Sakai
,
Keita Emura
,
Jacob C. N. Schuldt
,
Goichiro Hanaoka
,
Kazuo Ohta
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
ACISP
(2015)
Ai Ishida
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Keisuke Tanaka
Disavowable Public Key Encryption with Non-interactive Opening.
AsiaCCS
(2015)
Ai Ishida
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Keisuke Tanaka
Group Signature with Deniability: How to Disavow a Signature.
IACR Cryptol. ePrint Arch.
2015 (2015)
Nuttapong Attrapadung
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
Revocable Group Signature with Constant-Size Revocation List.
Comput. J.
58 (10) (2015)
Ai Ishida
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Keisuke Tanaka
Disavowable Public Key Encryption with Non-Interactive Opening.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(12) (2015)
Nuttapong Attrapadung
,
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
ACNS
(2014)
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
,
Jacob C. N. Schuldt
Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec.
13 (1) (2014)
Sanami Nakagawa
,
Keita Emura
,
Goichiro Hanaoka
,
Akihisa Kodate
,
Takashi Nishide
,
Eiji Okamoto
,
Yusuke Sakai
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures.
TrustCom
(2014)
Kazuma Ohara
,
Yusuke Sakai
,
Fumiaki Yoshida
,
Mitsugu Iwamoto
,
Kazuo Ohta
Privacy-preserving smart metering with verifiability for both billing and energy management.
AsiaPKC@AsiaCCS
(2014)
Mitsuhiro Hattori
,
Takato Hirano
,
Takashi Ito
,
Nori Matsuda
,
Takumi Mori
,
Yusuke Sakai
,
Kazuo Ohta
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2013)
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Yutaka Kawai
,
Kazumasa Omote
Methods for Restricting Message Space in Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(6) (2013)
Kazuma Ohara
,
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
A group signature scheme with unbounded message-dependent opening.
AsiaCCS
(2013)
Yusuke Sakai
,
Jacob C. N. Schuldt
,
Keita Emura
,
Goichiro Hanaoka
,
Kazuo Ohta
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
IACR Cryptol. ePrint Arch.
2012 (2012)
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Yutaka Kawai
,
Takahiro Matsuda
,
Kazumasa Omote
Group Signatures with Message-Dependent Opening.
Pairing
(2012)
Yusuke Sakai
,
Jacob C. N. Schuldt
,
Keita Emura
,
Goichiro Hanaoka
,
Kazuo Ohta
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
Public Key Cryptography
(2012)
Yutaka Kawai
,
Yusuke Sakai
,
Noboru Kunihiro
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems.
J. Internet Serv. Inf. Secur.
1 (2/3) (2011)
Yusuke Sakai
,
Goichiro Hanaoka
,
Kaoru Kurosawa
,
Kazuo Ohta
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(6) (2011)
Mitsuhiro Hattori
,
Takato Hirano
,
Takashi Ito
,
Nori Matsuda
,
Takumi Mori
,
Yusuke Sakai
,
Kazuo Ohta
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
IMACC
(2011)
Yusuke Sakai
,
Keita Emura
,
Goichiro Hanaoka
,
Yutaka Kawai
,
Kazumasa Omote
Towards Restricting Plaintext Space in Public Key Encryption.
IWSEC
(2011)
Keita Emura
,
Goichiro Hanaoka
,
Yusuke Sakai
Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
IWSEC
(2010)
Yusuke Sakai
,
Goichiro Hanaoka
,
Kaoru Kurosawa
,
Kazuo Ohta
A Generic Method for Reducing Ciphertext Length of Reproducible KEMs in the RO Model.
IWSEC
(2010)