Last Update (yyyy/mm/dd): 2017/8/10

Japanese/English

AIST > ITRI > Members > Shota Yamada


Shota Yamada (山田翔太)

at Advanced Cryptography Research Group, Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)

Contact

Short CV

I'm currently a research scientist at ITRI, AIST, Japan. I'm interested in Cryptography and Information Security.


Publications (Refereed)

Google Scholar, DBLP. 

 

2017

  1. Shweta Agrawal, , , , :
    Efficient Public Trace and Revoke from Standard Assumptions.
    ACM-CCS 2017 (
    To Appear. paper)
  1. Shota Yamada:
    Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
    Proc. (Part 3) of CRYPTO 2017, LNCS 10401, pp. 161-193, Springer, 2017.  (paper)
  1. Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
    Private Similarity Searchable Encryption for Euclidean Distance
    IECIE Transaction  (To Appear. Full version of 22.)
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
    IEICE Transaction. Vol. E100-A, No.9. pp. ???-???. (To Appear. Full version of 14.)
  1. Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, and Hideki Imai:
    Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation
    IEICE Transaction. Vol. E100-A, No.9. pp. ???-???. (To Appear. Full version of 10).
  1. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Algorithmica. (To Appear. Full version of 12).]

2016

  1. Shuichi Katsumata, Shota Yamada:
    Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
    Proc. (Part 2) of ASIACRYPT 2016, LNCS 10032, pp. 682-712, Springer, 2016. (paper)
  1. Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
    Private Similarity Searchable Encryption for Euclidian Distance
    Proc. of ISITA 2016, pp. 718-722, 2016.
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
    Attribute-based Encryption for Range Attributes
    Proc. of SCN 2016, LNCS
     9841, pp. 42-61, Springer, 2016.  
  1. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
    Proc. (Part 2) of CRYPTO 2016, LNCS 9815, pp. 3-32, Springer, 2016. (paper)
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada:
    Attribute Based Encryption with Direct Efficiency Tradeoff
    Proc. of
    ACNS 2016, LNCS 9696, pp. 249-266, Springer, 2016.
  1. Shota Yamada:
    Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Proc.
    (Part 2) of EUROCRYPT 2016, LNCS 9666, pp. 32-62, Springer, 2016. (paper)

2015

  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    A Framework for Identity-Based Encryption with Almost Tight Security
    Proc. (Part 1) of ASIACRYPT 2015, Vol. 9452, pp. 521-549, Springer, 2015. (paper)
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
    Proc. (Part 1) of ASIACRYPT 2015, Vol. 9452, pp. 575-601, Springer, 2015. (paper)
  1. Nuttapong Attrapadung, Shota Yamada:
    Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
    Proc. of CT-RSA 2015, Vol. 9046, pp. 87-105, Springer, 2015. (paper)

2014

  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
    Proc. of ICICS 2014, Vol. 8958, pp. 176-190, Springer, 2014.
  1. Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
    Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
    Proc. of
    SCN 2014, LNCS 8642, pp. 558-577, Springer, 2014.
  1. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Proc. of
    CRYPTO 2014, LNCS 8617, pp. 90-107, Springer, 2014. (paper)
    Invited to Special Issues of Algorithmica (See 24).
  1. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
    A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
    Proc. of PKC 201
    4, LNCS 8383, pp. 275-292, Springer, 2014. (paper)

2013

  1. Go Ohtake, , Kai, , Hanaoka, , , Kasamatsu, , :
    Partially Wildcarded Attribute-based Encryption and Its Efficient Construction

    Proc. of SECRYPT 2013, pp. 339-346,
    SciTePress, 2013. (Short paper)
  1. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, and Noboru Kunihiro:
    Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
    Proc. of
    ISC 2013, LNCS 7807, pp. 100-109, Springer, 2015. (Short Paper.)
  1. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
    Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
    Proc. of ASIAPKC 2013, pp. 23-32, ACM, 2013.
  1. Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada:
    Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Proc. of
    PKC 2013, LNCS 7778, pp. 32-50, Springer, 2013. (paper)

2012

  1. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Space Efficient Signature Schemes from the RSA Assumption
    Proc. of PKC 2012, LNCS 7293, pp. 102-119, Springer, 2012.
  1. Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
    Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
    Proc. of PKC 2012, LNCS 7293
    , pp. 243-261, Springer, 2012.
  1. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More
    Proc. of CT-RSA 20
    12, LNCS 7178, pp. 260-277, Springer, 2012.

2011

  1. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
    Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Proc. of PKC 2011, LNCS 6571, pp.
    71-89, Springer, 2011.

2010

  1. Shota Yamada, Yutaka Kawai, Goichiro Hanaoka, Noboru Kunihiro:
    Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
    IEICE Transactions. Vol. 93-A, Number 11, pp. 1984-1993, 2010.
  1. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption

    Proc. of ProvSec 2010, LNCS. 6402, pp. 229-243, Springer, 2010.

Talks

            Partitioning Technique via Homomorphism: IBEs and VRFs with Improved Efficiency
-
Mathcrypt 2017, June. 29-30, 2017.

        Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
- Lattice meeting, May. 25, 2016
- ISEC, September 2, 2016.

        Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- ISEC, May 19, 2016

        A Framework for Identity-Based Encryption with Almost Tight Security
-
The 9-th workshop on constructions of secure public key cryptography and its
   applications
, March 23, 2016

        A Framework and Compact Constructions for Non-monotonic Attribute-based Encryption
- PKC wo benkyousuru kai 2014, June. 23, 2014

        Space Efficient Signature Schemes from the RSA ssumption
- Kanda koukaikagi-angou workshop
, June. 21, 2012

        Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
- Kanda koukaikagi-angou workshop, June. 21, 2012

        Two Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More
-The 5-th workshop on constructions of secure public key cryptography and its
  applications
, February 23, 2012


Random Links

        IACR Cryptology ePrint Archive

        IACR

        Monthly Lattice meeting

        Aric Seminar

        Stanford security seminar

        difff- On line text compare