Last Update (yyyy/mm/dd): 2017/10/12

Japanese/English

AIST > ITRI > Members > Shota Yamada


Shota Yamada (山田翔太)

at Advanced Cryptography Research Group, Information Technology Research Institute (ITRI), National Institute of Advanced Industrial Science and Technology (AIST)

Contact

Short CV

I'm currently a research scientist at ITRI, AIST, Japan. I'm interested in Cryptography and Information Security.


Publications (Refereed)

Google Scholar, DBLP. 

 

2017

  1. Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, and Shota Yamada:
    Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Cryptosystems
    Designs, Codes and Cryptography. (To Appear. Full version of 7)
  1. Shweta Agrawal, , , , :
    Efficient Public Trace and Revoke from Standard Assumptions.
    ACM-CCS 2017 (
    To Appear. paper)
  1. Shota Yamada:
    Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques
    Proc. (Part 3) of CRYPTO 2017, LNCS 10401, pp. 161-193, Springer, 2017.  (paper)
  1. Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
    Private Similarity Searchable Encryption for Euclidean Distance
    IECIE Transaction. Vol. E100-D, No.10. pp. ????-????.  (To Appear. Full version of 22.)
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
    IEICE Transaction. Vol. E100-A, No.9. pp. 1882-1890. (To Appear. Full version of 14.)
  1. Go Ohtake, Kazuto Ogawa, Goichiro Hanaoka, Shota Yamada, Kohei Kasamatsu, Takashi Yamakawa, and Hideki Imai:
    Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation
    IEICE Transaction. Vol. E100-A, No.9. pp. 1846-1856. (To Appear. Full version of 10).
  1. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Algorithmica. 79(4), pp. 1286-1317. (Full version of 12).

2016

  1. Shuichi Katsumata, Shota Yamada:
    Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps
    Proc. (Part 2) of ASIACRYPT 2016, LNCS 10032, pp. 682-712, Springer, 2016. (paper)
  1. Yuji Unagami, Natsume Matsuzaki, Shota Yamada, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka:
    Private Similarity Searchable Encryption for Euclidian Distance
    Proc. of ISITA 2016, pp. 718-722, 2016.
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Kazuto Ogawa, Go Ohtake, Hajime Watanabe, Shota Yamada:
    Attribute-based Encryption for Range Attributes
    Proc. of SCN 2016, LNCS
     9841, pp. 42-61, Springer, 2016.  
  1. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
    Proc. (Part 2) of CRYPTO 2016, LNCS 9815, pp. 3-32, Springer, 2016. (paper)
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Tsutomu Matsumoto, Tadanori Teruya, Shota Yamada:
    Attribute Based Encryption with Direct Efficiency Tradeoff
    Proc. of
    ACNS 2016, LNCS 9696, pp. 249-266, Springer, 2016.
  1. Shota Yamada:
    Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
    Proc.
    (Part 2) of EUROCRYPT 2016, LNCS 9666, pp. 32-62, Springer, 2016. (paper)

2015

  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    A Framework for Identity-Based Encryption with Almost Tight Security
    Proc. (Part 1) of ASIACRYPT 2015, Vol. 9452, pp. 521-549, Springer, 2015. (paper)
  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
    Proc. (Part 1) of ASIACRYPT 2015, Vol. 9452, pp. 575-601, Springer, 2015. (paper)
  1. Nuttapong Attrapadung, Shota Yamada:
    Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings
    Proc. of CT-RSA 2015, Vol. 9046, pp. 87-105, Springer, 2015. (paper)

2014

  1. Nuttapong Attrapadung, Goichiro Hanaoka, Shota Yamada:
    New Security Proof for the Boneh-Boyen IBE: Tight Reduction in Unbounded Multi-Challenge Security
    Proc. of ICICS 2014, Vol. 8958, pp. 176-190, Springer, 2014.
  1. Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
    Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
    Proc. of
    SCN 2014, LNCS 8642, pp. 558-577, Springer, 2014.
  1. Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Proc. of
    CRYPTO 2014, LNCS 8617, pp. 90-107, Springer, 2014. (paper)
    Invited to Special Issues of Algorithmica (See 24).
  1. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
    A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
    Proc. of PKC 201
    4, LNCS 8383, pp. 275-292, Springer, 2014. (paper)

2013

  1. Go Ohtake, , Kai, , Hanaoka, , , Kasamatsu, , :
    Partially Wildcarded Attribute-based Encryption and Its Efficient Construction

    Proc. of SECRYPT 2013, pp. 339-346,
    SciTePress, 2013. (Short paper)
  1. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, and Noboru Kunihiro:
    Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length
    Proc. of
    ISC 2013, LNCS 7807, pp. 100-109, Springer, 2015. (Short Paper.)
  1. Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
    Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
    Proc. of ASIAPKC 2013, pp. 23-32, ACM, 2013.
  1. Keita Emura, Goichiro Hanaoka, Go Ohtake, Takahiro Matsuda, Shota Yamada:
    Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption
    Proc. of
    PKC 2013, LNCS 7778, pp. 32-50, Springer, 2013. (paper)

2012

  1. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Space Efficient Signature Schemes from the RSA Assumption
    Proc. of PKC 2012, LNCS 7293, pp. 102-119, Springer, 2012.
  1. Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
    Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication
    Proc. of PKC 2012, LNCS 7293
    , pp. 243-261, Springer, 2012.
  1. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More
    Proc. of CT-RSA 20
    12, LNCS 7178, pp. 260-277, Springer, 2012.

2011

  1. Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
    Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Proc. of PKC 2011, LNCS 6571, pp.
    71-89, Springer, 2011.

2010

  1. Shota Yamada, Yutaka Kawai, Goichiro Hanaoka, Noboru Kunihiro:
    Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
    IEICE Transactions. Vol. 93-A, Number 11, pp. 1984-1993, 2010.
  1. Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
    Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption

    Proc. of ProvSec 2010, LNCS. 6402, pp. 229-243, Springer, 2010.

Talks

            Partitioning Technique via Homomorphism: IBEs and VRFs with Improved Efficiency
-
Mathcrypt 2017, June. 29-30, 2017.
- Tokyo Crypto Day, October. 20, 2017.

        Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters
- Lattice meeting, May. 25, 2016
- ISEC, September 2, 2016.

        Conversions Among Several Classes of Predicate Encryption and Applications to ABE with Various Compactness Tradeoffs
- ISEC, May 19, 2016

        A Framework for Identity-Based Encryption with Almost Tight Security
-
The 9-th workshop on constructions of secure public key cryptography and its
   applications
, March 23, 2016

        A Framework and Compact Constructions for Non-monotonic Attribute-based Encryption
- PKC wo benkyousuru kai 2014, June. 23, 2014

        Space Efficient Signature Schemes from the RSA ssumption
- Kanda koukaikagi-angou workshop
, June. 21, 2012

        Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
- Kanda koukaikagi-angou workshop, June. 21, 2012

        Two Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More
-The 5-th workshop on constructions of secure public key cryptography and its
  applications
, February 23, 2012


Random Links

        IACR Cryptology ePrint Archive

        IACR

        Monthly Lattice meeting

        Aric Seminar

        Stanford security seminar

        difff- On line text compare

        Time Zone Converter