Ryo Nishimaki

Cryptographer
@NTT, Japan
[DBLP], [Google Scholar]

home
publications
research activities
lectures
links

Preprints

  1. From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness
    Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
    ePrint archive » eprint
  2. Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption
    Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
    ePrint archive » eprint
  3. Simple Generic Constructions of Succinct Functional Encryption
    Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka
    ePrint archive » eprint

International Conferences

    2017

  1. Compact Structure-preserving Signatures with Almost Tight Security
    Masayuki Abe, Dennis Hofheinz, Ryo Nishimaki, Miyako Ohkubo, Jiaxin Pan
    CRYPTO 2017 (to appear) » eprint
  2. 2016

  3. From Cryptomania to Obfustopia through Secret-Key Functional Encryption
    Nir Bitansky, Ryo Nishimaki, Alain Passelègue, Daniel Wichs
    TCC 2016B (LNCS 9986) » eprint
  4. Watermarking Cryptographic Capabilities
    Aloni Cohen, Justin Holmgren, Ryo Nishimaki, Vinod Vaikuntanathan, Daniel Wichs
    STOC 2016 (ACM) » eprint
    This is a merged version of [NW15] and [CHV15] with additional results.
  5. Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    Ryo Nishimaki, Daniel Wichs, Mark Zhandry
    Eurocrypt 2016 (LNCS 9666) » eprint
  6. 2015

  7. Generalizing Efficeint Multiparty Computation
    Bernardo David, Ryo Nishimaki, Samuel Ranellucci, Alain Tapp
    ICITS 2015 (LNCS 9063) » eprint
  8. 2014

  9. Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
    Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa
    PKC 2014 (LNCS 8383) » eprint
  10. 2013

  11. Universally Composable Adaptive Oblivious Transfer with Access Control from Standard Assumptions
    Masayuki Abe, Jan Camenisch, Maria Dubovitskaya, Ryo Nishimaki
    ACM Digital Identity Management 2013 (ACM press)
  12. How to Watermark Cryptographic Functions
    Ryo Nishimaki
    Eurocrypt 2013 (LNCS 7881) » eprint
  13. Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
    Ryo Nishimaki, Keita Xagawa
    PKC 2013 (LNCS 7778) » eprint
  14. Tagged One-Time Signatures: Tight Security and Optimal Tag Size
    Masayuki Abe, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
    PKC 2013 (LNCS 7778) » eprint
  15. 2012

  16. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
    Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
    Asiacrypt 2012 (LNCS 7658) » eprint
    Invited to Journal of Cryptology
  17. 2010

  18. A Multi-trapdoor Commitment Scheme from the RSA Assumption
    Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
    ACISP 2010 (LNCS 6168)
  19. CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model
    Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka
    PKC 2010 (LNCS 6056)
    Subsequent to the publication of the above work, it was pointed out that the security proof is incorrect. See "On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010" in PKC 2011 for details.
  20. 2009

  21. On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions
    Eiichiro Fujisaki, Ryo Nishimaki, Keisuke Tanaka
    ProvSec 2009 (LNCS 5848)
  22. Efficient Non-interactive Universally Composable String-Commitment Schemes
    Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
    ProvSec 2009 (LNCS 5848)
  23. Security on Hybrid Encryption with the Tag-KEM/DEM Framework
    Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka
    ACISP 2009 (LNCS 5594)
  24. 2006

  25. Universally Composable Identity-Based Encryption
    Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
    VIETCRYPT 2006 (LNCS 4341)

Journal Articles

  1. Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
    Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss, Ryo Nishimaki, Miyako Ohkubo
    Journal of Cryptology 29(4): 833-878
  2. Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
    Ryo Nishimaki, Keita Xagawa
    Designs, Codes and Cryptography 77(1): 61-98
  3. Post-Challenge Leakage Resilient Public-Key Cryptosystem in Split State Model
    Eiichiro Fujisaki, Akinori Kawachi, Ryo Nishimaki, Keisuke Tanaka, and Kenji Yasunaga
    IEICE Transactions E98-A(3)
  4. Key-Private Proxy Re-Encryption from Lattices, Revisited
    Ryo Nishimaki, Keita Xagawa
    IEICE Transactions E98-A(1)
  5. An Efficient Non-interactive Universally Composable String-Commitment Scheme
    Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
    IEICE Transactions E95-A(1)
  6. A Multi-Trapdoor Commitment Scheme from the RSA Assumption
    Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
    IEICE Transactions E95-A(1)
  7. Universally Composable Identity-Based Encryption
    Ryo Nishimaki, Yoshifumi Manabe, Tatsuaki Okamoto
    IEICE Transactions E91-A(1)

Invited Papers

  1. Watermarking Cryptographic Programs (Survey paper)
    Ryo Nishimaki
    Mycrypt 2016 (LNCS 10311)

PhD Thesis

Unpublished Manuscripts

  1. Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
    Ryo Nishimaki, Daniel Wichs
    Most of the results in this paper are superseded by [CHN+16]

Books

  1. Theory of Public-Key Cryptography (in Japanese)
    Moriyama Daisuke, Ryo Nishimaki, Tatsuaki Okamoto
    The Japan Society for Industrial and Applied Mathematics (JSAIM) (Editor)
    KYORITSU SHUPPAN CO., LTD. (Publisher)
    Mar. 2011.

    Errata » pdf