Research activities

Program Committee


Journal Editor


Awards


  • ACM CCS 2023 top reviewer awards

Conference Talks


  • Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
    Eurocrypt 2024, May. 2024
  • One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More
    TCC 2023, Dec. 2023
  • Public Key Encryption with Secure Key Leasing
    Eurocrypt 2023, Apr. 2023
  • Functional Encryption with Secure Key Leasing
    Asiacrypt 2022, Dec. 2022
  • The Direction of Updatable Encryption Does Matter
    PKC 2022, Mar. 2022
  • Secure Software Leasing from Standard Assumptions
    TCC 2021, Nov. 2021
  • Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
    Eurocrypt 2021, Oct. 2021
  • Universal Proxy Re-Encryption
    PKC 2021, May. 2021
  • Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
    TCC 2020, Dec. 2020
  • Compact NIZKs from Standard Assumptions on Bilinear Maps
    Eurocrypt 2020, May. 2020
  • Compact Structure-preserving Signatures with Almost Tight Security
    CRYPTO 2017, Aug. 2017
  • Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    Eurocrypt 2016, May. 2016
  • Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
    PKC 2014, Mar. 2014
  • How to Watermark Cryptographic Functions
    Eurocrypt 2013, May. 2013
  • Tagged One-Time Signatures: Tight Security and Optimal Tag Size
    PKC 2013, Apt. 2013
  • Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
    PKC 2013, Apr. 2013
  • Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
    Asiacrypt 2012, Dec. 2012
  • A Multi-trapdoor Commitment Scheme from the RSA Assumption
    ACISP 2010, Jul. 2010
  • Efficient Non-interactive Universally Composable String-Commitment Schemes
    ProvSec 2009, Nov. 2009
  • Universally Composable Identity-Based Encryption
    VIETCRYPT 2006, Sep. 2006

Invited Talks


  • Cryptography with certified deletion and secure key leasing
    Warsaw IACR Summer School on Post-Quantum Cryptography 2024, Jul. 2024
  • Compact Structure-preserving Signatures with Almost Tight Security
    11th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2018
  • Watermarking Cryptographic Capabilities
    10th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Feb. 2017
  • Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    ISEC, Sep. 2016
  • Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
    Jinbo-cho Angou Workshop, Jun. 2014
  • How to Watermark Cryptographic Functions
    7th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2014
    ISEC, Sep. 2013
  • Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
    Jinbo-cho Angou Workshop, Jun. 2013
  • Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
    6th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2013

Seminar Talks


  • Compact NIZKs from Standard Assumptions on Bilinear Maps
    CEF seminar, June. 2020
  • Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
    UCLA seminar, Jan. 2019
  • Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
    Shin-Akarui-Angou-Benkyou-Kai, Mar. 2016
  • Watermarking Cryptographic Capabilities
    ENS Crypto Team, May. 2016
    Shin-Akarui-Angou-Benkyou-Kai, Apr. 2016
    UCLA Obfuscation seminar, Nov. 2015
  • Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
    Boston University, BUSec Seminar, May. 2015
  • How to Watermark Cryptographic Functions
    Northeastern University, Theory Seminar, Nov. 2014
    Shin-Akarui-Angou-Benkyou-Kai, May. 2013
  • Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
    Shin-Akarui-Angou-Benkyou-Kai, Nov. 2012

Internship Students


I worked (or am working) with the following students.

  • Jeffrey Champion from UT Austin (Summer 2024)
  • Simran Kumari from IIT Madras (Summer 2023)
  • James Bartusek from UC Berkeley (Summer 2022)
  • Léonard Assouline from ENS Lyon (Summer 2018)
  • Alex Davidson from Royal Holloway (Spring 2018)
  • Alexander Koch from KIT (Summer 2017)
  • Fuyuki Kitagawa from Tokyo Tech (Summer 2016)
  • Jiaxin Pan from Ruhr university Bochum (Spring 2016)
  • Takashi Yamakawa from the university of Tokyo (Summer 2014)
  • Angela Zottarel from Aarhus university (Summer 2012)

Organization