Program Committee
-
Current
-
Upcoming
TCC 2025 -
Past
CRYPTO 2024, 2022, 2021, 2019
Eurocrypt 2024, 2020
ACM CCS ACM CCS 2024, 2023, 2022
Asiacrypt 2023
TCC 2024, 2022, 2021, 2019
PKC 2023, 2020, 2018
SCN 2020, 2018
Indocrypt 2020, 2018
CSCML: 2020
Balkan CryptSec: 2018
Quantum Cryptography Workshop 2022 (program co-chair)
Journal Editor
Awards
- ACM CCS 2023 top reviewer awards
Conference Talks
- Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Eurocrypt 2024, May. 2024 - One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More
TCC 2023, Dec. 2023 - Public Key Encryption with Secure Key Leasing
Eurocrypt 2023, Apr. 2023 - Functional Encryption with Secure Key Leasing
Asiacrypt 2022, Dec. 2022 - The Direction of Updatable Encryption Does Matter
PKC 2022, Mar. 2022 - Secure Software Leasing from Standard Assumptions
TCC 2021, Nov. 2021 - Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Eurocrypt 2021, Oct. 2021 - Universal Proxy Re-Encryption
PKC 2021, May. 2021 - Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
TCC 2020, Dec. 2020 - Compact NIZKs from Standard Assumptions on Bilinear Maps
Eurocrypt 2020, May. 2020 - Compact Structure-preserving Signatures with Almost Tight Security
CRYPTO 2017, Aug. 2017 - Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Eurocrypt 2016, May. 2016 - Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
PKC 2014, Mar. 2014 - How to Watermark Cryptographic Functions
Eurocrypt 2013, May. 2013 - Tagged One-Time Signatures: Tight Security and Optimal Tag Size
PKC 2013, Apt. 2013 - Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
PKC 2013, Apr. 2013 - Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Asiacrypt 2012, Dec. 2012 - A Multi-trapdoor Commitment Scheme from the RSA Assumption
ACISP 2010, Jul. 2010 - Efficient Non-interactive Universally Composable String-Commitment Schemes
ProvSec 2009, Nov. 2009 - Universally Composable Identity-Based Encryption
VIETCRYPT 2006, Sep. 2006
Invited Talks
- Advanced Cryptography with Certified Deletion
2025 EIMS-KMS International Workshop on Cryptography, Feb. 2025 - Cryptography with certified deletion and secure key leasing
Warsaw IACR Summer School on Post-Quantum Cryptography 2024, Jul. 2024 - Compact Structure-preserving Signatures with Almost Tight Security
11th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2018 - Watermarking Cryptographic Capabilities
10th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Feb. 2017 - Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
ISEC, Sep. 2016 - Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
Jinbo-cho Angou Workshop, Jun. 2014 - How to Watermark Cryptographic Functions
7th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2014
ISEC, Sep. 2013 - Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Jinbo-cho Angou Workshop, Jun. 2013 - Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
6th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2013
Seminar Talks
- Compact NIZKs from Standard Assumptions on Bilinear Maps
CEF seminar, June. 2020 - Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
UCLA seminar, Jan. 2019 - Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Shin-Akarui-Angou-Benkyou-Kai, Mar. 2016 - Watermarking Cryptographic Capabilities
ENS Crypto Team, May. 2016
Shin-Akarui-Angou-Benkyou-Kai, Apr. 2016
UCLA Obfuscation seminar, Nov. 2015 - Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Boston University, BUSec Seminar, May. 2015 - How to Watermark Cryptographic Functions
Northeastern University, Theory Seminar, Nov. 2014
Shin-Akarui-Angou-Benkyou-Kai, May. 2013 - Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Shin-Akarui-Angou-Benkyou-Kai, Nov. 2012
Internship Students and Postdocs
I worked (or am working) with the following students and postdocs.
postdocs
- Tapas Pal (Jan. 2022 - Dec. 2023)
students
- Nikhil Pappu from Portland State University (Summer 2024)
- Dominique Bazin from ENS, PSL University (Summer 2024)
- Jeffrey Champion from UT Austin (Summer 2024)
- Simran Kumari from IIT Madras (Summer 2023)
- James Bartusek from UC Berkeley (Summer 2022)
- Léonard Assouline from ENS Lyon (Summer 2018)
- Alex Davidson from Royal Holloway (Spring 2018)
- Alexander Koch from KIT (Summer 2017)
- Fuyuki Kitagawa from Tokyo Tech (Summer 2016)
- Jiaxin Pan from Ruhr university Bochum (Spring 2016)
- Takashi Yamakawa from the university of Tokyo (Summer 2014)
- Angela Zottarel from Aarhus university (Summer 2012)
Organization
- NII Shonan Meeting: Workshop on Encrypted Computation / Enhancing Functionality in Cryptography (organizer)
- Quantum Cryptography Workshop 2022 (program co-chair)
- Tokyo Crypto Day (organizer)
- SCIS 2016 (organizing committee member)
- TCC 2013 (organizing committee member)