Program Committee
-
Current
ACM CCS 2024, TCC 2024 -
Upcoming
-
Past
CRYPTO 2024, 2022, 2021, 2019
Eurocrypt 2024, 2020
ACM CCS 2023, 2022
Asiacrypt 2023
TCC 2022, 2021, 2019
PKC 2023, 2020, 2018
SCN 2020, 2018
Indocrypt 2020, 2018
CSCML: 2020
Balkan CryptSec: 2018
Quantum Cryptography Workshop 2022 (program co-chair)
Journal Editor
Awards
- ACM CCS 2023 top reviewer awards
Conference Talks
- Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More
Eurocrypt 2024, May. 2024 - One-out-of-Many Unclonable Cryptography: Definitions, Constructions, and More
TCC 2023, Dec. 2023 - Public Key Encryption with Secure Key Leasing
Eurocrypt 2023, Apr. 2023 - Functional Encryption with Secure Key Leasing
Asiacrypt 2022, Dec. 2022 - The Direction of Updatable Encryption Does Matter
PKC 2022, Mar. 2022 - Secure Software Leasing from Standard Assumptions
TCC 2021, Nov. 2021 - Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions
Eurocrypt 2021, Oct. 2021 - Universal Proxy Re-Encryption
PKC 2021, May. 2021 - Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark)
TCC 2020, Dec. 2020 - Compact NIZKs from Standard Assumptions on Bilinear Maps
Eurocrypt 2020, May. 2020 - Compact Structure-preserving Signatures with Almost Tight Security
CRYPTO 2017, Aug. 2017 - Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Eurocrypt 2016, May. 2016 - Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
PKC 2014, Mar. 2014 - How to Watermark Cryptographic Functions
Eurocrypt 2013, May. 2013 - Tagged One-Time Signatures: Tight Security and Optimal Tag Size
PKC 2013, Apt. 2013 - Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
PKC 2013, Apr. 2013 - Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Asiacrypt 2012, Dec. 2012 - A Multi-trapdoor Commitment Scheme from the RSA Assumption
ACISP 2010, Jul. 2010 - Efficient Non-interactive Universally Composable String-Commitment Schemes
ProvSec 2009, Nov. 2009 - Universally Composable Identity-Based Encryption
VIETCRYPT 2006, Sep. 2006
Invited Talks
- Cryptography with certified deletion and secure key leasing
Warsaw IACR Summer School on Post-Quantum Cryptography 2024, Jul. 2024 - Compact Structure-preserving Signatures with Almost Tight Security
11th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2018 - Watermarking Cryptographic Capabilities
10th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Feb. 2017 - Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
ISEC, Sep. 2016 - Re-Encryption, Functional Re-Encryption, and Multi-Hop Re-Encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices
Jinbo-cho Angou Workshop, Jun. 2014 - How to Watermark Cryptographic Functions
7th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2014
ISEC, Sep. 2013 - Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES
Jinbo-cho Angou Workshop, Jun. 2013 - Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
6th Workshop on Publick Key Cryptography: Secure Constructions and Its Applications, Mar. 2013
Seminar Talks
- Compact NIZKs from Standard Assumptions on Bilinear Maps
CEF seminar, June. 2020 - Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously
UCLA seminar, Jan. 2019 - Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key
Shin-Akarui-Angou-Benkyou-Kai, Mar. 2016 - Watermarking Cryptographic Capabilities
ENS Crypto Team, May. 2016
Shin-Akarui-Angou-Benkyou-Kai, Apr. 2016
UCLA Obfuscation seminar, Nov. 2015 - Watermarking Cryptographic Programs Against Arbitrary Removal Strategies
Boston University, BUSec Seminar, May. 2015 - How to Watermark Cryptographic Functions
Northeastern University, Theory Seminar, Nov. 2014
Shin-Akarui-Angou-Benkyou-Kai, May. 2013 - Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions
Shin-Akarui-Angou-Benkyou-Kai, Nov. 2012
Internship Students
I worked (or am working) with the following students.
- Jeffrey Champion from UT Austin (Summer 2024)
- Simran Kumari from IIT Madras (Summer 2023)
- James Bartusek from UC Berkeley (Summer 2022)
- Léonard Assouline from ENS Lyon (Summer 2018)
- Alex Davidson from Royal Holloway (Spring 2018)
- Alexander Koch from KIT (Summer 2017)
- Fuyuki Kitagawa from Tokyo Tech (Summer 2016)
- Jiaxin Pan from Ruhr university Bochum (Spring 2016)
- Takashi Yamakawa from the university of Tokyo (Summer 2014)
- Angela Zottarel from Aarhus university (Summer 2012)
Organization
- NII Shonan Meeting: Workshop on Encrypted Computation / Enhancing Functionality in Cryptography (organizer)
- Quantum Cryptography Workshop 2022 (program co-chair)
- Tokyo Crypto Day (organizer)
- SCIS 2016 (organizing committee member)
- TCC 2013 (organizing committee member)