Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fuyuki Kitagawa is active.

Publication


Featured researches published by Fuyuki Kitagawa.


public key cryptography | 2016

On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions

Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka

In PKC 1999, Fujisaki and Okamoto showed how to convert any public key encryption PKE scheme secure against chosen plaintext attacks CPA to a PKE scheme which is secure against chosen ciphertext attacks CCA in the random oracle model. Surprisingly, the resulting CCA secure scheme has almost the same efficiency as the underlying CPA secure scheme. Moreover, in J. Cryptology 2013, they proposed more efficient conversion by using the hybrid encryption framework. In this work, we clarify whether these two constructions are also secure in the sense of key dependent message security against chosen ciphertext attacks KDM-CCA security, under exactly the same assumptions on the building blocks as those used by Fujisaki and Okamoto. Specifically, we show two results: Firstly, we show that the construction proposed in PKC 1999 does not satisfy


the cryptographers’ track at the rsa conference | 2015

Completeness of Single-Bit Projection-KDM Security for Public Key Encryption

Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka


public key cryptography | 2018

Key Dependent Message Security and Receiver Selective Opening Security for Identity-Based Encryption

Fuyuki Kitagawa; Keisuke Tanaka

\text {KDM}\text {-}\text {CCA}


international conference on information security and cryptology | 2014

Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks

Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka


public key cryptography | 2018

Simple and Generic Constructions of Succinct Functional Encryption

Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka

KDM-CCA security generally. Secondly, on the other hand, we show that the construction proposed in J. Cryptology 2013 satisfies


theory and application of cryptographic techniques | 2018

Obfustopia Built on Secret-Key Functional Encryption

Fuyuki Kitagawa; Ryo Nishimaki; Keisuke Tanaka


provable security | 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols

Satoshi Yasuda; Yoshihiro Koseki; Yusuke Sakai; Fuyuki Kitagawa; Yutaka Kawai; Goichiro Hanaoka

\text {KDM}\text {-}\text {CCA}


international conference on security and cryptography | 2018

Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions

Keisuke Hara; Fuyuki Kitagawa; Takahiro Matsuda; Goichiro Hanaoka; Keisuke Tanaka


Archive | 2018

A Framework for Achieving KDM-CCA Secure Public-Key Encryption

Fuyuki Kitagawa; Keisuke Tanaka

KDM-CCA security.


Archive | 2018

Constructions for the IND-CCA1 Secure Fully Homomorphic Encryption

Satoshi Yasuda; Fuyuki Kitagawa; Keisuke Tanaka

Applebaum (EUROCRYPT 2011, J. Cryptology 2014) showed that it is possible to convert a public key encryption (PKE) scheme which is key dependent message (KDM) secure with respect to projection functions (also called projection-KDM secure) into a PKE scheme which is KDM secure with respect to any function family that can be computed in fixed polynomial time, without using any other assumption. This result holds in both of the chosen plaintext attack (CPA) and the chosen ciphertext attack (CCA) settings. In the CPA setting, he furthermore showed that even a projection-KDM secure 1-bit PKE scheme is sufficient to construct a KDM secure PKE scheme with respect to polynomial time computable functions. The existence of the latter trivially implies that of the former, and in this sense, he mentioned that single-bit projection-KDM security in the CPA setting and (multi-bit) projection-KDM security in the CCA setting are complete.

Collaboration


Dive into the Fuyuki Kitagawa's collaboration.

Top Co-Authors

Avatar

Keisuke Tanaka

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Goichiro Hanaoka

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Ryo Nishimaki

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Takahiro Matsuda

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Satoshi Yasuda

Tokyo Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Keisuke Hara

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge