Yutaka Kawai

From MaRDI portal
Person:1616648



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption
Information Security Practice and Experience
2023-06-30Paper
Multi-key Homomorphic Proxy Re-Encryption
Developments in Language Theory
2023-06-30Paper
Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption2018-12-07Paper
Formal treatment of verifiable privacy-preserving data-aggregation protocols2018-11-07Paper
Token-based multi-input functional encryption2018-11-07Paper
Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption2018-10-26Paper
Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes2018-10-24Paper
Dynamic multi target homomorphic attribute-based encryption2018-04-20Paper
Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption
Lecture Notes in Computer Science
2016-03-02Paper
Predicate- and attribute-hiding inner product encryption in a public key setting
Pairing-Based Cryptography – Pairing 2013
2014-02-18Paper
Group signatures with message-dependent opening
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Secret handshake scheme with request-based-revealing
Computers & Mathematics with Applications
2013-03-28Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Lecture Notes in Computer Science
2012-06-08Paper
Towards restricting plaintext space in public key encryption
Advances in Information and Computer Security
2011-11-10Paper


Research outcomes over time


This page was built for person: Yutaka Kawai