Keita Emura

From MaRDI portal
Person:244667

Available identifiers

zbMath Open emura.keitaMaRDI QIDQ244667

List of research outcomes





PublicationDate of PublicationType
Attribute-based keyed fully homomorphic encryption2025-01-10Paper
More efficient adaptively secure lattice-based IBE with equality test in the standard model2023-08-04Paper
A generic construction of CCA-secure attribute-based encryption with equality test2023-07-21Paper
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE2023-06-30Paper
Verifiable functional encryption using Intel SGX2023-04-13Paper
Keyed-fully homomorphic encryption without indistinguishability obfuscation2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiations2021-12-22Paper
Efficient identity-based encryption with hierarchical key-insulation from HIBE2021-10-04Paper
Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption2021-06-24Paper
Efficient revocable identity-based encryption with short public parameters2021-03-18Paper
Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation2020-09-07Paper
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users2019-11-19Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures2018-11-26Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Adaptive-ID secure revocable hierarchical identity-based encryption2018-10-24Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions2017-08-25Paper
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters2017-04-12Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency2016-05-02Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures2016-03-10Paper
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts2016-03-02Paper
A light-weight group signature scheme with time-token dependent linking2016-02-22Paper
Revocable hierarchical identity-based encryption via history-free approach2016-01-21Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions2015-10-20Paper
Anonymous Data Collection System with Mediators2015-09-21Paper
SKENO: Secret key encryption with non-interactive opening2015-08-07Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list2014-07-07Paper
Revocable hierarchical identity-based encryption2014-06-23Paper
Revocable identity-based encryption revisited: security model and construction2013-04-19Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption2013-04-19Paper
Group signatures with message-dependent opening2013-04-04Paper
Efficient delegation of key generation and revocation functionalities in identity-based encryption2013-03-18Paper
Dynamic attribute-based signcryption without random oracles2012-11-16Paper
A revocable group signature scheme with the property of hiding the number of revoked users2012-11-01Paper
Time-specific encryption from forward-secure encryption2012-09-25Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012-07-20Paper
Towards restricting plaintext space in public key encryption2011-11-10Paper
Toward dynamic attribute-based signcryption (poster)2011-07-07Paper
An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation2010-10-12Paper
A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication2010-10-12Paper
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length2010-09-22Paper

Research outcomes over time

This page was built for person: Keita Emura