Keita Emura

From MaRDI portal
(Redirected from Person:244667)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Attribute-based keyed fully homomorphic encryption2025-01-10Paper
More efficient adaptively secure lattice-based IBE with equality test in the standard model
Lecture Notes in Computer Science
2023-08-04Paper
A generic construction of CCA-secure attribute-based encryption with equality test
Provable and Practical Security
2023-07-21Paper
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE
Information Security Practice and Experience
2023-06-30Paper
Verifiable functional encryption using Intel SGX2023-04-13Paper
Keyed-fully homomorphic encryption without indistinguishability obfuscation2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiations
Theoretical Computer Science
2021-12-22Paper
Efficient identity-based encryption with hierarchical key-insulation from HIBE
Designs, Codes and Cryptography
2021-10-04Paper
Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption
Designs, Codes and Cryptography
2021-06-24Paper
Efficient revocable identity-based encryption with short public parameters
Theoretical Computer Science
2021-03-18Paper
Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation
Journal of Computer and System Sciences
2020-09-07Paper
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users
Journal of Applied Mathematics
2019-11-19Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures
International Journal of Applied Cryptography
2018-11-26Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Adaptive-ID secure revocable hierarchical identity-based encryption2018-10-24Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems
Designs, Codes and Cryptography
2018-07-03Paper
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions2017-08-25Paper
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Topics in Cryptology – CT-RSA 2017
2017-04-12Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency
Theoretical Computer Science
2016-05-02Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
Applied Cryptography and Network Security
2016-03-10Paper
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
Lecture Notes in Computer Science
2016-03-02Paper
A light-weight group signature scheme with time-token dependent linking
Lecture Notes in Computer Science
2016-02-22Paper
Revocable hierarchical identity-based encryption via history-free approach
Theoretical Computer Science
2016-01-21Paper
Dynamic threshold public-key encryption with decryption consistency from static assumptions
Information Security and Privacy
2015-10-20Paper
Anonymous Data Collection System with Mediators
Cryptography and Information Security in the Balkans
2015-09-21Paper
SKENO: Secret key encryption with non-interactive opening
Journal of Mathematical Cryptology
2015-08-07Paper
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list
Applied Cryptography and Network Security
2014-07-07Paper
Revocable hierarchical identity-based encryption
Theoretical Computer Science
2014-06-23Paper
Revocable identity-based encryption revisited: security model and construction
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Chosen ciphertext secure keyed-homomorphic public-key encryption
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Group signatures with message-dependent opening
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Efficient delegation of key generation and revocation functionalities in identity-based encryption
Topics in Cryptology – CT-RSA 2013
2013-03-18Paper
Dynamic attribute-based signcryption without random oracles
International Journal of Applied Cryptography
2012-11-16Paper
A revocable group signature scheme with the property of hiding the number of revoked users
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Time-specific encryption from forward-secure encryption
Lecture Notes in Computer Science
2012-09-25Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking
Public Key Cryptography – PKC 2012
2012-07-20Paper
Towards restricting plaintext space in public key encryption
Advances in Information and Computer Security
2011-11-10Paper
Toward dynamic attribute-based signcryption (poster)
Information Security and Privacy
2011-07-07Paper
An anonymous designated verifier signature scheme with revocation: how to protect a company's reputation
Provable Security
2010-10-12Paper
A timed-release proxy re-encryption scheme and its application to fairly-opened multicast communication
Provable Security
2010-10-12Paper
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
International Journal of Applied Cryptography
2010-09-22Paper


Research outcomes over time


This page was built for person: Keita Emura