Keita Emura

From MaRDI portal
Person:244667

Available identifiers

zbMath Open emura.keitaMaRDI QIDQ244667

List of research outcomes





PublicationDate of PublicationType
Attribute-based keyed fully homomorphic encryption2025-01-10Paper
More efficient adaptively secure lattice-based IBE with equality test in the standard model2023-08-04Paper
A generic construction of CCA-secure attribute-based encryption with equality test2023-07-21Paper
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE2023-06-30Paper
Verifiable functional encryption using Intel SGX2023-04-13Paper
Keyed-fully homomorphic encryption without indistinguishability obfuscation2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiations2021-12-22Paper
Efficient identity-based encryption with hierarchical key-insulation from HIBE2021-10-04Paper
Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption2021-06-24Paper
Efficient revocable identity-based encryption with short public parameters2021-03-18Paper
Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation2020-09-07Paper
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users2019-11-19Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures2018-11-26Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Adaptive-ID secure revocable hierarchical identity-based encryption2018-10-24Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions2017-08-25Paper
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters2017-04-12Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency2016-05-02Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures2016-03-10Paper
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts2016-03-02Paper
A Light-Weight Group Signature Scheme with Time-Token Dependent Linking2016-02-22Paper
Revocable hierarchical identity-based encryption via history-free approach2016-01-21Paper
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions2015-10-20Paper
Anonymous Data Collection System with Mediators2015-09-21Paper
SKENO: Secret key encryption with non-interactive opening2015-08-07Paper
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List2014-07-07Paper
Revocable hierarchical identity-based encryption2014-06-23Paper
Revocable Identity-Based Encryption Revisited: Security Model and Construction2013-04-19Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Group Signatures with Message-Dependent Opening2013-04-04Paper
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption2013-03-18Paper
Dynamic attribute-based signcryption without random oracles2012-11-16Paper
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2012-11-01Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012-07-20Paper
Towards Restricting Plaintext Space in Public Key Encryption2011-11-10Paper
Toward Dynamic Attribute-Based Signcryption (Poster)2011-07-07Paper
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation2010-10-12Paper
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication2010-10-12Paper
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length2010-09-22Paper

Research outcomes over time

This page was built for person: Keita Emura