Keita Emura

From MaRDI portal
Person:244667

Available identifiers

zbMath Open emura.keitaMaRDI QIDQ244667

List of research outcomes

PublicationDate of PublicationType
More efficient adaptively secure lattice-based IBE with equality test in the standard model2023-08-04Paper
A generic construction of CCA-secure attribute-based encryption with equality test2023-07-21Paper
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE2023-06-30Paper
Verifiable functional encryption using Intel SGX2023-04-13Paper
Keyed-fully homomorphic encryption without indistinguishability obfuscation2022-11-09Paper
Generic constructions for fully secure revocable attribute-based encryption2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices2022-08-25Paper
Identity-based encryption with security against the KGC: a formal model and its instantiations2021-12-22Paper
Efficient identity-based encryption with hierarchical key-insulation from HIBE2021-10-04Paper
Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption2021-06-24Paper
Efficient revocable identity-based encryption with short public parameters2021-03-18Paper
Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation2020-09-07Paper
An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users2019-11-19Paper
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures2018-11-26Paper
Group signature with deniability: how to disavow a signature2018-10-26Paper
Adaptive-ID secure revocable hierarchical identity-based encryption2018-10-24Paper
Fully anonymous group signature with verifier-local revocation2018-10-17Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions2017-08-25Paper
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters2017-04-12Paper
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency2016-05-02Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures2016-03-10Paper
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts2016-03-02Paper
Revocable hierarchical identity-based encryption via history-free approach2016-01-21Paper
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions2015-10-20Paper
Anonymous Data Collection System with Mediators2015-09-21Paper
SKENO: Secret key encryption with non-interactive opening2015-08-07Paper
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List2014-07-07Paper
Revocable hierarchical identity-based encryption2014-06-23Paper
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption2013-04-19Paper
Revocable Identity-Based Encryption Revisited: Security Model and Construction2013-04-19Paper
Group Signatures with Message-Dependent Opening2013-04-04Paper
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption2013-03-18Paper
Dynamic attribute-based signcryption without random oracles2012-11-16Paper
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users2012-11-01Paper
Time-Specific Encryption from Forward-Secure Encryption2012-09-25Paper
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking2012-07-20Paper
Towards Restricting Plaintext Space in Public Key Encryption2011-11-10Paper
Toward Dynamic Attribute-Based Signcryption (Poster)2011-07-07Paper
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation2010-10-12Paper
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication2010-10-12Paper
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length2010-09-22Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Keita Emura