The following pages link to Yutaka Kawai (Q1616648):
Displaying 10 items.
- Token-based multi-input functional encryption (Q1616650) (← links)
- Formal treatment of verifiable privacy-preserving data-aggregation protocols (Q1616691) (← links)
- Outsourcing the re-encryption key generation: flexible ciphertext-policy attribute-based proxy re-encryption (Q1631927) (← links)
- Dynamic multi target homomorphic attribute-based encryption (Q1744842) (← links)
- Simple, secure, and efficient searchable symmetric encryption with multiple encrypted indexes (Q1800673) (← links)
- Probabilistic generation of trapdoors: reducing information leakage of searchable symmetric encryption (Q1801206) (← links)
- Secret handshake scheme with request-based-revealing (Q1945038) (← links)
- Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption (Q2790055) (← links)
- Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption (Q2890017) (← links)
- Towards Restricting Plaintext Space in Public Key Encryption (Q3098005) (← links)