The following pages link to Keita Emura (Q244667):
Displaying 39 items.
- Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency (Q278732) (← links)
- Revocable hierarchical identity-based encryption via history-free approach (Q906383) (← links)
- A privacy-enhanced access log management mechanism in SSO systems from nominative signatures (Q1626143) (← links)
- Chosen ciphertext secure keyed-homomorphic public-key cryptosystems (Q1650427) (← links)
- Dynamic attribute-based signcryption without random oracles (Q1758888) (← links)
- Fully anonymous group signature with verifier-local revocation (Q1796778) (← links)
- Adaptive-ID secure revocable hierarchical identity-based encryption (Q1800570) (← links)
- Group signature with deniability: how to disavow a signature (Q1801198) (← links)
- Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions (Q2014611) (← links)
- Revocable hierarchical identity-based encryption (Q2015131) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiations (Q2062134) (← links)
- Keyed-fully homomorphic encryption without indistinguishability obfuscation (Q2096599) (← links)
- Generic constructions for fully secure revocable attribute-based encryption (Q2167729) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices (Q2167774) (← links)
- Secure-channel free searchable encryption with multiple keywords: a generic construction, an instantiation, and its implementation (Q2194864) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- An \(r\)-hiding revocable group signature scheme: group signatures with the property of hiding the number of revoked users (Q2336893) (← links)
- SKENO: Secret key encryption with non-interactive opening (Q2515962) (← links)
- Efficient revocable identity-based encryption with short public parameters (Q2658050) (← links)
- Verifiable functional encryption using Intel SGX (Q2697922) (← links)
- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts (Q2790033) (← links)
- Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures (Q2794502) (← links)
- On the Security of Dynamic Group Signatures: Preventing Signature Hijacking (Q2900254) (← links)
- Time-Specific Encryption from Forward-Secure Encryption (Q2912795) (← links)
- Anonymous Data Collection System with Mediators (Q2947112) (← links)
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters (Q2975823) (← links)
- Toward Dynamic Attribute-Based Signcryption (Poster) (Q3013013) (← links)
- Towards Restricting Plaintext Space in Public Key Encryption (Q3098005) (← links)
- A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users (Q3168623) (← links)
- Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions (Q3194590) (← links)
- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption (Q4910249) (← links)
- Group Signatures with Message-Dependent Opening (Q4912504) (← links)
- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption (Q4915999) (← links)
- Revocable Identity-Based Encryption Revisited: Security Model and Construction (Q4916011) (← links)
- An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company’s Reputation (Q4933220) (← links)
- A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication (Q4933222) (← links)
- A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List (Q5168559) (← links)
- A ciphertext-policy attribute-based encryption scheme with constant ciphertext length (Q5962411) (← links)