The following pages link to Yodai Watanabe (Q870855):
Displaying 29 items.
- Differential geometry on diffeomorphism groups and Lagrangian stability of viscous flows (Q870856) (← links)
- (Q1626130) (redirect page) (← links)
- CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance (Q1626131) (← links)
- Timed-release computational secret sharing and threshold encryption (Q1692147) (← links)
- Broadcast encryption with guessing secrecy (Q1705712) (← links)
- Key-updatable public-key encryption with keyword search: models and generic constructions (Q1784465) (← links)
- Adaptively secure revocable hierarchical IBE from \(k\)-linear assumption (Q2035455) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiations (Q2062134) (← links)
- Asymptotically tight lower bounds in anonymous broadcast encryption and authentication (Q2149789) (← links)
- Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices (Q2167774) (← links)
- Revocable identity-based encryption with bounded decryption key exposure resistance: lattice-based construction and more (Q2215969) (← links)
- Efficient identity-based encryption with hierarchical key-insulation from HIBE (Q2232128) (← links)
- Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance (Q2399954) (← links)
- Identity-based encryption with hierarchical key-insulation in the standard model (Q2414931) (← links)
- Efficient revocable identity-based encryption with short public parameters (Q2658050) (← links)
- Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles (Q2798778) (← links)
- Timed-Release Secret Sharing Schemes with Information Theoretic Security (Q2947118) (← links)
- Timed-Release Computational Secret Sharing Scheme and Its Applications (Q2948161) (← links)
- Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness (Q2953817) (← links)
- New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters (Q2975823) (← links)
- Information-Theoretically Secure Entity Authentication in the Multi-user Setting (Q3193279) (← links)
- Constructions of CCA-Secure Revocable Identity-Based Encryption (Q3194596) (← links)
- Privacy amplification for quantum key distribution (Q3421655) (← links)
- Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage (Q3464418) (← links)
- A geometrical method for the stability analysis of dynamical systems (Q3836039) (← links)
- Geometrical analysis of free rotation of a rigid body (Q3836054) (← links)
- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks (Q4414699) (← links)
- Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes (Q5200461) (← links)
- Randomness Extraction via a Quantum Generalization of the Conditional Collision Entropy (Q5211660) (← links)