Volgen
Keita Emura
Keita Emura
Geverifieerd e-mailadres voor nict.go.jp
Titel
Geciteerd door
Geciteerd door
Jaar
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
International Conference on Information Security Practice and Experience, 13-23, 2009
3572009
Revocable identity-based encryption revisited: Security model and construction
JH Seo, K Emura
International Workshop on Public Key Cryptography, 216-234, 2013
1932013
Efficient delegation of key generation and revocation functionalities in identity-based encryption
JH Seo, K Emura
Cryptographers’ Track at the RSA Conference, 343-358, 2013
932013
On the security of dynamic group signatures: Preventing signature hijacking
Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta
International Workshop on Public Key Cryptography, 715-732, 2012
592012
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
International Conference on Pairing-Based Cryptography, 270-294, 2012
522012
Dynamic attribute-based signcryption without random oracles
K Emura, A Miyaji, MS Rahman
International Journal of Applied, 2012
512012
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
JH Seo, K Emura
Cryptographers’ Track at the RSA Conference, 106-123, 2015
472015
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Y Watanabe, K Emura, JH Seo
Cryptographers’ Track at the RSA Conference, 432-449, 2017
452017
Generic constructions of secure‐channel free searchable encryption with adaptive security
K Emura, A Miyaji, MS Rahman, K Omote
Security and communication networks 8 (8), 1547-1560, 2015
442015
Revocable identity-based cryptosystem revisited: Security models and constructions
JH Seo, K Emura
IEEE Transactions on Information Forensics and Security 9 (7), 1193-1205, 2014
412014
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
K Emura, A Miyaji, K Omote
Information and Media Technologies 4 (4), 1060-1075, 2009
412009
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied, 2010
392010
Time-specific encryption from forward-secure encryption
K Kasamatsu, T Matsuda, K Emura, N Attrapadung, G Hanaoka, H Imai
International Conference on Security and Cryptography for Networks, 184-204, 2012
352012
A revocable group signature scheme from identity-based revocation techniques: achieving constant-size revocation list
N Attrapadung, K Emura, G Hanaoka, Y Sakai
International Conference on Applied Cryptography and Network Security, 419-437, 2014
272014
Revocable hierarchical identity-based encryption
JH Seo, K Emura
Theoretical Computer Science 542, 44-62, 2014
252014
Road-to-vehicle communications with time-dependent anonymity: A lightweight construction and its experimental results
K Emura, T Hayashi
IEEE Transactions on Vehicular Technology 67 (2), 1582-1597, 2017
242017
Semi-generic transformation of revocable hierarchical identity-based encryption and its DBDH instantiation
K Emura, JH Seo, TY Youn
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
232016
A timed-release proxy re-encryption scheme
K Emura, A Miyaji, K Omote
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011
232011
Revocable hierarchical identity-based encryption via history-free approach
JH Seo, K Emura
Theoretical Computer Science 615, 45-60, 2016
222016
Fully anonymous group signature with verifier-local revocation
A Ishida, Y Sakai, K Emura, G Hanaoka, K Tanaka
International Conference on Security and Cryptography for Networks, 23-42, 2018
212018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20