关注
Keita Emura
Keita Emura
在 se.kanazawa-u.ac.jp 的电子邮件经过验证
标题
引用次数
引用次数
年份
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
Information Security Practice and Experience: 5th International Conference …, 2009
3922009
Revocable identity-based encryption revisited: Security model and construction
JH Seo, K Emura
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
2212013
Efficient delegation of key generation and revocation functionalities in identity-based encryption
JH Seo, K Emura
Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013
972013
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013
722013
On the security of dynamic group signatures: Preventing signature hijacking
Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
662012
Dynamic attribute-based signcryption without random oracles
K Emura, A Miyaji, MS Rahman
International Journal of Applied Cryptography 2 (3), 199-211, 2012
562012
Revocable hierarchical identity-based encryption: History-free update, security against insiders, and short ciphertexts
JH Seo, K Emura
Cryptographers’ Track at the RSA Conference, 106-123, 2015
542015
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Y Watanabe, K Emura, JH Seo
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
532017
Generic constructions of secure‐channel free searchable encryption with adaptive security
K Emura, A Miyaji, MS Rahman, K Omote
Security and communication networks 8 (8), 1547-1560, 2015
502015
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied Cryptography 2 (1), 46-59, 2010
482010
Revocable identity-based cryptosystem revisited: Security models and constructions
JH Seo, K Emura
IEEE Transactions on Information Forensics and Security 9 (7), 1193-1205, 2014
452014
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
K Emura, A Miyaji, K Omote
Information and Media Technologies 4 (4), 1060-1075, 2009
452009
Time-specific encryption from forward-secure encryption
K Kasamatsu, T Matsuda, K Emura, N Attrapadung, G Hanaoka, H Imai
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
442012
Road-to-vehicle communications with time-dependent anonymity: A lightweight construction and its experimental results
K Emura, T Hayashi
IEEE Transactions on Vehicular Technology 67 (2), 1582-1597, 2017
302017
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions
K Emura
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
302017
A revocable group signature scheme from identity-based revocation techniques: Achieving constant-size revocation list
N Attrapadung, K Emura, G Hanaoka, Y Sakai
Applied Cryptography and Network Security: 12th International Conference …, 2014
302014
Group signatures with time-bound keys revisited: a new model, an efficient construction, and its implementation
K Emura, T Hayashi, A Ishida
IEEE Transactions on Dependable and Secure Computing 17 (2), 292-305, 2017
292017
A timed-release proxy re-encryption scheme
K Emura, A Miyaji, K Omote
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011
282011
Generic construction of public-key authenticated encryption with keyword search revisited: Stronger security and efficient construction
K Emura
Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 39-49, 2022
272022
Fully anonymous group signature with verifier-local revocation
A Ishida, Y Sakai, K Emura, G Hanaoka, K Tanaka
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
272018
系统目前无法执行此操作,请稍后再试。
文章 1–20