Keita Emura
Title
Cited by
Cited by
Year
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, A Nomura, K Omote, M Soshi
International Conference on Information Security Practice and Experience, 13-23, 2009
3222009
Revocable identity-based encryption revisited: Security model and construction
JH Seo, K Emura
International Workshop on Public Key Cryptography, 216-234, 2013
1742013
Efficient delegation of key generation and revocation functionalities in identity-based encryption
JH Seo, K Emura
Cryptographers’ Track at the RSA Conference, 343-358, 2013
872013
On the security of dynamic group signatures: Preventing signature hijacking
Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta
International Workshop on Public Key Cryptography, 715-732, 2012
562012
Dynamic attribute-based signcryption without random oracles
K Emura, A Miyaji, MS Rahman
International Journal of Applied Cryptography 2 (3), 199-211, 2012
482012
Group signatures with message-dependent opening
Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote
International Conference on Pairing-Based Cryptography, 270-294, 2012
442012
Revocable hierarchical identity-based encryption: history-free update, security against insiders, and short ciphertexts
JH Seo, K Emura
Cryptographers’ Track at the RSA Conference, 106-123, 2015
432015
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Y Watanabe, K Emura, JH Seo
Cryptographers’ Track at the RSA Conference, 432-449, 2017
402017
Revocable identity-based cryptosystem revisited: Security models and constructions
JH Seo, K Emura
IEEE Transactions on Information Forensics and Security 9 (7), 1193-1205, 2014
392014
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
K Emura, A Miyaji, K Omote, A Nomura, M Soshi
International Journal of Applied Cryptography 2 (1), 46-59, 2010
392010
Generic constructions of secure‐channel free searchable encryption with adaptive security
K Emura, A Miyaji, MS Rahman, K Omote
Security and communication networks 8 (8), 1547-1560, 2015
372015
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics
K Emura, A Miyaji, K Omote
Information and Media Technologies 4 (4), 1060-1075, 2009
362009
Time-specific encryption from forward-secure encryption
K Kasamatsu, T Matsuda, K Emura, N Attrapadung, G Hanaoka, H Imai
International Conference on Security and Cryptography for Networks, 184-204, 2012
332012
A revocable group signature scheme from identity-based revocation techniques: Achieving constant-size revocation list
N Attrapadung, K Emura, G Hanaoka, Y Sakai
International Conference on Applied Cryptography and Network Security, 419-437, 2014
272014
Revocable hierarchical identity-based encryption
JH Seo, K Emura
Theoretical Computer Science 542, 44-62, 2014
232014
A timed-release proxy re-encryption scheme
K Emura, A Miyaji, K Omote
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011
222011
Revocable hierarchical identity-based encryption via history-free approach
JH Seo, K Emura
Theoretical Computer Science 615, 45-60, 2016
202016
Semi-generic transformation of revocable hierarchical identity-based encryption and its DBDH instantiation
K Emura, JH Seo, TY Youn
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
202016
Building secure and anonymous communication channel: Formal model and its prototype implementation
K Emura, A Kanaoka, S Ohta, T Takahashi
Proceedings of the 29th Annual ACM Symposium on Applied Computing, 1641-1648, 2014
182014
A group signature scheme with unbounded message-dependent opening
K Ohara, Y Sakai, K Emura, G Hanaoka
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
182013
The system can't perform the operation now. Try again later.
Articles 1–20