Keita Emura
Orcid: 0000-0002-8969-3581Affiliations:
- Kanazawa University, Ishikawa, Japan
- National Institute of Information and Communications Technology (NICT), Tokyo, Japan (former)
According to our database1,
Keita Emura
authored at least 130 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEICE Trans. Inf. Syst., 2024
Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 19th Asia Joint Conference on Information Security, 2024
2023
J. Adv. Comput. Intell. Intell. Informatics, September, 2023
A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023
Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions.
IET Inf. Secur., 2023
On the Feasibility of Identity-based Encryption with Equality Test against Insider Attacks.
IACR Cryptol. ePrint Arch., 2023
Generic Construction of Dual-Server Public Key Authenticated Encryption with Keyword Search.
IACR Cryptol. ePrint Arch., 2023
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Cybersecurity-Enhanced Encrypted Control System Using Keyed-Homomorphic Public Key Encryption.
IEEE Access, 2023
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023
2022
Identity-based encryption with security against the KGC: A formal model and its instantiations.
Theor. Comput. Sci., 2022
Providing Membership Privacy to the Asynchronous Ratcheting Trees Protocol without losing Scalability.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Theor. Comput. Sci., 2021
On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Des. Codes Cryptogr., 2021
Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation.
IEEE Trans. Dependable Secur. Comput., 2020
Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation.
J. Comput. Syst. Sci., 2020
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings.
Int. J. Netw. Comput., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage.
J. Medical Syst., 2019
Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management.
IACR Cryptol. ePrint Arch., 2019
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.
Comput. J., 2019
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019
2018
Road-to-Vehicle Communications With Time-Dependent Anonymity: A Lightweight Construction and Its Experimental Results.
IEEE Trans. Veh. Technol., 2018
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.
Int. J. Inf. Sec., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Des. Codes Cryptogr., 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.
Proceedings of the Information Security - 21st International Conference, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
J. Inf. Secur. Appl., 2017
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2017
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords.
Proceedings of the Network and System Security - 11th International Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016
Theor. Comput. Sci., 2016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016
Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016
Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
Generic constructions of secure-channel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IEEE Trans. Inf. Forensics Secur., 2014
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
J. Appl. Math., 2014
Int. J. Inf. Sec., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results.
IACR Cryptol. ePrint Arch., 2014
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Int. J. Appl. Cryptogr., 2012
IACR Cryptol. ePrint Arch., 2012
Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization.
Proceedings of the SECRYPT 2012, 2012
Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Advances in Information and Computer Security, 2011
Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
Proceedings of the Information Security, 14th International Conference, 2011
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Proceedings of the Provable Security - 4th International Conference, 2010
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the Advances in Information and Computer Security, 2010
An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.
J. Inf. Process., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the The Forth International Conference on Availability, 2009