Yohei Watanabe
Orcid: 0000-0003-4028-8603Affiliations:
- University of Electro-Communications, Japan
- Yokohama National University, Japan (PhD 2016)
According to our database1,
Yohei Watanabe
authored at least 64 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model.
New Gener. Comput., September, 2024
New Gener. Comput., September, 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Covert Vehicle Misguidance and Its Detection: A Hypothesis Testing Game Over Continuous-Time Dynamics.
IEEE Control. Syst. Lett., 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
IACR Cryptol. ePrint Arch., 2023
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction.
IACR Cryptol. ePrint Arch., 2023
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.
Des. Codes Cryptogr., 2023
Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Proceedings of the Information Security Practice and Experience, 2023
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Combinatorial Optimization and Applications, 2023
Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023
2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2022
Identity-based encryption with security against the KGC: A formal model and its instantiations.
Theor. Comput. Sci., 2022
An Improvement of Multi-Party Private Set Intersection Based on Oblivious Programmable PRFs.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022
2021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
Theor. Comput. Sci., 2021
Theor. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Des. Codes Cryptogr., 2021
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
Int. J. Inf. Sec., 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Des. Codes Cryptogr., 2019
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Proceedings of the Computer Security - ESORICS 2019, 2019
2018
Des. Codes Cryptogr., 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance.
Int. J. Appl. Cryptogr., 2017
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Theoretic Security - 10th International Conference, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
J. Inf. Process., 2016
Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptol. ePrint Arch., 2016
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Proceedings of the Provable Security, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
IACR Cryptol. ePrint Arch., 2012