Keisuke Hara

Orcid: 0000-0003-3598-0988

According to our database1, Keisuke Hara authored at least 29 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Designated Verifier Signature with Claimability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2023
Forward Secure Message Franking with Updatable Reporting Tags.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2023

On the Black-Box Separation Between Ring Signatures and Public Key Encryptions.
IACR Cryptol. ePrint Arch., 2023

On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes.
IACR Cryptol. ePrint Arch., 2023

Quantum Search-to-Decision Reduction for the LWE Problem.
IACR Cryptol. ePrint Arch., 2023

Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2023

Identity-Based Matchmaking Encryption Secure Against Key Generation Center.
Proceedings of the Provable and Practical Security, 2023

Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities.
Proceedings of the Information Security Practice and Experience, 2023

2022
Surface Texturing Technique Based on Ultrasonic Turning for Improving Tribological Properties.
Int. J. Autom. Technol., 2022

Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Generic transformation from broadcast encryption to round-optimal deniable ring authentication.
Des. Codes Cryptogr., 2022

Multikey Verifiable Homomorphic Encryption.
IEEE Access, 2022

Efficient Two-Party Exponentiation from Quotient Transfer.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Tightly secure ring signatures in the standard model.
Theor. Comput. Sci., 2021

Improvement of Removal Rate of Tape Lapping by Applying Fluid with Ultrasonic Excited Cavitation.
Int. J. Autom. Technol., 2021

Effect of Vibration Direction of Ultrasonic Vibrating Cutting Edge on Internal Stress Fluctuation of Workpiece.
Int. J. Autom. Technol., 2021

Watermarkable Signature with Computational Function Preserving.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Ring Signature With Unconditional Anonymity in the Plain Model.
IEEE Access, 2021

Forward Secure Message Franking.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021

2020
Security Definitions on Time-Lock Puzzles.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions.
Theor. Comput. Sci., 2019

Visualization of Stress Distribution by Photoelastic Method Under Ultrasonic Grinding Condition.
Int. J. Autom. Technol., 2019

2016
A Scoring Rule-based Truthful Demand Response Mechanism.
Int. J. Networked Distributed Comput., 2016

2015
Effects of GA Based Mediation Protocol for Utilities that Change Over Time.
Proceedings of the Next Frontier in Agent-Based Complex Automated Negotiation, 2015

2013
A two-step model and the algorithm for recalling in recommender systems.
CoRR, 2013

Incentive based smart pricing scheme using scoring rule.
Proceedings of the 4th IEEE PES Innovative Smart Grid Technologies Europe, 2013

A Mediator-Based Agent Negotiation Protocol for Utilities That Change with Time.
Proceedings of the Recent Trends in Applied Artificial Intelligence, 2013

A Mediation Mechanism for Automated Negotiating Agents Whose Utility Changes over Time.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013


  Loading...