Keita Emura
Affiliations: National Institute of Information and Communications Technology (NICT), Tokyo, Japan
According to our database^{1},
Keita Emura
authored at least 111 papers
between 2009 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
Online presence:

on twitter.com

on orcid.org
On csauthors.net:
Bibliography
2022
Identitybased encryption with security against the KGC: A formal model and its instantiations.
Theor. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
Cache22: A Highly Deployable EndToEnd Encrypted Cache System with PostQuantum Security.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Generic Construction of Publickey Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the IEEE International Conference on Blockchain, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
Theor. Comput. Sci., 2021
On the Security of KeyedHomomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Statefree EndtoEnd Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021
A Generic Construction of CCAsecure Attributebased Encryption with Equality Test.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Des. Codes Cryptogr., 2021
IEEE Access, 2021
Implementation and Evaluation of an IdentityBased Encryption with Security Against the KGC.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021
Proceedings of the 16th Asia Joint Conference on Information Security, 2021
2020
Group Signatures with TimeBound Keys Revisited: A New Model, an Efficient Construction, and its Implementation.
IEEE Trans. Dependable Secur. Comput., 2020
Securechannel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation.
J. Comput. Syst. Sci., 2020
Implementation of a Strongly Robust IdentityBased Encryption Scheme over Type3 Pairings.
Int. J. Netw. Comput., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Group Signatures with MessageDependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019
A Generic Construction of Integrated SecureChannel Free PEKS and PKE and its Application to EMRs in Cloud Storage.
J. Medical Syst., 2019
Shortening the LibertPetersYung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management.
IACR Cryptol. ePrint Arch., 2019
PrivacyPreserving Aggregation of TimeSeries Data with Public Verifiability from Simple Assumptions and Its Implementations.
Comput. J., 2019
IdentityBased Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Proceedings of the Computer Security  ESORICS 2019, 2019
Proceedings of the 6th on ASIA PublicKey Cryptography Workshop, 2019
2018
RoadtoVehicle Communications With TimeDependent Anonymity: A Lightweight Construction and Its Experimental Results.
IEEE Trans. Veh. Technol., 2018
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.
Int. J. Inf. Sec., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Des. Codes Cryptogr., 2018
Proceedings of the Security and Cryptography for Networks  11th International Conference, 2018
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.
Proceedings of the Information Security  21st International Conference, 2018
Proceedings of the Information Security Practice and Experience, 2018
2017
Establishing secure and anonymous communication channel: KEM/DEMbased construction and its implementation.
J. Inf. Secur. Appl., 2017
A privacyenhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
PrivacyPreserving Aggregation of TimeSeries Data with Public Verifiability from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2017
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017
A Generic Construction of SecureChannel Free Searchable Encryption with Multiple Keywords.
Proceedings of the Network and System Security  11th International Conference, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Group Signatures with Timebound Keys Revisited: A New Model and an Efficient Construction.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016
Theor. Comput. Sci., 2016
Constructions of dynamic and nondynamic threshold publickey encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016
Timespecific encryption from forwardsecure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016
SemiGeneric Transformation of Revocable Hierarchical IdentityBased Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
New Revocable IBE in PrimeOrder Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Toward securing tire pressure monitoring systems: A case of PRESENTbased implementation.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
Generic constructions of securechannel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015
J. Math. Cryptol., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Comput. J., 2015
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Regenerateability.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015
Proceedings of the Advances in Information and Computer Security, 2015
Revocable Hierarchical IdentityBased Encryption: HistoryFree Update, Security Against Insiders, and Short Ciphertexts.
Proceedings of the Topics in Cryptology, 2015
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015
Dynamic Threshold PublicKey Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy  20th Australasian Conference, 2015
2014
Revocable IdentityBased Cryptosystem Revisited: Security Models and Constructions.
IEEE Trans. Inf. Forensics Secur., 2014
Theor. Comput. Sci., 2014
An rHiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
J. Appl. Math., 2014
Int. J. Inf. Sec., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
RoadtoVehicle Communications with TimeDependent Anonymity: A Light Weight Construction and its Experimental Results.
IACR Cryptol. ePrint Arch., 2014
A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014
Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
A Revocable Group Signature Scheme from IdentityBased Revocation Techniques: Achieving ConstantSize Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Efficient Delegation of Key Generation and Revocation Functionalities in IdentityBased Encryption.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the PublicKey Cryptography  PKC 2013  16th International Conference on Practice and Theory in PublicKey Cryptography, Nara, Japan, February 26, 2013
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013
Risk visualization and alerting system: architecture and proofofconcept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Int. J. Appl. Cryptogr., 2012
IACR Cryptol. ePrint Arch., 2012
Flexible Group Key Exchange with Ondemand Computation of Subgroup Keys Supporting Subgroup Key Randomization.
Proceedings of the SECRYPT 2012, 2012
Constructing Securechannel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure.
Proceedings of the SECRYPT 2012, 2012
Proceedings of the Security and Cryptography for Networks  8th International Conference, 2012
Proceedings of the PairingBased Cryptography  Pairing 2012, 2012
An Intrusion and RandomNumberLeakage Resilient Scheme in Mobile Unattended WSNs.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Advances in Information and Computer Security, 2011
Adaptive SecureChannel Free PublicKey Encryption with Keyword Search Implies Timed Release Encryption.
Proceedings of the Information Security, 14th International Conference, 2011
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Proceedings of the Information Security and Cryptology  ICISC 2011  14th International Conference, Seoul, Korea, November 30, 2011
Proceedings of the Information and Communications Security  13th International Conference, 2011
Proceedings of the Information and Communications Security  13th International Conference, 2011
Proceedings of the Information Security and Privacy  16th Australasian Conference, 2011
2010
A ciphertextpolicy attributebased encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010
A TimedRelease Proxy Reencryption Scheme and Its Application to FairlyOpened Multicast Communication.
Proceedings of the Provable Security  4th International Conference, 2010
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Proceedings of the Provable Security  4th International Conference, 2010
Proceedings of the Advances in Information and Computer Security, 2010
An IdentityBased Proxy ReEncryption Scheme with Source Hiding Property, and its Application to a MailingList System.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010
Proceedings of the Advanced Data Mining and Applications  6th International Conference, 2010
2009
A Dynamic AttributeBased Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.
J. Inf. Process., 2009
Proceedings of the Information Security Applications, 10th International Workshop, 2009
Proceedings of the The Forth International Conference on Availability, 2009