Keita Emura

Affiliations:
  • National Institute of Information and Communications Technology (NICT), Tokyo, Japan


According to our database1, Keita Emura authored at least 111 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Identity-based encryption with security against the KGC: A formal model and its instantiations.
Theor. Comput. Sci., 2022

Keyed-Fully Homomorphic Encryption without Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2022

Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security.
IACR Cryptol. ePrint Arch., 2022

Membership Privacy for Asynchronous Group Messaging.
IACR Cryptol. ePrint Arch., 2022

Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction.
IACR Cryptol. ePrint Arch., 2022

A Sealed-bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage.
Proceedings of the IEEE International Conference on Blockchain, 2022

Output Prediction Attacks on Block Ciphers Using Deep Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

2021
Efficient revocable identity-based encryption with short public parameters.
Theor. Comput. Sci., 2021

On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Privacy-Preserving Data Analysis: Providing Traceability without Big Brother.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Fully Anonymous Group Signature with Verifier-Local Revocation.
IACR Cryptol. ePrint Arch., 2021

Generic Constructions of Revocable Hierarchical Identity-based Encryption.
IACR Cryptol. ePrint Arch., 2021

State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021

A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.
IACR Cryptol. ePrint Arch., 2021

Output Prediction Attacks on SPN Block Ciphers using Deep Learning.
IACR Cryptol. ePrint Arch., 2021

Efficient identity-based encryption with Hierarchical key-insulation from HIBE.
Des. Codes Cryptogr., 2021

Adaptively secure revocable hierarchical IBE from k-linear assumption.
Des. Codes Cryptogr., 2021

An Anonymous Trust-Marking Scheme on Blockchain Systems.
IEEE Access, 2021

Implementation and Evaluation of an Identity-Based Encryption with Security Against the KGC.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

A Privacy-Preserving Enforced Bill Collection System using Smart Contracts.
Proceedings of the 16th Asia Joint Conference on Information Security, 2021

2020
Group Signatures with Time-Bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation.
IEEE Trans. Dependable Secur. Comput., 2020

Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation.
J. Comput. Syst. Sci., 2020

Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings.
Int. J. Netw. Comput., 2020

A Revocable Group Signature Scheme with Scalability from Simple Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Verifiable Functional Encryption using Intel SGX.
IACR Cryptol. ePrint Arch., 2020

Cache-22: A Highly Deployable Encrypted Cache System.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019

A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage.
J. Medical Syst., 2019

Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
IACR Cryptol. ePrint Arch., 2019

A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management.
IACR Cryptol. ePrint Arch., 2019

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.
Comput. J., 2019

Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Proceedings of the Computer Security - ESORICS 2019, 2019

Session details: Invited Talk.
Proceedings of the 6th on ASIA Public-Key Cryptography Workshop, 2019

2018
Road-to-Vehicle Communications With Time-Dependent Anonymity: A Lightweight Construction and Its Experimental Results.
IEEE Trans. Veh. Technol., 2018

Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.
Int. J. Inf. Sec., 2018

Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Chosen ciphertext secure keyed-homomorphic public-key cryptosystems.
Des. Codes Cryptogr., 2018

Fully Anonymous Group Signature with Verifier-Local Revocation.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation.
Proceedings of the Information Security - 21st International Conference, 2018

A Generic Construction of Integrated Secure-Channel Free PEKS and PKE.
Proceedings of the Information Security Practice and Experience, 2018

2017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
J. Inf. Secur. Appl., 2017

A privacy-enhanced access log management mechanism in SSO systems from nominative signatures.
Int. J. Appl. Cryptogr., 2017

Group Signature with Deniability: How to Disavow a Signature.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2017

A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother.
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30, 2017

A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords.
Proceedings of the Network and System Security - 11th International Conference, 2017

Mis-operation Resistant Searchable Homomorphic Encryption.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Secure and Anonymous Communication Technique: Formal Model and Its Prototype Implementation.
IEEE Trans. Emerg. Top. Comput., 2016

Revocable hierarchical identity-based encryption via history-free approach.
Theor. Comput. Sci., 2016

Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.
Theor. Comput. Sci., 2016

Time-specific encryption from forward-secure encryption: generic and direct constructions.
Int. J. Inf. Sec., 2016

Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016

On the Leakage Resilient Cryptography in Game-Theoretic Settings.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Generic constructions of secure-channel free searchable encryption with adaptive security.
Secur. Commun. Networks, 2015

SKENO: Secret key encryption with non-interactive opening.
J. Math. Cryptol., 2015

Disavowable Public Key Encryption with Non-Interactive Opening.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Revocable Group Signature with Constant-Size Revocation List.
Comput. J., 2015

Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A Light-Weight Group Signature Scheme with Time-Token Dependent Linking.
Proceedings of the Lightweight Cryptography for Security and Privacy, 2015

Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption.
Proceedings of the Advances in Information and Computer Security, 2015

Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.
Proceedings of the Topics in Cryptology, 2015

A KEM/DEM-Based Construction for Secure and Anonymous Communication.
Proceedings of the 39th Annual Computer Software and Applications Conference, 2015

Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions.
IEEE Trans. Inf. Forensics Secur., 2014

Revocable hierarchical identity-based encryption.
Theor. Comput. Sci., 2014

An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
J. Appl. Math., 2014

Group signature implies public-key encryption with non-interactive opening.
Int. J. Inf. Sec., 2014

Revocable Identity-Based Encryption with Rejoin Functionality.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Road-to-Vehicle Communications with Time-Dependent Anonymity: A Light Weight Construction and its Experimental Results.
IACR Cryptol. ePrint Arch., 2014

A Secure Genetic Algorithm for the Subset Cover Problem and Its Application to Privacy Protection.
Proceedings of the Information Security Theory and Practice. Securing the Internet of Things, 2014

Building secure and anonymous communication channel: formal model and its prototype implementation.
Proceedings of the Symposium on Applied Computing, 2014

Anonymous Data Collection System with Mediators.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
On Discrete Logarithm Based Additively Homomorphic Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

A Remark on " Efficient Revocable ID-Based Encryption with a Public Channel".
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Methods for Restricting Message Space in Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2013

Revocable Identity-Based Encryption Revisited: Security Model and Construction.
IACR Cryptol. ePrint Arch., 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2013

Private Multiparty Set Intersection Protocol in Rational Model.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Privacy-Preserving Two-Party k-Means Clustering in Malicious Model.
Proceedings of the IEEE 37th Annual Computer Software and Applications Conference, 2013

Risk visualization and alerting system: architecture and proof-of-concept implementation.
Proceedings of the first international workshop on Security in embedded systems and smartphones, 2013

A group signature scheme with unbounded message-dependent opening.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Dynamic attribute-based signcryption without random oracles.
Int. J. Appl. Cryptogr., 2012

On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
IACR Cryptol. ePrint Arch., 2012

Flexible Group Key Exchange with On-demand Computation of Subgroup Keys Supporting Subgroup Key Randomization.
Proceedings of the SECRYPT 2012, 2012

Constructing Secure-channel Free Searchable Encryption from Anonymous IBE with Partitioned Ciphertext Structure.
Proceedings of the SECRYPT 2012, 2012

Time-Specific Encryption from Forward-Secure Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Group Signatures with Message-Dependent Opening.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

An Intrusion and Random-Number-Leakage Resilient Scheme in Mobile Unattended WSNs.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
A Timed-Release Proxy Re-Encryption Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Towards Restricting Plaintext Space in Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

Adaptive Secure-Channel Free Public-Key Encryption with Keyword Search Implies Timed Release Encryption.
Proceedings of the Information Security, 14th International Conference, 2011

A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Ideal Secret Sharing Schemes with Share Selectability.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Toward Dynamic Attribute-Based Signcryption (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length.
Int. J. Appl. Cryptogr., 2010

A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Proceedings of the Provable Security - 4th International Conference, 2010

An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Proceedings of the Provable Security - 4th International Conference, 2010

Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
Proceedings of the Advances in Information and Computer Security, 2010

An Identity-Based Proxy Re-Encryption Scheme with Source Hiding Property, and its Application to a Mailing-List System.
Proceedings of the Public Key Infrastructures, Services and Applications, 2010

Efficient Privacy-Preserving Data Mining in Malicious Model.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics.
J. Inf. Process., 2009

A Selectable <i>k</i>-Times Relaxed Anonymous Authentication Scheme.
Proceedings of the Information Security Applications, 10th International Workshop, 2009

A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier.
Proceedings of the The Forth International Conference on Availability, 2009


  Loading...