Takato Hirano

According to our database1, Takato Hirano authored at least 20 papers between 2008 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Determination of Parameters Balancing between Security and Search Performance on Searchable Encryption.
Proceedings of the Thirteenth International Conference on Mobile Computing and Ubiquitous Network, 2021

DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Public-key Searchable Encryption with Index Generation for Shared Database.
J. Inf. Process., 2020

2019
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

2018
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
J. Inf. Process., 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption.
Proceedings of the Information Security Practice and Experience, 2018

2017
On methods for privacy-preserving energy disaggregation.
Proceedings of the 2017 IEEE International Conference on Acoustics, 2017

Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016

A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
SEPM: Efficient Partial Keyword Search on Encrypted Data.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2013
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Cryptographically-Secure and Efficient Remote Cancelable Biometrics Based on Public-Key Homomorphic Encryption.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Homomorphic encryption based cancelable biometrics secure against replay and its related attack.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application to Searchable Encryption in Multi-user Setting.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

2010
Key Generation for Fast Inversion of the Paillier Encryption Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Primitive Power Roots of Unity and Its Application to Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

2008
Public-Key Cryptosystems with Primitive Power Roots of Unity.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008


  Loading...