Yohei Watanabe

Orcid: 0000-0003-4028-8603

Affiliations:
  • University of Electro-Communications, Japan
  • Yokohama National University, Japan (PhD 2016)


According to our database1, Yohei Watanabe authored at least 58 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Designated Verifier Signature with Claimability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

2023
Multi-Designated Receiver Authentication Codes: Models and Constructions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Abstraction Model of Probing and DFA Attacks on Block Ciphers.
IACR Cryptol. ePrint Arch., 2023

Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction.
IACR Cryptol. ePrint Arch., 2023

Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.
Des. Codes Cryptogr., 2023

Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023

IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Proceedings of the Information Security Practice and Experience, 2023

Packet Analysis and Information Theory on Attack Detection for Modbus TCP.
Proceedings of the 49th Annual Conference of the IEEE Industrial Electronics Society, 2023

Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Single-Shuffle Card-Based Protocols with Six Cards per Gate.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

The Two Sheriffs Problem: Cryptographic Formalization and Generalization.
Proceedings of the Combinatorial Optimization and Applications, 2023

Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

2022
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2022

Identity-based encryption with security against the KGC: A formal model and its instantiations.
Theor. Comput. Sci., 2022

Efficient Card-Based Majority Voting Protocols.
New Gener. Comput., 2022

Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security.
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022

2021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
Theor. Comput. Sci., 2021

Efficient revocable identity-based encryption with short public parameters.
Theor. Comput. Sci., 2021

Generic Constructions of Revocable Hierarchical Identity-based Encryption.
IACR Cryptol. ePrint Arch., 2021

State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021

A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test.
IACR Cryptol. ePrint Arch., 2021

Efficient identity-based encryption with Hierarchical key-insulation from HIBE.
Des. Codes Cryptogr., 2021

Adaptively secure revocable hierarchical IBE from k-linear assumption.
Des. Codes Cryptogr., 2021

Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021

Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments).
Int. J. Inf. Sec., 2020

A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

On the Power of Interaction in Signcryption.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Identity-based encryption with hierarchical key-insulation in the standard model.
Des. Codes Cryptogr., 2019

Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
Timed-release computational secret sharing and threshold encryption.
Des. Codes Cryptogr., 2018

Card-Based Majority Voting Protocols with Three Inputs Using Three Cards.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance.
Int. J. Appl. Cryptogr., 2017

Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance.
IACR Cryptol. ePrint Arch., 2017

Broadcast Encryption with Guessing Secrecy.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

Unconditionally secure searchable encryption.
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017

2016
Cryptography with Timed Access Control.
PhD thesis, 2016

Information-theoretically Secure Timed-release Secret Sharing Schemes.
J. Inf. Process., 2016

Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptol. ePrint Arch., 2016

New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
IACR Cryptol. ePrint Arch., 2016

Sequential aggregate authentication codes with information theoretic security.
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016

2015
Identity-based Hierarchical Key-insulated Encryption without Random Oracles.
IACR Cryptol. ePrint Arch., 2015

Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Proceedings of the Provable Security, 2015

Constructions of CCA-Secure Revocable Identity-Based Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
Timed-Release Secret Sharing Scheme with Information Theoretic Security.
CoRR, 2014

Timed-Release Computational Secret Sharing Scheme and Its Applications.
Proceedings of the Provable Security - 8th International Conference, 2014

Timed-Release Secret Sharing Schemes with Information Theoretic Security.
Proceedings of the Cryptography and Information Security in the Balkans, 2014

2013
Information-Theoretically Secure Entity Authentication in the Multi-user Setting.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
IACR Cryptol. ePrint Arch., 2012


  Loading...