Yutaka Kawai

According to our database1, Yutaka Kawai authored at least 37 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
Public-key Searchable Encryption with Index Generation for Shared Database.
J. Inf. Process., 2020

Verifiable Privacy-Preserving Data Aggregation Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

2019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions.
Secur. Commun. Networks, 2019

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

2018
Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols.
Proceedings of the Provable Security, 2018

Token-Based Multi-input Functional Encryption.
Proceedings of the Provable Security, 2018

Multi-key Homomorphic Proxy Re-Encryption.
Proceedings of the Information Security - 21st International Conference, 2018

Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption.
Proceedings of the Information Security Practice and Experience, 2018

2017
Fully Dynamic Multi Target Homomorphic Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017

Dynamic Multi Target Homomorphic Attribute-Based Encryption.
Proceedings of the Cryptography and Coding - 16th IMA International Conference, 2017

2016
A limitation on security evaluation of cryptographic primitives with fixed keys.
Secur. Commun. Networks, 2016

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes.
Proceedings of the Advances in Information and Computer Security, 2016

Master key updatable attribute-based encryption on the dual pairing vector space.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A practical attack to AINA2014's countermeasure for cancelable biometric authentication protocols.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015

Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption.
Proceedings of the Information Security Practice and Experience, 2015

SEPM: Efficient Partial Keyword Search on Encrypted Data.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2013
Methods for Restricting Message Space in Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting.
IACR Cryptol. ePrint Arch., 2013

Fully-Anonymous Functional Proxy-Re-Encryption.
IACR Cryptol. ePrint Arch., 2013

Secret handshake scheme with request-based-revealing.
Comput. Math. Appl., 2013

2012
A Swarm Inspired Method for Efficient Data Transfer.
IEICE Trans. Inf. Syst., 2012

Group Signatures with Message-Dependent Opening.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
A method for reliably managing files with RNS in multi Data Grids.
Proceedings of the International Conference on Computational Science, 2011

On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems.
J. Internet Serv. Inf. Secur., 2011

Proxiable Designated Verifier Signature.
J. Inf. Process., 2011

The advanced data searching system with AMGA at the Belle II experiment.
Comput. Phys. Commun., 2011

Towards Restricting Plaintext Space in Public Key Encryption.
Proceedings of the Advances in Information and Computer Security, 2011

Managing Distributed Files with RNS in Heterogeneous Data Grids.
Proceedings of the 11th IEEE/ACM International Symposium on Cluster, 2011

2010
SAGA-based user environment for distributed computing resources: A universal Grid solution over multi-middleware infrastructures.
Proceedings of the International Conference on Computational Science, 2010

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

SAGA-based file access application over multi-filesystem middleware.
Proceedings of the 19th ACM International Symposium on High Performance Distributed Computing, 2010

2009
Secret Handshake: Strong Anonymity Definition and Construction.
IACR Cryptol. ePrint Arch., 2009


  Loading...