Search Results1-20 of  37

  • 1 / 2
  • EMURA KEITA ID: 9000025000215

    Articles in CiNii:1

    • A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics (特集 社会を活性化するコンピュータセキュリティ技術) (2009)
  • Keita Emura ID: 9000347535096

    Articles in CiNii:1

    • A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics (2009)
  • EMURA Keita ID: 9000006116099

    Articles in CiNii:11

    • Some applications of non-malleable cryptography to secret sharing scheme (2006)
    • Share selectable secret sharing scheme on inefficiency concentrated for particular user (2007)
    • Group Signature with Efficient Revocation (2007)
  • EMURA Keita ID: 9000019055967

    Center for Highly Dependable Embedded Systems Technology, Japan Advanced Institute of Science and Technology (JAIST) (2011 from CiNii)

    Articles in CiNii:1

    • A Timed-Release Proxy Re-Encryption Scheme (2011)
  • EMURA Keita ID: 9000021331507

    Articles in CiNii:1

    • A Timed-Release Proxy Re-Encryption Scheme (2011)
  • EMURA Keita ID: 9000242085041

    Network Security Research Institute, Security Architecture Laboratory, National Institute of Information and Communications Technology (NICT) (2013 from CiNii)

    Articles in CiNii:1

    • On Discrete Logarithm Based Additively Homomorphic Encryption (2013)
  • EMURA Keita ID: 9000242085043

    Network Security Research Institute, National Institute of Information and Communications Technology (NICT) (2013 from CiNii)

    Articles in CiNii:1

    • A Remark on “ Efficient Revocable ID-Based Encryption with a Public Channel” (2013)
  • EMURA Keita ID: 9000259839230

    Network Security Research Institute, National Institute of Information and Communications Technology (NICT) (2014 from CiNii)

    Articles in CiNii:1

    • Revocable Identity-Based Encryption with Rejoin Functionality (2014)
  • EMURA Keita ID: 9000263066584

    Japan Advanced Institute of Science and Technology (2013 from CiNii)

    Articles in CiNii:1

    • Methods for Restricting Message Space in Public-Key Encryption (2013)
  • EMURA Keita ID: 9000283636531

    NICT (2015 from CiNii)

    Articles in CiNii:1

    • International Conference Report:International Workshop on Security (2015)
  • EMURA Keita ID: 9000311503535

    National Institute of Information and Communications Technology (2015 from CiNii)

    Articles in CiNii:1

    • Disavowable Public Key Encryption with Non-Interactive Opening (2015)
  • EMURA Keita ID: 9000312720395

    Network Security Research Institute, National Institute of Information and Communications Technology (NICT) (2016 from CiNii)

    Articles in CiNii:1

    • Semi-Generic Transformation of Revocable Hierarchical Identity-Based Encryption and Its DBDH Instantiation (2016)
  • EMURA Keita ID: 9000365541681

    National Institute of Information and Communications Technology (2017 from CiNii)

    Articles in CiNii:1

    • Group Signature with Deniability: How to Disavow a Signature (2017)
  • EMURA Keita ID: 9000398137575

    Cybersecurity Research Institute, National Institute of Information and Communications Technology (NICT) (2018 from CiNii)

    Articles in CiNii:1

    • Generic Constructions for Fully Secure Revocable Attribute-Based Encryption (2018)
  • EMURA Keita ID: 9000404099513

    National Institute of Information and Communications Technology (NICT) (2019 from CiNii)

    Articles in CiNii:1

    • Shortening the Libert-Peters-Yung Revocable Group Signature Scheme by Using the Random Oracle Methodology (2019)
  • EMURA Keita ID: 9000405894661

    Cybersecurity Research Institute, National Institute of Information and Communications Technology (NICT) (2020 from CiNii)

    Articles in CiNii:1

    • A Revocable Group Signature Scheme with Scalability from Simple Assumptions (2020)
  • EMURA Keita ID: 9000409597228

    National Institute of Communications and Information Technology (NICT) (2020 from CiNii)

    Articles in CiNii:1

    • On the Security of Keyed-Homomorphic PKE: Preventing Key Recovery Attacks and Ciphertext Validity Attacks (2020)
  • Emura Keita ID: 9000021084012

    School of Information Science, Japan Advanced Institute of Science and Technology (2009 from CiNii)

    Articles in CiNii:1

    • A Dynamic Attribute-Based Group Signature Scheme and Its Application in an Anonymous Survey for the Collection of Attribute Statistics (2009)
  • Emura Keita ID: 9000022759216

    Articles in CiNii:1

    • A Ciphertext-Policy Attribute-Based Encryption Scheme with Constant Ciphertext Length (2009)
  • Emura Keita ID: 9000022759225

    Articles in CiNii:1

    • A Selectable k-Times Relaxed Anonymous Authentication Scheme (2009)
  • 1 / 2
Page Top