A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, A Nomura, K Omote, M Soshi Information Security Practice and Experience: 5th International Conference …, 2009 | 392 | 2009 |
Revocable identity-based encryption revisited: Security model and construction JH Seo, K Emura Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013 | 221 | 2013 |
Efficient delegation of key generation and revocation functionalities in identity-based encryption JH Seo, K Emura Topics in Cryptology–CT-RSA 2013: The Cryptographers’ Track at the RSA …, 2013 | 97 | 2013 |
Group signatures with message-dependent opening Y Sakai, K Emura, G Hanaoka, Y Kawai, T Matsuda, K Omote Pairing-Based Cryptography–Pairing 2012: 5th International Conference …, 2013 | 72 | 2013 |
On the security of dynamic group signatures: Preventing signature hijacking Y Sakai, JCN Schuldt, K Emura, G Hanaoka, K Ohta Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012 | 66 | 2012 |
Dynamic attribute-based signcryption without random oracles K Emura, A Miyaji, MS Rahman International Journal of Applied Cryptography 2 (3), 199-211, 2012 | 56 | 2012 |
Revocable hierarchical identity-based encryption: History-free update, security against insiders, and short ciphertexts JH Seo, K Emura Cryptographers’ Track at the RSA Conference, 106-123, 2015 | 54 | 2015 |
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters Y Watanabe, K Emura, JH Seo Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 53 | 2017 |
Generic constructions of secure‐channel free searchable encryption with adaptive security K Emura, A Miyaji, MS Rahman, K Omote Security and communication networks 8 (8), 1547-1560, 2015 | 50 | 2015 |
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length K Emura, A Miyaji, K Omote, A Nomura, M Soshi International Journal of Applied Cryptography 2 (1), 46-59, 2010 | 48 | 2010 |
Revocable identity-based cryptosystem revisited: Security models and constructions JH Seo, K Emura IEEE Transactions on Information Forensics and Security 9 (7), 1193-1205, 2014 | 45 | 2014 |
A dynamic attribute-based group signature scheme and its application in an anonymous survey for the collection of attribute statistics K Emura, A Miyaji, K Omote Information and Media Technologies 4 (4), 1060-1075, 2009 | 45 | 2009 |
Time-specific encryption from forward-secure encryption K Kasamatsu, T Matsuda, K Emura, N Attrapadung, G Hanaoka, H Imai Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 44 | 2012 |
Road-to-vehicle communications with time-dependent anonymity: A lightweight construction and its experimental results K Emura, T Hayashi IEEE Transactions on Vehicular Technology 67 (2), 1582-1597, 2017 | 30 | 2017 |
Privacy-preserving aggregation of time-series data with public verifiability from simple assumptions K Emura Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 30 | 2017 |
A revocable group signature scheme from identity-based revocation techniques: Achieving constant-size revocation list N Attrapadung, K Emura, G Hanaoka, Y Sakai Applied Cryptography and Network Security: 12th International Conference …, 2014 | 30 | 2014 |
Group signatures with time-bound keys revisited: a new model, an efficient construction, and its implementation K Emura, T Hayashi, A Ishida IEEE Transactions on Dependable and Secure Computing 17 (2), 292-305, 2017 | 29 | 2017 |
A timed-release proxy re-encryption scheme K Emura, A Miyaji, K Omote IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2011 | 28 | 2011 |
Generic construction of public-key authenticated encryption with keyword search revisited: Stronger security and efficient construction K Emura Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, 39-49, 2022 | 27 | 2022 |
Fully anonymous group signature with verifier-local revocation A Ishida, Y Sakai, K Emura, G Hanaoka, K Tanaka Security and Cryptography for Networks: 11th International Conference, SCN …, 2018 | 27 | 2018 |