Name
Affiliation
Papers
KEITA EMURA
Natl Inst Informat & Commun Technol, Koganei, Tokyo, Japan
91
Collaborators
Citations 
PageRank 
75
316
36.97
Referers 
Referees 
References 
536
1049
1490
Search Limit
1001000
Title
Citations
PageRank
Year
Identity-based encryption with security against the KGC: A formal model and its instantiations00.342022
Verifiable Functional Encryption Using Intel SGX00.342021
Adaptively Secure Revocable Hierarchical Ibe From K-Linear Assumption00.342021
An Anonymous Trust-Marking Scheme on Blockchain Systems00.342021
Efficient Revocable Identity-Based Encryption With Short Public Parameters00.342021
On The Security Of Keyed-Homomorphic Pke: Preventing Key Recovery Attacks And Ciphertext Validity Attacks00.342021
Efficient Identity-Based Encryption With Hierarchical Key-Insulation From Hibe00.342021
A Privacy-Preserving Enforced Bill Collection System using Smart Contracts00.342021
Privacy-Preserving Data Analysis: Providing Traceability Without Big Brother00.342021
Group Signatures with Time-bound Keys Revisited: A New Model, an Efficient Construction, and its Implementation10.362020
A Revocable Group Signature Scheme With Scalability From Simple Assumptions00.342020
Secure-channel free searchable encryption with multiple keywords: A generic construction, an instantiation, and its implementation00.342020
A Generic Construction of Integrated Secure-Channel Free PEKS and PKE and its Application to EMRs in Cloud Storage.10.352019
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-210.362019
Implementation of a Strongly Robust Identity-Based Encryption Scheme over Type-3 Pairings00.342019
Session details: Invited Talk00.342019
Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions00.342019
A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Application to Identity Management.00.342019
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions and Its Implementations.00.342019
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems.00.342018
Road-to-Vehicle Communications With Time-Dependent Anonymity: A Lightweight Construction and Its Experimental Results.00.342018
Fully Anonymous Group Signature with Verifier-Local Revocation.00.342018
Generic Constructions For Fully Secure Revocable Attribute-Based Encryption00.342018
A Generic Construction Of Integrated Secure-Channel Free Peks And Pke00.342018
A Revocable Group Signature Scheme With Scalability From Simple Assumptions And Its Implementation00.342018
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.10.352018
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction.10.352017
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.00.342017
Mis-operation Resistant Searchable Homomorphic Encryption.10.352017
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.50.402017
A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother.00.342017
A Generic Construction of Secure-Channel Free Searchable Encryption with Multiple Keywords.10.352017
Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation00.342016
Shortening The Libert-Peters-Yung Revocable Group Signature Scheme By Using The Random Oracle Methodology10.342016
Semi-Generic Transformation Of Revocable Hierarchical Identity-Based Encryption And Its Dbdh Instantiation20.362016
Secure and Anonymous Communication Technique: Formal Model and its Prototype Implementation50.452016
Revocable hierarchical identity-based encryption via history-free approach.20.362016
Constructions of dynamic and non-dynamic threshold public-key encryption schemes with decryption consistency.00.342016
Time-specific encryption from forward-secure encryption: generic and direct constructions.00.342016
A KEM/DEM-Based Construction for Secure and Anonymous Communication20.362015
Disavowable Public Key Encryption with Non-interactive Opening10.382015
Dynamic Threshold Public-Key Encryption With Decryption Consistency From Static Assumptions20.382015
A Light-Weight Group Signature Scheme with Time-Token Dependent Linking.30.402015
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.80.502015
SKENO: Secret key encryption with non-interactive opening.00.342015
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability10.352015
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption30.372015
Revocable Group Signature with Constant-Size Revocation List.00.342015
Revocable Identity-Based Encryption With Rejoin Functionality40.392014
A Privacy-Enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures00.342014
  • 1
  • 2