New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters Y Watanabe, K Emura, JH Seo Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 55 | 2017 |
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance A Takayasu, Y Watanabe Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 54 | 2017 |
Card-based majority voting protocols with three inputs using three cards Y Watanabe, Y Kuroki, S Suzuki, Y Koga, M Iwamoto, K Ohta 2018 International Symposium on Information Theory and Its Applications …, 2018 | 32 | 2018 |
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices K Emura, S Katsumata, Y Watanabe Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019 | 24 | 2019 |
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance Y Ishida, J Shikata, Y Watanabe International Journal of Applied Cryptography 3 (3), 288-311, 2017 | 23 | 2017 |
Identity-based Hierarchical Key-insulated Encryption without Random Oracles Y Watanabe, J Shikata Public-Key Cryptography – PKC 2016, 255-279, 2016 | 20 | 2016 |
Constructions of CCA-secure revocable identity-based encryption Y Ishida, Y Watanabe, J Shikata Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 16 | 2015 |
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability K Emura, LT Phong, Y Watanabe Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 167-174, 2015 | 15 | 2015 |
Efficient card-based majority voting protocols Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga, Y Watanabe, M Iwamoto, ... New Generation Computing 40 (1), 173-198, 2022 | 14 | 2022 |
Adaptively secure revocable hierarchical IBE from k-linear assumption K Emura, A Takayasu, Y Watanabe Designs, Codes and Cryptography 89 (7), 1535-1574, 2021 | 13 | 2021 |
Anonymous broadcast authentication for securely remote-controlling IoT devices Y Watanabe, N Yanai, J Shikata International Conference on Advanced Information Networking and Applications …, 2021 | 13 | 2021 |
Identity-based encryption with security against the KGC: A formal model and its instantiations K Emura, S Katsumata, Y Watanabe Theoretical Computer Science 900, 97-119, 2022 | 12 | 2022 |
Timed-release computational secret sharing and threshold encryption Y Watanabe, J Shikata Designs, Codes and Cryptography 86 (1), 17-54, 2018 | 11 | 2018 |
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more A Takayasu, Y Watanabe Theoretical Computer Science 849, 64-98, 2021 | 10 | 2021 |
Generic constructions of revocable hierarchical identity-based encryption K Emura, A Takayasu, Y Watanabe Cryptology ePrint Archive, 2021 | 10 | 2021 |
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments) H Anada, A Kanaoka, N Matsuzaki, Y Watanabe International Journal of Information Security 19 (1), 15-38, 2020 | 10 | 2020 |
Key-updatable public-key encryption with keyword search: Models and generic constructions H Anada, A Kanaoka, N Matsuzaki, Y Watanabe Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 10 | 2018 |
Efficient dynamic searchable encryption with forward privacy under the decent leakage Y Watanabe, K Ohara, M Iwamoto, K Ohta Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 9 | 2022 |
Implementation and analysis of fully homomorphic encryption in wearable devices A Prasitsupparote, Y Watanabe, J Shikata The Fourth International Conference on Information Security and Digital …, 2018 | 7 | 2018 |
Efficient revocable identity-based encryption with short public parameters K Emura, JH Seo, Y Watanabe Theoretical Computer Science 863, 127-155, 2021 | 6 | 2021 |