Follow
Yohei Watanabe
Title
Cited by
Cited by
Year
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
A Takayasu, Y Watanabe
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
592017
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Y Watanabe, K Emura, JH Seo
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
542017
Card-based majority voting protocols with three inputs using three cards
Y Watanabe, Y Kuroki, S Suzuki, Y Koga, M Iwamoto, K Ohta
2018 International Symposium on Information Theory and Its Applications …, 2018
382018
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices
K Emura, S Katsumata, Y Watanabe
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
252019
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
Y Ishida, J Shikata, Y Watanabe
International Journal of Applied Cryptography 3 (3), 288-311, 2017
212017
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Y Watanabe, J Shikata
Public-Key Cryptography – PKC 2016, 255-279, 2016
202016
Efficient card-based majority voting protocols
Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga, Y Watanabe, M Iwamoto, ...
New Generation Computing 40 (1), 173-198, 2022
182022
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
K Emura, LT Phong, Y Watanabe
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 167-174, 2015
172015
Identity-based encryption with security against the KGC: A formal model and its instantiations
K Emura, S Katsumata, Y Watanabe
Theoretical Computer Science 900, 97-119, 2022
152022
Adaptively secure revocable hierarchical IBE from k-linear assumption
K Emura, A Takayasu, Y Watanabe
Designs, Codes and Cryptography 89 (7), 1535-1574, 2021
152021
Constructions of CCA-secure revocable identity-based encryption
Y Ishida, Y Watanabe, J Shikata
Australasian Conference on Information Security and Privacy, 174-191, 2015
152015
Anonymous broadcast authentication for securely remote-controlling IoT devices
Y Watanabe, N Yanai, J Shikata
International Conference on Advanced Information Networking and Applications …, 2021
132021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more
A Takayasu, Y Watanabe
Theoretical Computer Science 849, 64-98, 2021
132021
Timed-release computational secret sharing and threshold encryption
Y Watanabe, J Shikata
Designs, Codes and Cryptography 86 (1), 17-54, 2018
122018
Generic constructions of revocable hierarchical identity-based encryption
K Emura, A Takayasu, Y Watanabe
Cryptology ePrint Archive, 2021
102021
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
H Anada, A Kanaoka, N Matsuzaki, Y Watanabe
International Journal of Information Security 19 (1), 15-38, 2020
102020
Key-updatable public-key encryption with keyword search: Models and generic constructions
H Anada, A Kanaoka, N Matsuzaki, Y Watanabe
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
102018
Efficient dynamic searchable encryption with forward privacy under the decent leakage
Y Watanabe, K Ohara, M Iwamoto, K Ohta
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
92022
Designated verifier signature with claimability
K Yamashita, K Hara, Y Watanabe, N Yanai, J Shikata
Proceedings of the 10th ACM Asia Public-Key Cryptography Workshop, 21-32, 2023
82023
Implementation and analysis of fully homomorphic encryption in wearable devices
A Prasitsupparote, Y Watanabe, J Shikata
The Fourth International Conference on Information Security and Digital …, 2018
82018
The system can't perform the operation now. Try again later.
Articles 1–20