Follow
Yohei Watanabe
Title
Cited by
Cited by
Year
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
A Takayasu, Y Watanabe
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
532017
New revocable IBE in prime-order groups: adaptively secure, decryption key exposure resistant, and with short public parameters
Y Watanabe, K Emura, JH Seo
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
522017
Card-based majority voting protocols with three inputs using three cards
Y Watanabe, Y Kuroki, S Suzuki, Y Koga, M Iwamoto, K Ohta
2018 International Symposium on Information Theory and Its Applications …, 2018
282018
Identity-based encryption with security against the KGC: a formal model and its instantiation from lattices
K Emura, S Katsumata, Y Watanabe
Computer Security–ESORICS 2019: 24th European Symposium on Research in …, 2019
212019
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
Y Ishida, J Shikata, Y Watanabe
International Journal of Applied Cryptography 3 (3), 288-311, 2017
202017
Identity-based Hierarchical Key-insulated Encryption without Random Oracles
Y Watanabe, J Shikata
Public-Key Cryptography – PKC 2016, 255-279, 2016
202016
Constructions of CCA-secure revocable identity-based encryption
Y Ishida, Y Watanabe, J Shikata
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
162015
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability
K Emura, LT Phong, Y Watanabe
Trustcom/BigDataSE/ISPA, 2015 IEEE 1, 167-174, 2015
152015
Anonymous broadcast authentication for securely remote-controlling IoT devices
Y Watanabe, N Yanai, J Shikata
International Conference on Advanced Information Networking and Applications …, 2021
132021
Adaptively secure revocable hierarchical IBE from k-linear assumption
K Emura, A Takayasu, Y Watanabe
Designs, Codes and Cryptography 89 (7), 1535-1574, 2021
122021
Identity-based encryption with security against the KGC: A formal model and its instantiations
K Emura, S Katsumata, Y Watanabe
Theoretical Computer Science 900, 97-119, 2022
112022
Key-updatable public-key encryption with keyword search: Models and generic constructions
H Anada, A Kanaoka, N Matsuzaki, Y Watanabe
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
112018
Timed-release computational secret sharing and threshold encryption
Y Watanabe, J Shikata
Designs, Codes and Cryptography 86 (1), 17-54, 2018
112018
Generic constructions of revocable hierarchical identity-based encryption
K Emura, A Takayasu, Y Watanabe
Cryptology ePrint Archive, 2021
102021
Efficient card-based majority voting protocols
Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga, Y Watanabe, M Iwamoto, ...
New Generation Computing 40 (1), 173-198, 2022
92022
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more
A Takayasu, Y Watanabe
Theoretical Computer Science 849, 64-98, 2021
92021
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments)
H Anada, A Kanaoka, N Matsuzaki, Y Watanabe
International Journal of Information Security 19 (1), 15-38, 2020
92020
Implementation and analysis of fully homomorphic encryption in wearable devices
A Prasitsupparote, Y Watanabe, J Shikata
The Fourth International Conference on Information Security and Digital …, 2018
82018
Efficient dynamic searchable encryption with forward privacy under the decent leakage
Y Watanabe, K Ohara, M Iwamoto, K Ohta
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
72022
Efficient revocable identity-based encryption with short public parameters
K Emura, JH Seo, Y Watanabe
Theoretical Computer Science 863, 127-155, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20