What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Keita Emura
Google Scholar
ORCID:
0000-0002-8969-3581
48
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
An anonymous yet accountable contract wallet system using account abstraction.
Kota Chin
Keita Emura
Kazumasa Omote
2025
conf/asiajcis
Security Analysis on a Public-Key Inverted-Index Keyword Search Scheme with Designated Tester.
Mizuki Hayashi
Keita Emura
2025
conf/asiajcis
A Smart Contract-Based Non-Transferable Signature Verification System using Nominative Signatures.
Hinata Nishino
Kazumasa Omote
Keita Emura
2025
journals/cic
Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key, Revisited: Consistency, Outsider Strong Unforgeability, and Generic Construction.
Keita Emura
2024
conf/acisp
On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks.
Keita Emura
2024
conf/asiajcis
An Identity Management System Using Group Signatures with Message-Dependent Opening.
Yuto Imura
Keita Emura
2024
conf/acns
Generic Construction of Forward Secure Public Key Authenticated Encryption with Keyword Search.
Keita Emura
2022
conf/acns
Output Prediction Attacks on Block Ciphers Using Deep Learning.
Hayato Kimura
Keita Emura
Takanori Isobe
Ryoma Ito
Kazuto Ogawa
Toshihiro Ohigashi
2022
conf/acns
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation.
Shingo Sato
Keita Emura
Atsushi Takayasu
2022
conf/provsec
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test.
Kyoichi Asano
Keita Emura
Atsushi Takayasu
Yohei Watanabe
2022
conf/asiapkc
Generic Construction of Public-key Authenticated Encryption with Keyword Search Revisited: Stronger Security and Efficient Construction.
Keita Emura
2022
conf/wisa
Membership Privacy for Asynchronous Group Messaging.
Keita Emura
Kaisei Kajita
Ryo Nojima
Kazuto Ogawa
Go Ohtake
2021
conf/asiajcis
A Privacy-Preserving Enforced Bill Collection System using Smart Contracts.
Tomoki Fujitani
Keita Emura
Kazumasa Omote
2021
conf/provsec
Verifiable Functional Encryption Using Intel SGX.
Tatsuya Suzuki
Keita Emura
Toshihiro Ohigashi
Kazumasa Omote
2021
conf/icbc2
An Anonymous Trust-Marking Scheme on Blockchain Systems.
Teppei Sato
Keita Emura
Tomoki Fujitani
Kazumasa Omote
2019
conf/ccs
Session details: Invited Talk.
Keita Emura
2019
conf/ccs
Proper Usage of the Group Signature Scheme in ISO/IEC 20008-2.
Ai Ishida
Yusuke Sakai
Keita Emura
Goichiro Hanaoka
Keisuke Tanaka
2019
conf/esorics
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices.
Keita Emura
Shuichi Katsumata
Yohei Watanabe
2017
journals/istr
Establishing secure and anonymous communication channel: KEM/DEM-based construction and its implementation.
Keita Emura
Akira Kanaoka
Satoshi Ohta
Takeshi Takahashi
2017
conf/ccs
Mis-operation Resistant Searchable Homomorphic Encryption.
Keita Emura
Takuya Hayashi
Noboru Kunihiro
Jun Sakuma
2017
conf/ccs
Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction.
Keita Emura
Takuya Hayashi
Ai Ishida
2017
conf/acisp
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions.
Keita Emura
2017
conf/esorics
Generic Constructions for Fully Secure Revocable Attribute-Based Encryption.
Kotoko Yamada
Nuttapong Attrapadung
Keita Emura
Goichiro Hanaoka
Keisuke Tanaka
2017
conf/ctrsa
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters.
Yohei Watanabe
Keita Emura
Jae Hong Seo
2016
conf/cans
Group Signature with Deniability: How to Disavow a Signature.
Ai Ishida
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
Keisuke Tanaka
2015
conf/ccs
Disavowable Public Key Encryption with Non-interactive Opening.
Ai Ishida
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
Keisuke Tanaka
2015
conf/acisp
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions.
Yusuke Sakai
Keita Emura
Jacob C. N. Schuldt
Goichiro Hanaoka
Kazuo Ohta
2015
conf/acns
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
Jae Hong Seo
Keita Emura
Keita Xagawa
Kazuki Yoneyama
2015
conf/lightsec
A Light-Weight Group Signature Scheme with Time-Token Dependent Linking.
Keita Emura
Takuya Hayashi
2015
conf/ctrsa
Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.
Jae Hong Seo
Keita Emura
2015
conf/iwsec
Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption.
Jae Hong Seo
Keita Emura
2014
journals/tifs
Revocable Identity-Based Cryptosystem Revisited: Security Models and Constructions.
Jae Hong Seo
Keita Emura
2014
conf/acns
A Revocable Group Signature Scheme from Identity-Based Revocation Techniques: Achieving Constant-Size Revocation List.
Nuttapong Attrapadung
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
2013
conf/ccs
A group signature scheme with unbounded message-dependent opening.
Kazuma Ohara
Yusuke Sakai
Keita Emura
Goichiro Hanaoka
2013
conf/ccs
Risk visualization and alerting system: architecture and proof-of-concept implementation.
Takeshi Takahashi
Keita Emura
Akira Kanaoka
Shin'ichiro Matsuo
Tadashi Minowa
2013
conf/pkc
Revocable Identity-Based Encryption Revisited: Security Model and Construction.
Jae Hong Seo
Keita Emura
2013
conf/pkc
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
Keita Emura
Goichiro Hanaoka
Go Ohtake
Takahiro Matsuda
Shota Yamada
2013
conf/ctrsa
Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.
Jae Hong Seo
Keita Emura
2012
conf/pkc
On the Security of Dynamic Group Signatures: Preventing Signature Hijacking.
Yusuke Sakai
Jacob C. N. Schuldt
Keita Emura
Goichiro Hanaoka
Kazuo Ohta
2011
conf/acisp
Toward Dynamic Attribute-Based Signcryption (Poster).
Keita Emura
Atsuko Miyaji
Mohammad Shahriar Rahman
2011
conf/icisc
A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2011
conf/icics
Non-interactive Opening for Ciphertexts Encrypted by Shared Keys.
Jiageng Chen
Keita Emura
Atsuko Miyaji
2011
conf/icics
Ideal Secret Sharing Schemes with Share Selectability.
Keita Emura
Atsuko Miyaji
Akito Nomura
Mohammad Shahriar Rahman
Masakazu Soshi
2011
conf/iwsec
Towards Restricting Plaintext Space in Public Key Encryption.
Yusuke Sakai
Keita Emura
Goichiro Hanaoka
Yutaka Kawai
Kazumasa Omote
2010
conf/provsec
A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2010
conf/provsec
An Anonymous Designated Verifier Signature Scheme with Revocation: How to Protect a Company's Reputation.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
2010
conf/iwsec
Group Signature Implies PKE with Non-interactive Opening and Threshold PKE.
Keita Emura
Goichiro Hanaoka
Yusuke Sakai
2009
conf/wisa
-Times Relaxed Anonymous Authentication Scheme.
Keita Emura
Atsuko Miyaji
Kazumasa Omote
Coauthors
Ai Ishida
(4)
Akira Kanaoka
(2)
Akito Nomura
(1)
Atsuko Miyaji
(7)
Atsushi Takayasu
(2)
Go Ohtake
(2)
Goichiro Hanaoka
(11)
Hayato Kimura
(1)
Hinata Nishino
(1)
Jacob C. N. Schuldt
(2)
Jae Hong Seo
(7)
Jiageng Chen
(1)
Jun Sakuma
(1)
Kaisei Kajita
(1)
Kazuki Yoneyama
(1)
Kazuma Ohara
(1)
Kazumasa Omote
(10)
Kazuo Ohta
(2)
Kazuto Ogawa
(2)
Keisuke Tanaka
(4)
Keita Emura
(48)
Keita Xagawa
(1)
Kota Chin
(1)
Kotoko Yamada
(1)
Kyoichi Asano
(1)
Masakazu Soshi
(1)
Mizuki Hayashi
(1)
Mohammad Shahriar Rahman
(2)
Noboru Kunihiro
(1)
Nuttapong Attrapadung
(2)
Ryo Nojima
(1)
Ryoma Ito
(1)
Satoshi Ohta
(1)
Shin'ichiro Matsuo
(1)
Shingo Sato
(1)
Shota Yamada
(1)
Shuichi Katsumata
(1)
Tadashi Minowa
(1)
Takahiro Matsuda
(1)
Takanori Isobe
(1)
Takeshi Takahashi
(2)
Takuya Hayashi
(3)
Tatsuya Suzuki
(1)
Teppei Sato
(1)
Tomoki Fujitani
(2)
Toshihiro Ohigashi
(2)
Yohei Watanabe
(3)
Yusuke Sakai
(9)
Yutaka Kawai
(1)
Yuto Imura
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to