Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Koseki Yoshihiro"'
Autor:
Satoshi Yasuda, Yutaka Kawai, Goichiro Hanaoka, Fuyuki Kitagawa, Koseki Yoshihiro, Yusuke Sakai
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :183-194
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :81-98
Publikováno v:
DSC
Searchable symmetric encryption enables users with the secret key to conduct keyword search on encrypted data without decryption. Recently, dynamic searchable symmetric encryption (DSSE) which provides secure functionalities for adding or deleting do
Autor:
Yutaka Kawai, Jacob C. N. Schuldt, Goichiro Hanaoka, Nuttapong Attrapadung, Takato Hirano, Koseki Yoshihiro
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Koseki Yoshihiro, Goichiro Hanaoka, Yusuke Sakai, Yutaka Kawai, Satoshi Yasuda, Fuyuki Kitagawa
Publikováno v:
Provable Security ISBN: 9783030014452
ProvSec
ProvSec
Homomorphic encryption allows computation over encrypted data and can be used for delegating computation: data providers encrypt their data and send them to an aggregator, and then the aggregator performs computation for a receiver with the data kept
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::003509c78383b3eeb2e8e8ba8d424cdf
https://doi.org/10.1007/978-3-030-01446-9_25
https://doi.org/10.1007/978-3-030-01446-9_25
Publikováno v:
Information Security Practice and Experience ISBN: 9783319998060
ISPEC
ISPEC
Searchable symmetric encryption (SSE) which can search encrypted data using encrypted keywords has been extremely studied. In Asiacrypt’10, Chase and Kamara formalized structured encryption which is a generalization of SSE, and its concrete schemes
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::e96630e82b56b599cd5aeef959eb3bb2
https://doi.org/10.1007/978-3-319-99807-7_10
https://doi.org/10.1007/978-3-319-99807-7_10
Autor:
Yutaka Kawai, Nuttapong Attrapadung, Koseki Yoshihiro, Jacob C. N. Schuldt, Goichiro Hanaoka, Takato Hirano
Publikováno v:
Provable Security ISBN: 9783030014452
ProvSec
ProvSec
In this paper, we put forward the notion of a token-based multi-input functional encryption (token-based MIFE) scheme – a notion intended to give encryptors a mechanism to control the decryption of encrypted messages, by extending the encryption an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::d7dac35c0068612745451ab98ca13e58
https://doi.org/10.1007/978-3-030-01446-9_9
https://doi.org/10.1007/978-3-030-01446-9_9
Publikováno v:
Developments in Language Theory ISBN: 9783319986531
ISC
ISC
In this paper, we propose a new notion of multi-key homomorphic proxy re-encryption (MH-PRE) in which inputs of homomorphic evaluation are encrypted by different public keys and the evaluated ciphertext is decrypted by a single secret key. We obtain
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::62988eee5bb107d7806874b0be5b7f78
https://doi.org/10.1007/978-3-319-99136-8_18
https://doi.org/10.1007/978-3-319-99136-8_18