Yutaka KAWAI


Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
Yutaka KAWAI Takahiro MATSUDA Takato HIRANO Yoshihiro KOSEKI Goichiro HANAOKA 
Publication:   
Publication Date: 2019/01/01
Vol. E102-A  No. 1  pp. 81-98
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Proxy Re-encryptionhomomorphic encryption
 Summary | Full Text:PDF(1.8MB)

Methods for Restricting Message Space in Public-Key Encryption
Yusuke SAKAI Keita EMURA Goichiro HANAOKA Yutaka KAWAI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6  pp. 1156-1168
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public-key encryptionabuse detectionformat checking
 Summary | Full Text:PDF(978.9KB)

A Swarm Inspired Method for Efficient Data Transfer
Yutaka KAWAI Adil HASAN Go IWAI Takashi SASAKI Yoshiyuki WATASE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/12/01
Vol. E95-D  No. 12  pp. 2852-2859
Type of Manuscript:  Special Section PAPER (Special Section on Parallel and Distributed Computing and Networking)
Category: Network and Communication
Keyword: 
data gridACOswarm intelligencegrid computingfile systemiRODS
 Summary | Full Text:PDF(747KB)

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 1984-1993
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securitycomputational Diffie-Hellman assumptionbilinear computational Diffie-Hellman assumption
 Summary | Full Text:PDF(397.8KB)

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka KAWAI Shotaro TANNO Takahiro KONDO Kazuki YONEYAMA Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret handshake with multiple groupsprivacy preserving authenticationanonymitymonotone condition
 Summary | Full Text:PDF(1.3MB)