Keyword : public key encryption


Searchable Public Key Encryption Supporting Simple Boolean Keywords Search
Yu ZHANG Yansong ZHAO Yifan WANG Yin LI 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1 ; pp. 114-124
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public key encryptionBoolean keywords searchsearchable encryption
 Summary | Full Text:PDF(1.8MB)

Approach for Constructing Public Key Encryption with Multi-Dimensional Range Query
Yu ZHANG Songfeng LU Hua ZHAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 754-757
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key encryptionmulti-dimensional range querysearching on encrypted data
 Summary | Full Text:PDF(90KB)

On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack
Jinyong CHANG Rui XUE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/11/01
Vol. E97-A  No. 11 ; pp. 2267-2271
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
key-dependent messagepublic key encryptionnonadaptive chosen ciphertext attackDamgård's ElGamal scheme
 Summary | Full Text:PDF(110.2KB)

Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs
Manh Ha NGUYEN Kenji YASUNAGA Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1100-1111
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionhash proof systemkey-leakagechosen-ciphertext attack
 Summary | Full Text:PDF(766.6KB)

How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA Kaoru KUROSAWA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6 ; pp. 1293-1305
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key encryptionchosen-ciphertext securitykey encapsulation mechanism
 Summary | Full Text:PDF(435.6KB)

Secure and Efficient IBE-PKE Proxy Re-Encryption
Takeo MIZUNO Hiroshi DOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 36-44
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
proxy re-encryptionpublic key encryptionidentity-based encryptionbilinear maps
 Summary | Full Text:PDF(385.4KB)

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 1984-1993
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securitycomputational Diffie-Hellman assumptionbilinear computational Diffie-Hellman assumption
 Summary | Full Text:PDF(397.8KB)

Between Hashed DH and Computational DH: Compact Encryption from Weaker Assumption
Goichiro HANAOKA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11 ; pp. 1994-2006
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securityDiffie-Hellman assumption
 Summary | Full Text:PDF(409.5KB)

On the Security of Status Certificate-Based Encryption Scheme
Je Hong PARK Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 303-304
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
public key encryptionstatus certificate-based encryptioncryptanalysiskey substitution
 Summary | Full Text:PDF(61.8KB)