Keyword : public-key encryption


Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
Yusuke SAKAI Goichiro HANAOKA 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1 ; pp. 165-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-key encryptionchosen-ciphertext securitytight security
 Summary | Full Text:PDF(782.7KB)

Multi-Divisible On-Line/Off-Line Encryptions
Dan YAMAMOTO Wakaha OGATA 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1 ; pp. 91-102
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public-key encryptionon-line/off-line encryptiondivisiblemulti-user settingKEM
 Summary | Full Text:PDF(335.2KB)

Public-Key Encryption with Lazy Parties
Kenji YASUNAGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/02/01
Vol. E99-A  No. 2 ; pp. 590-600
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
public-key encryptionrational cryptographylazy party
 Summary | Full Text:PDF(401.9KB)

Randomness Leakage in the KEM/DEM Framework
Hitoshi NAMIKI Keisuke TANAKA Kenji YASUNAGA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 191-199
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
leakage resilient cryptographypublic-key encryptionKEM/DEM frameworkhash proof system
 Summary | Full Text:PDF(739.8KB)

Methods for Restricting Message Space in Public-Key Encryption
Yusuke SAKAI Keita EMURA Goichiro HANAOKA Yutaka KAWAI Kazumasa OMOTE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1156-1168
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public-key encryptionabuse detectionformat checking
 Summary | Full Text:PDF(978.9KB)

Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
Atsushi FUJIOKA Yoshiaki OKAMOTO Taiichi SAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 76-91
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Protocols
Keyword: 
timed-release public-key encryptionpublic-key encryptionidentity-based encryptionrandom oracle model.
 Summary | Full Text:PDF(345.6KB)

Public-Key Encryptions with Invariant Security Reductions in the Multi-User Setting
Mototsugu NISHIOKA Naohisa KOMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2 ; pp. 735-760
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
public-key encryptionsecurity reductionmulti-user setting
 Summary | Full Text:PDF(508KB)

Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information
Mitsuo OKADA Hiroaki KIKUCHI Yasuo OKABE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1348-1358
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Watermarking
Keyword: 
asymmetric digital watermarkingstatistical digital watermarkingpublic-key encryption
 Summary | Full Text:PDF(497.3KB)

A Refined Definition of Semantic Security for Public-Key Encryption Schemes
Hideaki SAKAI Noriko NAKAMURA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/01/01
Vol. E84-D  No. 1 ; pp. 34-39
Type of Manuscript:  Special Section PAPER (Special Issue on Selected Papers from LA Symposium)
Category: 
Keyword: 
chosen-ciphertext attackindistinguishabilityinformation securitychosen-plaintext attackpublic-key encryptionsemantic security
 Summary | Full Text:PDF(399.3KB)