Author of the publication

Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts.

, , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (1): 81-98 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Trapdoor Generation from Multiple Hashing in Searchable Symmetric Encryption., , and . ISPEC, volume 11125 of Lecture Notes in Computer Science, page 160-175. Springer, (2018)Privacy-Preserving Verifiable CNNs., , , , , , , , and . ACNS (2), volume 14584 of Lecture Notes in Computer Science, page 373-402. Springer, (2024)Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 102-A (1): 81-98 (2019)Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption., , , , , and . CANS, volume 10052 of Lecture Notes in Computer Science, page 350-364. (2016)Verifiable Privacy-Preserving Data Aggregation Protocols., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (1): 183-194 (2020)Token-Based Multi-input Functional Encryption., , , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 147-164. Springer, (2018)DBMS-Friendly Searchable Symmetric Encryption: Constructing Index Generation Suitable for Database Management Systems., , and . DSC, page 1-8. IEEE, (2021)SEPM: Efficient Partial Keyword Search on Encrypted Data., , , and . CANS, volume 9476 of Lecture Notes in Computer Science, page 75-91. Springer, (2015)Multi-key Homomorphic Proxy Re-Encryption., , , and . ISC, volume 11060 of Lecture Notes in Computer Science, page 328-346. Springer, (2018)Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols., , , , , and . ProvSec, volume 11192 of Lecture Notes in Computer Science, page 415-422. Springer, (2018)