default search action
Yohei Watanabe 0001
Person information
- affiliation: University of Electro-Communications, Japan
- affiliation (PhD 2016): Yokohama National University, Japan
Other persons with the same name
- Yohei Watanabe 0002 — Tokyo City University, Japan
- Yohei Watanabe 0003 — Kyoto Prefectural University of Medicine, Japan
- Yohei Watanabe 0004 — Yokohama National University, Japan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 203-217 (2024) - [j20]Takeshi Nakai, Keita Iwanari, Tomoki Ono, Yoshiki Abe, Yohei Watanabe, Mitsugu Iwamoto:
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model. New Gener. Comput. 42(3): 345-358 (2024) - [j19]Anastasiia Doi, Tomoki Ono, Yoshiki Abe, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto:
Card-Based Protocols for Private Set Intersection and Union. New Gener. Comput. 42(3): 359-380 (2024) - [i17]Takashi Tanaka, Kenji Sawada, Yohei Watanabe, Mitsugu Iwamoto:
Covert Vehicle Misguidance and Its Detection: A Hypothesis Testing Game over Continuous-Time Dynamics. CoRR abs/2409.05185 (2024) - 2023
- [j18]Kazuhiko Minematsu, Junji Shikata, Yohei Watanabe, Naoto Yanai:
Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices. IEEE Access 11: 62955-62969 (2023) - [j17]Hirokazu Kobayashi, Yohei Watanabe, Kazuhiko Minematsu, Junji Shikata:
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication. Des. Codes Cryptogr. 91(7): 2523-2562 (2023) - [j16]Yoshiki Abe, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Ohta:
A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 315-324 (2023) - [j15]Yohei Watanabe, Takenobu Seito, Junji Shikata:
Multi-Designated Receiver Authentication Codes: Models and Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 394-405 (2023) - [c38]Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. APKC@AsiaCCS 2023: 21-32 - [c37]Yexuan Liu, Yohei Watanabe, Junji Shikata:
Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency. CISS 2023: 1-6 - [c36]Kota Sugimoto, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
The Two Sheriffs Problem: Cryptographic Formalization and Generalization. COCOA (1) 2023: 512-523 - [c35]Shun Uchizono, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners. ICISC (2) 2023: 133-156 - [c34]Tomoki Ono, Kazumasa Shinagawa, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
Single-Shuffle Card-Based Protocols with Six Cards per Gate. ICISC (2) 2023: 157-169 - [c33]Takumi Amada, Mitsugu Iwamoto, Yohei Watanabe:
Efficient Result-Hiding Searchable Encryption with Forward and Backward Privacy. ICISC (2) 2023: 170-193 - [c32]Tatsuya Nishiuchi, Shintaro Fujita, Yohei Watanabe, Mitsugu Iwamoto, Kenji Sawada:
Packet Analysis and Information Theory on Attack Detection for Modbus TCP. IECON 2023: 1-6 - [c31]Yohei Watanabe, Naoto Yanai, Junji Shikata:
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures. ISPEC 2023: 105-122 - [c30]Yohei Watanabe, Toi Tomita, Junji Shikata:
Lattice-Based Multi-entity Identification Protocols. MobiSec 2023: 51-65 - [i16]Yuiko Matsubara, Daiki Miyahara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Sakiyama:
Abstraction Model of Probing and DFA Attacks on Block Ciphers. IACR Cryptol. ePrint Arch. 2023: 443 (2023) - [i15]Kyoichi Asano, Yohei Watanabe:
Updatable Public Key Encryption with Strong CCA Security: Security Analysis and Efficient Generic Construction. IACR Cryptol. ePrint Arch. 2023: 976 (2023) - 2022
- [j14]Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta:
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(12): 1559-1577 (2022) - [j13]Yoshiki Abe, Takeshi Nakai, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Card-Based Majority Voting Protocols. New Gener. Comput. 40(1): 173-198 (2022) - [j12]Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-based encryption with security against the KGC: A formal model and its instantiations. Theor. Comput. Sci. 900: 97-119 (2022) - [c29]Takenobu Seito, Junji Shikata, Yohei Watanabe:
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security. CISS 2022: 84-89 - [c28]Yohei Watanabe, Kazuma Ohara, Mitsugu Iwamoto, Kazuo Ohta:
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage. CODASPY 2022: 312-323 - [c27]Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe:
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption. ICEIS (2) 2022: 106-113 - [c26]Seiya Shimizu, Takeshi Nakai, Yohei Watanabe, Mitsugu Iwamoto:
An Improvement of Multi-Party Private Set Intersection Based on Oblivious Programmable PRFs. ISITA 2022: 234-238 - [c25]Anastasiia Doi, Tomoki Ono, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto:
Card-based Cryptographic Protocols for Private Set Intersection. ISITA 2022: 239-243 - [c24]Kyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe:
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test. ProvSec 2022: 3-19 - [e3]Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13177, Springer 2022, ISBN 978-3-030-97120-5 [contents] - [e2]Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13178, Springer 2022, ISBN 978-3-030-97130-4 [contents] - [i14]Yohei Watanabe, Naoto Yanai, Junji Shikata:
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures. CoRR abs/2208.03781 (2022) - 2021
- [j11]Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Adaptively secure revocable hierarchical IBE from k-linear assumption. Des. Codes Cryptogr. 89(7): 1535-1574 (2021) - [j10]Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Efficient identity-based encryption with Hierarchical key-insulation from HIBE. Des. Codes Cryptogr. 89(10): 2397-2431 (2021) - [j9]Atsushi Takayasu, Yohei Watanabe:
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more. Theor. Comput. Sci. 849: 64-98 (2021) - [j8]Keita Emura, Jae Hong Seo, Yohei Watanabe:
Efficient revocable identity-based encryption with short public parameters. Theor. Comput. Sci. 863: 127-155 (2021) - [c23]Yohei Watanabe, Naoto Yanai, Junji Shikata:
Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices. AINA (2) 2021: 679-690 - [c22]Masahiro Ebina, Jumpei Mita, Junji Shikata, Yohei Watanabe:
Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption. APKC@AsiaCCS 2021: 23-32 - [c21]Hirokazu Kobayashi, Yohei Watanabe, Junji Shikata:
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication. IMACC 2021: 105-128 - [i13]Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Generic Constructions of Revocable Hierarchical Identity-based Encryption. IACR Cryptol. ePrint Arch. 2021: 515 (2021) - [i12]Yohei Watanabe, Takeshi Nakai, Kazuma Ohara, Takuya Nojima, Yexuan Liu, Mitsugu Iwamoto, Kazuo Ohta:
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited. IACR Cryptol. ePrint Arch. 2021: 948 (2021) - [i11]Keita Emura, Ryoma Ito, Sachiko Kanamori, Ryo Nojima, Yohei Watanabe:
State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption. IACR Cryptol. ePrint Arch. 2021: 953 (2021) - [i10]Kyoichi Asano, Keita Emura, Atsushi Takayasu, Yohei Watanabe:
A Generic Construction of CCA-secure Attribute-based Encryption with Equality Test. IACR Cryptol. ePrint Arch. 2021: 1371 (2021) - 2020
- [j7]Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-updatable public-key encryption with keyword search (Or: How to realize PEKS with efficient key updates for IoT environments). Int. J. Inf. Sec. 19(1): 15-38 (2020) - [c20]Junichi Ida, Junji Shikata, Yohei Watanabe:
On the Power of Interaction in Signcryption. ISITA 2020: 348-352 - [c19]Tomoki Uemura, Yohei Watanabe, Yang Li, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta:
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. ISITA 2020: 382-386 - [i9]Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption. IACR Cryptol. ePrint Arch. 2020: 886 (2020) - [i8]Keita Emura, Atsushi Takayasu, Yohei Watanabe:
Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE. IACR Cryptol. ePrint Arch. 2020: 1087 (2020)
2010 – 2019
- 2019
- [j6]Junji Shikata, Yohei Watanabe:
Identity-based encryption with hierarchical key-insulation in the standard model. Des. Codes Cryptogr. 87(5): 1005-1033 (2019) - [j5]Kazuma Ohara, Yohei Watanabe, Mitsugu Iwamoto, Kazuo Ohta:
Multi-Party Computation for Modular Exponentiation Based on Replicated Secret Sharing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1079-1090 (2019) - [c18]Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-Based Encryption with Security Against the KGC: A Formal Model and Its Instantiation from Lattices. ESORICS (2) 2019: 113-133 - [i7]Keita Emura, Shuichi Katsumata, Yohei Watanabe:
Identity-Based Encryption with Security against the KGC: A Formal Model and Its Instantiations. IACR Cryptol. ePrint Arch. 2019: 1384 (2019) - 2018
- [j4]Yohei Watanabe, Junji Shikata:
Timed-release computational secret sharing and threshold encryption. Des. Codes Cryptogr. 86(1): 17-54 (2018) - [c17]Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. ACISP 2018: 341-359 - [c16]Yohei Watanabe, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Mitsugu Iwamoto, Kazuo Ohta:
Card-Based Majority Voting Protocols with Three Inputs Using Three Cards. ISITA 2018: 218-222 - [e1]Keita Emura, Jae Hong Seo, Yohei Watanabe:
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS, Incheon, Republic of Korea, June 4, 2018. ACM 2018 [contents] - 2017
- [j3]Yuu Ishida, Junji Shikata, Yohei Watanabe:
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Int. J. Appl. Cryptogr. 3(3): 288-311 (2017) - [c15]Atsushi Takayasu, Yohei Watanabe:
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance. ACISP (1) 2017: 184-204 - [c14]Takahiro Yoshizawa, Yohei Watanabe, Junji Shikata:
Unconditionally secure searchable encryption. CISS 2017: 1-6 - [c13]Yohei Watanabe, Keita Emura, Jae Hong Seo:
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. CT-RSA 2017: 432-449 - [c12]Yohei Watanabe:
Broadcast Encryption with Guessing Secrecy. ICITS 2017: 39-57 - [i6]Atsushi Takayasu, Yohei Watanabe:
Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance. IACR Cryptol. ePrint Arch. 2017: 323 (2017) - 2016
- [b1]Yohei Watanabe:
Cryptography with Timed Access Control. Yokohama National University, Japan, 2016 - [j2]Yohei Watanabe, Junji Shikata:
Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1097-1106 (2016) - [j1]Yohei Watanabe, Junji Shikata:
Information-theoretically Secure Timed-release Secret Sharing Schemes. J. Inf. Process. 24(4): 680-689 (2016) - [c11]Shinichiro Tomita, Yohei Watanabe, Junji Shikata:
Sequential aggregate authentication codes with information theoretic security. CISS 2016: 192-197 - [c10]Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. ICITS 2016: 213-237 - [c9]Yohei Watanabe, Junji Shikata:
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. Public Key Cryptography (1) 2016: 255-279 - [i5]Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. IACR Cryptol. ePrint Arch. 2016: 64 (2016) - [i4]Yohei Watanabe, Keita Emura, Jae Hong Seo:
New Revocable IBE in Prime-Order Groups: Adaptively Secure, Decryption Key Exposure Resistant, and with Short Public Parameters. IACR Cryptol. ePrint Arch. 2016: 1094 (2016) - 2015
- [c8]Yuu Ishida, Yohei Watanabe, Junji Shikata:
Constructions of CCA-Secure Revocable Identity-Based Encryption. ACISP 2015: 174-191 - [c7]Yohei Watanabe, Junji Shikata:
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage. ProvSec 2015: 489-502 - [c6]Keita Emura, Le Trieu Phong, Yohei Watanabe:
Keyword Revocable Searchable Encryption with Trapdoor Exposure Resistance and Re-generateability. TrustCom/BigDataSE/ISPA (1) 2015: 167-174 - [i3]Yohei Watanabe, Junji Shikata:
Identity-based Hierarchical Key-insulated Encryption without Random Oracles. IACR Cryptol. ePrint Arch. 2015: 1254 (2015) - 2014
- [c5]Yohei Watanabe, Junji Shikata:
Timed-Release Secret Sharing Schemes with Information Theoretic Security. BalkanCryptSec 2014: 219-236 - [c4]Yohei Watanabe, Junji Shikata:
Timed-Release Computational Secret Sharing Scheme and Its Applications. ProvSec 2014: 326-333 - [i2]Yohei Watanabe, Junji Shikata:
Timed-Release Secret Sharing Scheme with Information Theoretic Security. CoRR abs/1401.5895 (2014) - 2013
- [c3]Asato Kubai, Junji Shikata, Yohei Watanabe:
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions. CD-ARES Workshops 2013: 16-28 - [c2]Shogo Hajime, Yohei Watanabe, Junji Shikata:
Information-Theoretically Secure Entity Authentication in the Multi-user Setting. ICISC 2013: 400-417 - 2012
- [c1]Yohei Watanabe, Takenobu Seito, Junji Shikata:
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. ICITS 2012: 167-186 - [i1]Yohei Watanabe, Takenobu Seito, Junji Shikata:
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. IACR Cryptol. ePrint Arch. 2012: 460 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-22 20:12 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint