default search action
Keisuke Hara
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 203-217 (2024) - [j16]Kyosuke Yamashita, Keisuke Hara:
On the Black-Box impossibility of multi-designated verifiers signature schemes from ring signature schemes. J. Math. Cryptol. 18(1) (2024) - [j15]Keisuke Hara:
A logarithmic-sized accountable ring signature scheme in the standard model. Theor. Comput. Sci. 997: 114516 (2024) - [c18]Takumi Matsuura, Keisuke Hara, Kyosuke Yamashita:
Designated Verifier Signature with Repudiability. APKC@AsiaCCS 2024 - [c17]Sohto Chiku, Keisuke Hara, Keitaro Hashimoto, Toi Tomita, Junji Shikata:
How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption. CANS (2) 2024: 145-165 - [c16]Ryuya Hayashi, Junichiro Hayata, Keisuke Hara, Kenta Nomura, Masaki Kamizono, Goichiro Hanaoka:
Multi-query Verifiable PIR and Its Application. CANS (2) 2024: 166-190 - [e1]Keisuke Hara, Daiki Miyahara:
Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop, APKC 2024, Singapore, July 1-5, 2024. ACM 2024 [contents] - [i7]Sohto Chiku, Keisuke Hara, Junji Shikata:
Chosen Ciphertext Security for (Hierarchical) Identity-Based Matchmaking Encryption. IACR Cryptol. ePrint Arch. 2024: 1292 (2024) - 2023
- [j14]Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Forward Secure Message Franking with Updatable Reporting Tags. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(9): 1164-1176 (2023) - [c15]Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. AFRICACRYPT 2023: 395-413 - [c14]Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe, Naoto Yanai, Junji Shikata:
Designated Verifier Signature with Claimability. APKC@AsiaCCS 2023: 21-32 - [c13]Sohto Chiku, Keisuke Hara, Junji Shikata:
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities. ISPEC 2023: 299-314 - [c12]Sohto Chiku, Keisuke Hara, Junji Shikata:
Identity-Based Matchmaking Encryption Secure Against Key Generation Center. ProvSec 2023: 251-273 - [i6]Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida:
Quantum Search-to-Decision Reduction for the LWE Problem. IACR Cryptol. ePrint Arch. 2023: 344 (2023) - [i5]Kyosuke Yamashita, Keisuke Hara:
On the Black-Box Impossibility of Multi-Designated Verifiers Signature Schemes from Ring Signature Schemes. IACR Cryptol. ePrint Arch. 2023: 1249 (2023) - [i4]Kyosuke Yamashita, Keisuke Hara:
On the Black-Box Separation Between Ring Signatures and Public Key Encryptions. IACR Cryptol. ePrint Arch. 2023: 1319 (2023) - [i3]Sohto Chiku, Keitaro Hashimoto, Keisuke Hara, Junji Shikata:
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions. IACR Cryptol. ePrint Arch. 2023: 1435 (2023) - 2022
- [j13]Yi Lu, Keisuke Hara, Keisuke Tanaka:
Multikey Verifiable Homomorphic Encryption. IEEE Access 10: 84761-84775 (2022) - [j12]Keisuke Hara, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Generic transformation from broadcast encryption to round-optimal deniable ring authentication. Des. Codes Cryptogr. 90(2): 277-316 (2022) - [j11]Keisuke Hara, Takahiro Matsuda, Keisuke Tanaka:
Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 160-172 (2022) - [j10]Keisuke Hara, Toshihiro Fukuda, Kyosuke Taguchi, Hiromi Isobe:
Surface Texturing Technique Based on Ultrasonic Turning for Improving Tribological Properties. Int. J. Autom. Technol. 16(1): 78-86 (2022) - [c11]Yi Lu, Keisuke Hara, Kazuma Ohara, Jacob C. N. Schuldt, Keisuke Tanaka:
Efficient Two-Party Exponentiation from Quotient Transfer. ACNS 2022: 643-662 - 2021
- [j9]Keisuke Hara, Keisuke Tanaka:
Ring Signature With Unconditional Anonymity in the Plain Model. IEEE Access 9: 7762-7774 (2021) - [j8]Yi Lu, Keisuke Hara, Keisuke Tanaka:
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1206-1218 (2021) - [j7]Kyohei Sudo, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Watermarkable Signature with Computational Function Preserving. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1255-1270 (2021) - [j6]Hiromi Isobe, Soutarou Tsuji, Keisuke Hara, Jun Ishimatsu:
Improvement of Removal Rate of Tape Lapping by Applying Fluid with Ultrasonic Excited Cavitation. Int. J. Autom. Technol. 15(1): 65-73 (2021) - [j5]Hiromi Isobe, Masatoshi Okuda, Keisuke Hara, Jun Ishimatsu:
Effect of Vibration Direction of Ultrasonic Vibrating Cutting Edge on Internal Stress Fluctuation of Workpiece. Int. J. Autom. Technol. 15(4): 457-465 (2021) - [j4]Keisuke Hara, Keisuke Tanaka:
Tightly secure ring signatures in the standard model. Theor. Comput. Sci. 892: 208-237 (2021) - [c10]Keisuke Hara, Takahiro Matsuda, Keisuke Tanaka:
Receiver Selective Opening Chosen Ciphertext Secure Identity-Based Encryption. APKC@AsiaCCS 2021: 51-59 - [c9]Hiroki Yamamuro, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Forward Secure Message Franking. ICISC 2021: 339-358 - 2020
- [c8]Daiki Hiraga, Keisuke Hara, Masayuki Tezuka, Yusuke Yoshida, Keisuke Tanaka:
Security Definitions on Time-Lock Puzzles. ICISC 2020: 3-15 - [c7]Kyohei Sudo, Masayuki Tezuka, Keisuke Hara, Yusuke Yoshida, Keisuke Tanaka:
Watermarkable Signature with Computational Function Preserving. ProvSec 2020: 124-144 - [c6]Yi Lu, Keisuke Hara, Keisuke Tanaka:
Receiver Selective Opening CCA Secure Public Key Encryption from Various Assumptions. ProvSec 2020: 213-233
2010 – 2019
- 2019
- [j3]Hiromi Isobe, Natsuki Sasada, Keisuke Hara, Jun Ishimatsu:
Visualization of Stress Distribution by Photoelastic Method Under Ultrasonic Grinding Condition. Int. J. Autom. Technol. 13(6): 736-742 (2019) - [j2]Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-based receiver selective opening CCA secure PKE from standard computational assumptions. Theor. Comput. Sci. 795: 570-597 (2019) - 2018
- [c5]Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-Based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. SCN 2018: 140-159 - [i2]Keisuke Hara, Fuyuki Kitagawa, Takahiro Matsuda, Goichiro Hanaoka, Keisuke Tanaka:
Simulation-based Receiver Selective Opening CCA Secure PKE from Standard Computational Assumptions. IACR Cryptol. ePrint Arch. 2018: 1091 (2018) - 2016
- [j1]Keisuke Hara, Takayuki Ito:
A Scoring Rule-based Truthful Demand Response Mechanism. Int. J. Networked Distributed Comput. 4(3): 182-192 (2016) - 2015
- [c4]Keisuke Hara, Takayuki Ito:
A scoring rule-based truthful demand response mechanism. ICIS 2015: 355-360 - [p1]Keisuke Hara, Takayuki Ito:
Effects of GA Based Mediation Protocol for Utilities that Change Over Time. Next Frontier in Agent-Based Complex Automated Negotiation 2015: 73-87 - 2013
- [c3]Keisuke Hara, Takayuki Ito:
A Mediation Mechanism for Automated Negotiating Agents Whose Utility Changes over Time. AAAI 2013: 1613-1614 - [c2]Keisuke Hara, Mikoto Okumura, Takayuki Ito:
A Mediator-Based Agent Negotiation Protocol for Utilities That Change with Time. IEA/AIE 2013: 12-21 - [c1]Shantanu Chakraborty, Takayuki Ito, Keisuke Hara:
Incentive based smart pricing scheme using scoring rule. ISGT Europe 2013: 1-5 - [i1]Keisuke Hara, Tomihisa Kamada:
A two-step model and the algorithm for recalling in recommender systems. CoRR abs/1310.6110 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:26 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint