Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yutaka Kawai is active.

Publication


Featured researches published by Yutaka Kawai.


the cryptographers track at the rsa conference | 2012

Generic construction of chosen ciphertext secure proxy re-encryption

Goichiro Hanaoka; Yutaka Kawai; Noboru Kunihiro; Takahiro Matsuda; Jian Weng; Rui Zhang; Yunlei Zhao

In this paper, we present the first generic construction of a chosen-ciphertext (CCA) secure uni-directional proxy re-encryption (PRE) scheme. In particular, full CCA security (i.e., not relaxed CCA security such as replayable CCA security) of our proposed scheme is proven even against powerful adversaries that are given a more advantageous attack environment than in all previous works, and furthermore, random oracles are not required. To achieve such strong security, we establish a totally novel methodology for designing PRE based on a specific class of threshold encryption. Via our generic construction, we present the first construction that is CCA secure in the standard model.


international conference on pairing based cryptography | 2012

Group signatures with message-dependent opening

Yusuke Sakai; Keita Emura; Goichiro Hanaoka; Yutaka Kawai; Takahiro Matsuda; Kazumasa Omote

This paper introduces a new capability of the group signature, called message-dependent opening. It is intended to weaken the higher trust put on an opener, that is, no anonymity against an opener is provided by ordinary group signature. In a group signature system with message-dependent opening (GS-MDO), in addition to the opener, we set up the admitter which is not able to open any users identity but admits the opener to open signatures by specifying messages whose signatures should be opened. For any signature whose corresponding message is not specified by the admitter, the opener cannot extract the signers identity from it. In this paper, we present formal definitions and constructions of GS-MDO. Furthermore, we also show that GS-MDO implies identity-based encryption, and thus for designing a GS-MDO scheme, identity-based encryption is crucial. Actually, we propose a generic construction of GS-MDO from identity-based encryption and adaptive NIZK proofs, and its specific instantiation from the Groth-Sahai proof system by constructing a new (k-resilient) identity-based encryption scheme which is compatible to the Groth-Sahai proof.


information security practice and experience | 2009

Secret Handshake: Strong Anonymity Definition and Construction

Yutaka Kawai; Kazuki Yoneyama

Secret handshake allows two members in the same group to authenticate each other secretly. In previous works of secret handshake schemes, two types of anonymities against the group authority (GA) of a group G are discussed: 1)Even GA cannot identify members, namely nobody can identify them (No-Traceability), 2)Only GA can identify members (Traceability). In this paper, first the necessity of tracing of the identification is shown. Second, we classify abilities of GA into the ability of identifying players and that of issuing the certificate to members. We introduce two anonymities Co-Traceability and Strong Detector Resistance . When a more strict anonymity is required ever for GA, the case 2) is unfavorable for members. Then, we introduce Co-Traceability where even if


international conference on pairing based cryptography | 2013

Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting

Yutaka Kawai; Katsuyuki Takashima

{\cal A}


the cryptographers’ track at the rsa conference | 2015

Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption

Satsuya Ohata; Yutaka Kawai; Takahiro Matsuda; Goichiro Hanaoka; Kanta Matsuura

has GAs ability of identifying members or issuing the certificate,


international workshop on security | 2016

Simple, Secure, and Efficient Searchable Symmetric Encryption with Multiple Encrypted Indexes

Takato Hirano; Mitsuhiro Hattori; Yutaka Kawai; Nori Matsuda; Mitsugu Iwamoto; Yusuke Sakai; Tatsuji Munaka

{\cal A}


international workshop on security | 2011

Towards restricting plaintext space in public key encryption

Yusuke Sakai; Keita Emura; Goichiro Hanaoka; Yutaka Kawai; Kazumasa Omote

cannot trace members identification. However, if a scheme satisfies Co-Traceability, GA may be able to judge whether handshake players belong to the own group. Then, we introduce Strong Detector Resistance where even if an adversary


cryptology and network security | 2016

Probabilistic Generation of Trapdoors: Reducing Information Leakage of Searchable Symmetric Encryption

Kenichiro Hayasaka; Yutaka Kawai; Yoshihiro Koseki; Takato Hirano; Mitsugu Iwamoto

{\cal A}


european public key infrastructure workshop | 2011

Secret handshake scheme with request-based-revealing

Yutaka Kawai; Noboru Kunihiro

has GAs ability of identifying members,


provable security | 2018

Formal Treatment of Verifiable Privacy-Preserving Data-Aggregation Protocols

Satoshi Yasuda; Yoshihiro Koseki; Yusuke Sakai; Fuyuki Kitagawa; Yutaka Kawai; Goichiro Hanaoka

{\cal A}

Collaboration


Dive into the Yutaka Kawai's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Goichiro Hanaoka

National Institute of Advanced Industrial Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kazuki Yoneyama

University of Electro-Communications

View shared research outputs
Top Co-Authors

Avatar

Kazumasa Omote

Japan Advanced Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Keita Emura

National Institute of Information and Communications Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge