Learn More
In the public key cryptosystems, revocation functionality is required when a secret key is corrupted by hacking or the period of a contract expires. In the public key infrastructure setting, numerous solutions have been proposed, and in the Identity Based Encryption (IBE) setting, a recent series of papers proposed revocable IBE schemes. Delegation of key(More)
Efficient and privacy-preserving constructions for search functionality on encrypted data is important issues for data outsourcing, and data retrieval, etc. Fully secure anonymous Hierarchical ID-Based Encryption (HIBE) schemes is useful primitives that can be applicable to searchable encryptions [4], such as ID-based searchable encryption, temporary(More)
In ACM CCS 2008, Boldyreva et al. proposed an elegant way of achieving an Identity-based Encryp-tion (IBE) with efficient revocation, which we call revocable IBE (RIBE). One of the significant benefit of their construction is scalability, where the overhead of the trusted authority is logarithmically increased in the number of users, whereas that in the(More)
At Eurocrypt 2010, Freeman proposed a transformation from pairing-based schemes in composite-order bilinear groups to equivalent ones in prime-order bilinear groups. His transformation can be applied to pairing-based cryptosystems exploiting only one of two properties of composite-order bilinear groups: cancelling and projecting. At Asiacrypt 2010,(More)
Projecting bilinear pairings have frequently been used for designing cryptosystems since they were first derived from composite order bilinear groups. There have been only a few studies on the (im)possibility of projecting bilinear pairings. Groth and Sahai showed that projecting bilinear pairings can be achieved in the prime-order group setting. They(More)
Early intervention and maintenance treatment for schizophrenia patients may prolong the duration of exposure to antipsychotic agents; however, there have been few studies on the neurotoxicity of these agents. Here, we investigated the effects of antipsychotics on cell viability and autophagy in rat primary neurons. Cultured cortical neurons obtained from(More)
We put forward new techniques for designing signature schemes. As a result, we present practical signature schemes based on the CDH, the RSA, and the SIS assumptions. Our schemes compare favorably with existing schemes based on these assumptions. Our core idea is the use of tag-based signatures. Concretely, each signatures contains a tag which is uniformly(More)
Riluzole is used clinically in patients with amyotrophic lateral sclerosis. As oxidative stress, in addition to excitotoxicity, may be a major mechanism of motoneuron degeneration in patients with amyotrophic lateral sclerosis, we examined whether riluzole protects against nonexcitotoxic oxidative injury. Probably reflecting its weak antiexcitotoxic(More)
Secure computation of the set intersection functionality allows n parties to find the intersection between their datasets without revealing anything else about them. An efficient protocol for such task could have multiple potential applications, in commerce, health-care, and security. However, all currently known secure set intersection protocols for n > 2(More)