Keita Emura

J-GLOBAL         Last updated: Nov 14, 2018 at 11:00
 

Academic & Professional Experience

 
Oct 2014
 - 
Today
Senior Researcher, National Institute of Information and Communications Technology
 
Apr 2012
 - 
Sep 2014
Researcher, National Institute of Information and Communications Technology
 
Apr 2004
 - 
Sep 2006
Fujitsu Hokuriku Systems Limited
 

Awards & Honors

 
Aug 2017
Implementation Results of Privacy-Preserving and Public Verifiable Data Aggregation Protocols, Best Poster Awards, IWSEC 2017
Winner: Tatsuya Suzuki, Keita Emura, Hayato Kimura and Toshihiro Ohigashi
 
Sep 2016
Best Paper Award, CSEC
Winner: Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma
 
Aug 2015
Disavowability on Public Key Encryption with Non-interactive Opening, Best Poster Awards, IWSEC 2015
Winner: Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
 
Jun 2014
Performance Evaluation of a Privacy-Enhanced Access Log Management Mechanism, Best Poster Awards, ASIACCS 2014
Winner: Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai
 
Jan 2012
Innovation Paper Award, ISEC
Winner: Keita Emura, Goichiro Hanaoka, Takahiro Matsuda, Go Ohtake, Shota Yamada
 

Published Papers

 
Tatsuya Suzuki, Keita Emura, Toshihiro Ohigashi
Information Security Practice and Experience - 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings   69-86   2018   [Refereed]
Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
IEICE Transactions   101-A(9) 1456-1472   2018   [Refereed]
Keita Emura, Takuya Hayashi
Information Security - 21st International Conference, ISC 2018, Guildford, UK, September 9-12, 2018, Proceedings   442-460   2018   [Refereed]
Ai Ishida, Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
Security and Cryptography for Networks - 11th International Conference, SCN 2018, Amalfi, Italy, September 5-7, 2018, Proceedings   23-42   2018   [Refereed]
Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada
Des. Codes Cryptography   86(8) 1623-1683   2018   [Refereed]
Keita Emura, Takuya Hayashi
IEEE Trans. Vehicular Technology   67(2) 1582-1597   2018   [Refereed]
Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama
Int. J. Inf. Sec.   17(2) 193-220   2018   [Refereed]
Sanami Nakagawa,Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka,Yusuke Sakai, Akihisa Kodate
IJACT   3(4) 394-406   2017   [Refereed]
Hiromi Arai, Keita Emura, Takuya Hayashi
Proceedings of the 2017 on Workshop on Privacy in the Electronic Society, Dallas, TX, USA, October 30 - November 3, 2017   111-122   2017   [Refereed]
Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
J. Inf. Sec. Appl.   34 84-91   2017   [Refereed]
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
IEICE Transactions   100-A(9) 1825-1837   2017   [Refereed]
Kotoko Yamada, Nuttapong Attrapadung, Keita Emura, Goichiro Hanaoka, Keisuke Tanaka
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part II   532-551   2017   [Refereed]
Keita Emura
Network and System Security - 11th International Conference, NSS 2017, Helsinki, Finland, August 21-23, 2017, Proceedings   3-18   2017   [Refereed]
Keita Emura
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II   193-213   2017   [Refereed]
Keita Emura, Takuya Hayashi, Ai Ishida
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017   777-788   2017   [Refereed]
Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017   215-229   2017   [Refereed]
Yohei Watanabe,Keita Emura, Jae Hong Seo
Topics in Cryptology - CT-RSA 2017 - The Cryptographers' Track at the RSA Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings   432-449   2017   [Refereed]
Keita Emura,Takuya Hayashi,Shiho Moriai
2016 International Symposium on Information Theory and Its Applications, ISITA 2016, Monterey, CA, USA, October 30 - November 2, 2016   403-407   2016   [Refereed]
Ai Ishida, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Keisuke Tanaka
Cryptology and Network Security - 15th International Conference, CANS 2016, Milan, Italy, November 14-16, 2016, Proceedings   228-244   2016   [Refereed]
Keita Emura, Akira Kanaoka, Satoshi Ohta, Kazumasa Omote, Takeshi Takahashi
IEEE Trans. Emerging Topics Comput.   4(1) 88-101   2016   [Refereed]
Yusuke Sakai,Keita Emura,Jacob C. N. Schuldt,Goichiro Hanaoka,Kazuo Ohta
Theor. Comput. Sci.   630 95-116   2016   [Refereed]
Jae Hong Seo,Keita Emura
Theor. Comput. Sci.   615 45-60   2016   [Refereed]
Kohei Kasamatsu,Takahiro Matsuda,Keita Emura,Nuttapong Attrapadung,Goichiro Hanaoka,Hideki Imai
Int. J. Inf. Sec.   15(5) 549-571   2016   [Refereed]
Keita Emura, Jae Hong Seo, Taek-Young Youn
IEICE Transactions   99-A(1) 83-91   2016   [Refereed]
Keita Emura, Le Trieu Phong, Yohei Watanabe
2015 IEEE TrustCom, Helsinki, Finland, August 20-22, 2015, Volume 1   167-174   2015   [Refereed]
Keita Emura,Takuya Hayashi
Lightweight Cryptography for Security and Privacy - 4th International Workshop, LightSec 2015, Bochum, Germany, September 10-11, 2015, Revised Selected Papers   37-57   2015   [Refereed]
Jae Hong Seo,Keita Emura
Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Nara, Japan, August 26-28, 2015, Proceedings   21-38   2015   [Refereed]
Jae Hong Seo, Keita Emura
Topics in Cryptology - CT-RSA 2015, The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings   106-123   2015   [Refereed]
Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
39th Annual Computer Software and Applications Conference, COMPSAC Workshops 2015, Taichung, Taiwan, July 1-5, 2015   680-681   2015   [Refereed]
Ai Ishida,Keita Emura,Goichiro Hanaoka,Yusuke Sakai,Keisuke Tanaka
Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '15, Singapore, April 14-17, 2015   667   2015   [Refereed]
Jae Hong Seo,Keita Emura,Keita Xagawa,Kazuki Yoneyama
Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers   192-214   2015   [Refereed]
Yusuke Sakai,Keita Emura,Jacob C. N. Schuldt,Goichiro Hanaoka,Kazuo Ohta
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings   77-92   2015   [Refereed]
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman, Kazumasa Omote
Security and Communication Networks   8(8) 1547-1560   2015   [Refereed]
Jiageng Chen,Keita Emura,Atsuko Miyaji
J. Mathematical Cryptology   9(2) 63-74   2015   [Refereed]
Ai Ishida,Keita Emura,Goichiro Hanaoka,Yusuke Sakai,Keisuke Tanaka
IEICE Transactions   98-A(12) 2446-2455   2015   [Refereed]
Nuttapong Attrapadung,Keita Emura,Goichiro Hanaoka,Yusuke Sakai
Comput. J.   58(10) 2698-2715   2015   [Refereed]
Dan Bogdanov,Keita Emura,Roman Jagomägis,Akira Kanaoka,Shin'ichiro Matsuo,Jan Willemson
Information Security Theory and Practice. Securing the Internet of Things - 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings   108-123   2014   [Refereed]
Sanami Nakagawa,Keita Emura,Goichiro Hanaoka,Akihisa Kodate,Takashi Nishide,Eiji Okamoto,Yusuke Sakai
13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2014, Beijing, China, September 24-26, 2014   565-574   2014   [Refereed]
Keita Emura, Akira Kanaoka, Satoshi Ohta, Takeshi Takahashi
Symposium on Applied Computing, SAC 2014, Gyeongju, Republic of Korea - March 24 - 28, 2014   1641-1648   2014   [Refereed]
Hiromi Arai,Keita Emura,Takahiro Matsuda
Cryptography and Information Security in the Balkans - First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers   141-160   2014   [Refereed]
Nuttapong Attrapadung,Keita Emura,Goichiro Hanaoka,Yusuke Sakai
Applied Cryptography and Network Security - 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings   419-437   2014   [Refereed]
Jae Hong Seo,Keita Emura
IEEE Trans. Information Forensics and Security   9(7) 1193-1205   2014   [Refereed]
Jae Hong Seo, Keita Emura
Theor. Comput. Sci.   542 44-62   2014   [Refereed]
Keita Emura,Atsuko Miyaji,Kazumasa Omote
J. Applied Mathematics   2014 983040:1-983040:14   2014   [Refereed]
Keita Emura,Goichiro Hanaoka,Yusuke Sakai,Jacob C. N. Schuldt
Int. J. Inf. Sec.   13(1) 51-62   2014   [Refereed]
Jae Hong Seo, Keita Emura
IEICE Transactions   97-A(8) 1806-1809   2014   [Refereed]
Keita Emura,Atsuko Miyaji,Mohammad Shahriar Rahman
12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 / 11th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA-13 / 12th IEEE International Conference on   431-438   2013   [Refereed]
Jae Hong Seo,Keita Emura
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings   216-234   2013   [Refereed]
Keita Emura,Goichiro Hanaoka,Go Ohtake,Takahiro Matsuda,Shota Yamada
Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings   32-50   2013   [Refereed]
Jae Hong Seo, Keita Emura
Topics in Cryptology - CT-RSA 2013 - The Cryptographers' Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings   343-358   2013   [Refereed]
Rahena Akhter,Rownak Jahan Chowdhury,Keita Emura,Tamzida Islam,Mohammad Shahriar Rahman,Nusrat Rubaiyat
IEEE 37th Annual Computer Software and Applications Conference, COMPSAC Workshops 2013, Kyoto, Japan, July 22-26, 2013   121-126   2013   [Refereed]
Kazuma Ohara,Yusuke Sakai,Keita Emura,Goichiro Hanaoka
8th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '13, Hangzhou, China - May 08 - 10, 2013   517-522   2013   [Refereed]
Takeshi Takahashi, Keita Emura, Akira Kanaoka, Shin'ichiro Matsuo, Tadashi Minowa
Proceedings of the first international workshop on Security in embedded systems and smartphones, SESP 2013, Hangzhou, China, May 8, 2013   3-10   2013   [Refereed]
Jae Hong Seo,Keita Emura
IEICE Transactions   96-A(11) 2286-2289   2013   [Refereed]
Jae Hong Seo,Keita Emura
IEICE Transactions   96-A(11) 2282-2285   2013   [Refereed]
Yusuke Sakai,Keita Emura,Goichiro Hanaoka,Yutaka Kawai,Kazumasa Omote
IEICE Transactions   96-A(6) 1156-1168   2013   [Refereed]
Keita Emura,Takashi Sato
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications   353-357   2012   [Refereed]
Keita Emura, Mohammad Shahriar Rahman
SECRYPT 2012 - Proceedings of the International Conference on Security and Cryptography, Rome, Italy, 24-27 July, 2012, SECRYPT is part of ICETE - The International Joint Conference on e-Business and Telecommunications   84-93   2012   [Refereed]
Kohei Kasamatsu,Takahiro Matsuda,Keita Emura,Nuttapong Attrapadung,Goichiro Hanaoka,Hideki Imai
Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings   184-204   2012   [Refereed]
Yusuke Sakai,Jacob C. N. Schuldt,Keita Emura,Goichiro Hanaoka,Kazuo Ohta
Public Key Cryptography - PKC 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings   715-732   2012   [Refereed]
Yusuke Sakai, Keita Emura, Goichiro Hanaoka,Yutaka Kawai, Takahiro Matsuda, Kazumasa Omote
Pairing-Based Cryptography - Pairing 2012 - 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers   270-294   2012   [Refereed]
Tatsuro Iida, Keita Emura, Atsuko Miyaji, Kazumasa Omote
26th International Conference on Advanced Information Networking and Applications Workshops, WAINA 2012, Fukuoka, Japan, March 26-29, 2012   552-557   2012   [Refereed]
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
IJACT   2(3) 199-211   2012   [Refereed]
Yusuke Sakai, Keita Emura, Goichiro Hanaoka, Yutaka Kawai, Kazumasa Omote
Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings   193-209   2011   [Refereed]
Keita Emura, Atsuko Miyaji, Kazumasa Omote
Information Security, 14th International Conference, ISC 2011, Xi'an, China, October 26-29, 2011. Proceedings   102-118   2011   [Refereed]
Keita Emura, Atsuko Miyaji, Kazumasa Omote
Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers   186-203   2011   [Refereed]
Keita Emura, Atsuko Miyaji, Akito Nomura, Mohammad Shahriar Rahman, Masakazu Soshi
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings   143-157   2011   [Refereed]
Jiageng Chen, Keita Emura, Atsuko Miyaji
Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings   57-68   2011   [Refereed]
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings   439-443   2011   [Refereed]
Keita Emura, Atsuko Miyaji, Kazumasa Omote
IEICE Transactions   94-A(8) 1682-1695   2011   [Refereed]
Keita Emura,Atsuko Miyaji,Kazumasa Omote
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings   200-213   2010   [Refereed]
Keita Emura,Atsuko Miyaji,Kazumasa Omote
Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings   184-198   2010   [Refereed]
Keita Emura, Goichiro Hanaoka, Yusuke Sakai
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings   181-198   2010   [Refereed]
Keita Emura, Atsuko Miyaji, Kazumasa Omote
Public Key Infrastructures, Services and Applications - 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers   77-92   2010   [Refereed]
Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman
Advanced Data Mining and Applications - 6th International Conference, ADMA 2010, Chongqing, China, November 19-21, 2010, Proceedings, Part I   370-382   2010   [Refereed]

Misc

 
Kazuma Ohara,Keita Emura,Goichiro Hanaoka,Ai Ishida,Kazuo Ohta,Yusuke Sakai
IACR Cryptology ePrint Archive   2016 477   2016
Keita Emura,Takuya Hayashi
IACR Cryptology ePrint Archive   2014 926   2014