Obserwuj
Kazuma Ohara
Tytuł
Cytowane przez
Cytowane przez
Rok
High-throughput semi-honest secure three-party computation with an honest majority
T Araki, J Furukawa, Y Lindell, A Nof, K Ohara
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
3342016
Optimized honest-majority MPC for malicious adversaries—breaking the 1 billion-gate per second barrier
T Araki, A Barak, J Furukawa, T Lichter, Y Lindell, A Nof, K Ohara, ...
2017 IEEE Symposium on Security and Privacy (SP), 843-862, 2017
1392017
Generalizing the SPDZ compiler for other protocols
T Araki, A Barak, J Furukawa, M Keller, Y Lindell, K Ohara, H Tsuchida
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
452018
Privacy-preserving smart metering with verifiability for both billing and energy management
K Ohara, Y Sakai, F Yoshida, M Iwamoto, K Ohta
Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 23-32, 2014
292014
A group signature scheme with unbounded message-dependent opening
K Ohara, Y Sakai, K Emura, G Hanaoka
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
212013
Shortening the libert-peters-yung revocable group signature scheme by using the random oracle methodology
K Ohara, K Emura, G Hanaoka, A Ishida, K Ohta, Y Sakai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019
172019
Secure graph analysis at scale
T Araki, J Furukawa, K Ohara, B Pinkas, H Rosemarin, H Tsuchida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
162021
High-throughput secure three-party computation of kerberos ticket generation
T Araki, A Barak, J Furukawa, Y Lindell, A Nof, K Ohara
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
112016
How to choose suitable secure multiparty computation using generalized SPDZ
T Araki, A Barak, J Furukawa, M Keller, K Ohara, H Tsuchida
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
72018
Information processing apparatus, authentication method, and recording medium for recording computer program
Y Tanaka, J Furukawa, K Ohara, T Araki
US Patent 11,050,745, 2021
62021
Secure computation system, secure computation method, secure computation apparatus, distribution information generation apparatus, and methods and programs therefor
T Araki, J Furukawa, K Ohara, H Haruna
US Patent 11,042,358, 2021
62021
Group signatures with message-dependent opening: Formal definitions and constructions
K Emura, G Hanaoka, Y Kawai, T Matsuda, K Ohara, K Omote, Y Sakai
Security and communication networks 2019, 2019
62019
Multi-party computation for modular exponentiation based on replicated secret sharing
K Ohara, Y Watanabe, M Iwamoto, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019
32019
Constant rounds almost linear complexity multi-party computation for prefix sum
K Ohara, K Ohta, K Suzuki, K Yoneyama
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
32014
How to make a secure index for searchable symmetric encryption, revisited
Y Watanabe, T Nakai, K Ohara, T Nojima, Y Liu, M Iwamoto, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022
22022
Efficient Dynamic Searchable Encryption with Forward Privacy under the Decent Leakage
Y Watanabe, K Ohara, M Iwamoto, K Ohta
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
22022
Oblivious Linear Group Actions and Applications
N Attrapadung, G Hanaoaka, T Matsuda, H Morita, K Ohara, JCN Schuldt, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
22021
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions
R Eriguchi, K Ohara, S Yamada, K Nuida
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
22021
Semantic definition of anonymity in identity-based encryption and its relation to indistinguishability-based definition
G Hanaoka, M Komatsu, K Ohara, Y Sakai, S Yamada
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
22020
Efficient Two-Party Exponentiation from Quotient Transfer
Y Lu, K Hara, K Ohara, J Schuldt, K Tanaka
Applied Cryptography and Network Security: 20th International Conference …, 2022
12022
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20