Zobrazeno 1 - 10
of 100
pro vyhledávání: '"Kazuma Ohara"'
Autor:
Yohei WATANABE, Takeshi NAKAI, Kazuma OHARA, Takuya NOJIMA, Yexuan LIU, Mitsugu IWAMOTO, Kazuo OHTA
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1559-1577
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.
In this paper, we propose memory- and round-efficient protocols for securely evaluating arithmetic primitives. We focus on secure two-party computation over the ring ℤ2k that achieves security against semi-honest adversaries and works in the pre-pr
Publikováno v:
Proceedings of the Twelfth ACM Conference on Data and Application Security and Privacy.
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b9ee5322705863e79501b49c2e79c18
https://doi.org/10.1007/978-3-031-09234-3_32
https://doi.org/10.1007/978-3-031-09234-3_32
Autor:
Hiraku Morita, Goichiro Hanaoaka, Nuttapong Attrapadung, Kazunari Tozawa, Takahiro Matsuda, Tadanori Teruya, Kazuma Ohara, Jacob C. N. Schuldt
Publikováno v:
CCS
In this paper we propose efficient two-party protocols for obliviously applying a (possibly random) linear group action to a data set. Our protocols capture various applications such as oblivious shuffles, circular shifts, matrix multiplications, to
Publikováno v:
CCS
We present a highly-scalable secure computation of graph algorithms, which hides all information about the topology of the graph or other input values associated with nodes or edges. The setting is where all nodes and edges of the graph are secret-sh
Autor:
Kenji Kai, Kei Kawai, Kazuma Ohara, Yuki Minamoto, Yoshitaka Jin, Teruya Maki, Jun Noda, Tatsuo Shiina, Davaanyam, Enkhbaatar
Publikováno v:
SOLA; 2023, Vol. 19, p269-273, 5p
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. (9):1079-1090
In recent years, multi-party computation (MPC) frameworks based on replicated secret sharing schemes (RSSS) have attracted the attention as a method to achieve high efficiency among known MPCs. However, the RSSS-based MPCs are still inefficient for s
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1101-1117
Autor:
Takahiro Matsuda, Yusuke Sakai, Kazuma Ohara, Kazumasa Omote, Keita Emura, Yutaka Kawai, Goichiro Hanaoka
Publikováno v:
Security and Communication Networks, Vol 2019 (2019)
This paper introduces a new capability for group signatures called message-dependent opening. It is intended to weaken the high trust placed on the opener; i.e., no anonymity against the opener is provided by an ordinary group signature scheme. In a