Zobrazeno 1 - 10
of 80
pro vyhledávání: '"Nuttapong Attrapadung"'
Autor:
Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka
Publikováno v:
IEEE Access, Vol 7, Pp 139021-139034 (2019)
A privacy-preserving framework in which a computational resource provider receives encrypted data from a client and returns prediction results without decrypting the data, i.e., oblivious neural network or encrypted prediction, has been studied in ma
Externí odkaz:
https://doaj.org/article/0b6f5f7b90144a00be9f62d9ecbb6ace
Publikováno v:
Designs, Codes and Cryptography. 91:1645-1684
In this paper, we construct multi-key homomorphic and fully homomorphic encryption (resp. MKHE and MKFHE) schemes with malicious circuit privacy. Our schemes are based on learning with errors (LWE) besides appropriate circular security assumptions. I
Publikováno v:
Asymmetric Cryptography. :1-45
Autor:
Tadanori Teruya, Takahiro Matsuda, Goichiro Hanaoka, Oba Tatsumi, Nuttapong Attrapadung, Naohisa Nishida, Yuji Unagami, Jason Paul Cruz, Naoto Yanai
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :1367-1380
Publikováno v:
Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security.
In this paper, we propose memory- and round-efficient protocols for securely evaluating arithmetic primitives. We focus on secure two-party computation over the ring ℤ2k that achieves security against semi-honest adversaries and works in the pre-pr
Autor:
Tadanori Teruya, Nuttapong Attrapadung, Koji Nuida, Goichiro Hanaoka, Satsuya Ohata, Hiraku Morita
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. :21-32
Publikováno v:
Applied Cryptography and Network Security ISBN: 9783031092336
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::fec697b284aec059d11d0f47b20bec27
https://doi.org/10.1007/978-3-031-09234-3_30
https://doi.org/10.1007/978-3-031-09234-3_30
Autor:
Hiraku Morita, Goichiro Hanaoaka, Nuttapong Attrapadung, Kazunari Tozawa, Takahiro Matsuda, Tadanori Teruya, Kazuma Ohara, Jacob C. N. Schuldt
Publikováno v:
CCS
In this paper we propose efficient two-party protocols for obliviously applying a (possibly random) linear group action to a data set. Our protocols capture various applications such as oblivious shuffles, circular shifts, matrix multiplications, to
Autor:
Jacob C. N. Schuldt, Goichiro Hanaoka, Shinsaku Kiyomoto, Nuttapong Attrapadung, Tomoaki Mimoto
Publikováno v:
PST
Secure two-party comparison plays a crucial role in many privacy-preserving applications, such as privacy-preserving data mining and machine learning. In particular, the available comparison protocols with the appropriate input/output configuration h
Autor:
Yutaka Kawai, Jacob C. N. Schuldt, Goichiro Hanaoka, Nuttapong Attrapadung, Takato Hirano, Koseki Yoshihiro
Publikováno v:
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.