Satsuya Ohata

According to our database1, Satsuya Ohata authored at least 18 papers between 2015 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Efficient privacy-preserving variable-length substring match for genome sequence.
Algorithms Mol. Biol., 2022

2021
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021

2020
Recent Advances in Practical Secure Multi-Party Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Simple Black-Box Adversarial Examples Generation with Very Few Queries.
IEICE Trans. Inf. Syst., 2020

Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts.
IACR Cryptol. ePrint Arch., 2019

Towards High-Throughput Secure MPC over the Internet: Communication-Efficient Two-Party Protocols and Its Application.
CoRR, 2019

2018
More Constructions of Re-Splittable Threshold Public Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Provably Secure Password Reset Protocol: Model, Definition, and Construction.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Tree-based Secure Comparison of Secret Shared Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Constant-Round Client-Aided Secure Comparison Protocol.
Proceedings of the Computer Security, 2018

2016
Proxy re-encryption via indistinguishability obfuscation.
Secur. Commun. Networks, 2016

Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction.
IACR Cryptol. ePrint Arch., 2016

2015
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch., 2015


  Loading...