Wakaha Ogata
Orcid: 0000-0002-4671-4485
According to our database1,
Wakaha Ogata
authored at least 78 papers
between 1990 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext.
Des. Codes Cryptogr., February, 2024
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
2022
Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
2020
Int. J. Inf. Sec., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks.
Proceedings of the Intelligent Human Systems Integration 2020, 2020
2019
Secur. Commun. Networks, 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions.
IACR Cryptol. ePrint Arch., 2019
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption.
IACR Cryptol. ePrint Arch., 2019
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions.
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019
2017
IET Inf. Secur., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the Financial Cryptography and Data Security, 2017
2016
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Advances in Information and Computer Security, 2015
2014
Cheating detectable threshold scheme against most powerful cheaters for long secrets.
Des. Codes Cryptogr., 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Advances in Information and Computer Security, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
2010
Privacy-preserving similarity evaluation and application to remote biometrics authentication.
Soft Comput., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Provable Security - 4th International Conference, 2010
2009
New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Advances in Information and Computer Security, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Security and Cryptography for Networks, 6th International Conference, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol.
Proceedings of the The Second International Conference on Availability, 2007
2006
IEEE Trans. Inf. Theory, 2006
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
New combinatorial designs and their applications to authentication codes and secret sharing schemes.
Discret. Math., 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Public Key Cryptography, 2001
2000
1999
1998
J. Univers. Comput. Sci., 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the Advances in Cryptology, 1995
1993
Proceedings of the Advances in Cryptology, 1993
1992
1991
1990
Proceedings of the Advances in Cryptology, 1990