Author of the publication

An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 404-416 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Ohata, Satsuya
add a person with the name Ohata, Satsuya
 

Other publications of authors with the same name

Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application., and . Financial Cryptography, volume 12059 of Lecture Notes in Computer Science, page 369-385. Springer, (2020)More Constructions of Re-splittable Threshold Public Key Encryption., , , and . IWSEC, volume 8639 of Lecture Notes in Computer Science, page 109-118. Springer, (2014)More Constructions of Re-Splittable Threshold Public Key Encryption., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (9): 1473-1483 (2018)Constant-Round Client-Aided Secure Comparison Protocol., , , , , and . ESORICS (2), volume 11099 of Lecture Notes in Computer Science, page 395-415. Springer, (2018)Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests., , , , , , , and . ISITA, page 530-534. IEEE, (2018)Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol., , and . ISITA, page 535-539. IEEE, (2018)Recent Advances in Practical Secure Multi-Party Computation.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (10): 1134-1141 (2020)An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 404-416 (2022)Proxy re-encryption via indistinguishability obfuscation., and . Secur. Commun. Networks, 9 (12): 1786-1795 (2016)Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption., , , , and . CT-RSA, volume 9048 of Lecture Notes in Computer Science, page 410-428. Springer, (2015)