From post

An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks.

, , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 404-416 (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

No persons found for author name Ohata, Satsuya
add a person with the name Ohata, Satsuya
 

Другие публикации лиц с тем же именем

Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application., и . Financial Cryptography, том 12059 из Lecture Notes in Computer Science, стр. 369-385. Springer, (2020)More Constructions of Re-splittable Threshold Public Key Encryption., , , и . IWSEC, том 8639 из Lecture Notes in Computer Science, стр. 109-118. Springer, (2014)More Constructions of Re-Splittable Threshold Public Key Encryption., , , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A (9): 1473-1483 (2018)Constant-Round Client-Aided Secure Comparison Protocol., , , , , и . ESORICS (2), том 11099 из Lecture Notes in Computer Science, стр. 395-415. Springer, (2018)Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests., , , , , , , и . ISITA, стр. 530-534. IEEE, (2018)Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol., , и . ISITA, стр. 535-539. IEEE, (2018)Proxy re-encryption via indistinguishability obfuscation., и . Secur. Commun. Networks, 9 (12): 1786-1795 (2016)An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks., , и . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 105-A (3): 404-416 (2022)Recent Advances in Practical Secure Multi-Party Computation.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 103-A (10): 1134-1141 (2020)Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption., , , , и . CT-RSA, том 9048 из Lecture Notes in Computer Science, стр. 410-428. Springer, (2015)