Author of the publication

Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR.

, , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 106 (3): 263-271 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA., and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 412-425. Springer, (2007)Generic hardness of inversion on ring and its relation to self-bilinear map., , , and . Theor. Comput. Sci., (2020)d-Multiplicative Secret Sharing for Multipartite Adversary Structures., and . ITC, volume 163 of LIPIcs, page 2:1-2:16. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function., , , and . AFRICACRYPT, volume 5023 of Lecture Notes in Computer Science, page 290-307. Springer, (2008)Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes., , and . ISIT, page 3047-3051. IEEE, (2019)Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption., , , and . Public Key Cryptography, volume 6571 of Lecture Notes in Computer Science, page 71-89. Springer, (2011)How to Generalize RSA Cryptanalyses., and . Public Key Cryptography (2), volume 9615 of Lecture Notes in Computer Science, page 67-97. Springer, (2016)Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More., , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 260-277. Springer, (2012)Small Secret Key Attack on a Variant of RSA (Due to Takagi)., , and . CT-RSA, volume 4964 of Lecture Notes in Computer Science, page 387-406. Springer, (2008)A Deterministic Algorithm for Computing Divisors in an Interval., , , , and . ACISP, volume 10946 of Lecture Notes in Computer Science, page 3-12. Springer, (2018)