Author of the publication

Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.

, , , , , and . Financial Cryptography Workshops, volume 7862 of Lecture Notes in Computer Science, page 201-212. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA., , , , , , , and . IACR Cryptology ePrint Archive, (2020)Improvement of the Low Rank Attack.. ISITA, page 441-445. IEEE, (2010)Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-., and . IACR Cryptology ePrint Archive, (2010)Secure problems solving scheme., , and . ICSC, page 284-289. IEEE Computer Society, (2015)Proposal of a Signature Scheme Based on STS Trapdoor., , , and . PQCrypto, volume 6061 of Lecture Notes in Computer Science, page 201-217. Springer, (2010)Hidden Pair of Bijection Signature Scheme., and . IACR Cryptology ePrint Archive, (2011)Scheme overcoming incompatibility of privacy and utilization of personal data., , , , , , , and . ISITA, page 727-730. IEEE, (2012)Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (10): 2438-2446 (2009)Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (6): 1078-1085 (2010)Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization., , , and . IACR Cryptology ePrint Archive, (2012)