Author of the publication

Efficient Usage of Cover Free Families in Broadcast Encryption.

, and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (6): 1216-1221 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Uniform Secret Sharing., , and . IEEE Trans. Inf. Theory, 65 (1): 436-443 (2019)Efficient Usage of Cover Free Families in Broadcast Encryption., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (6): 1216-1221 (2016)A Private and Consistent Data Retrieval Scheme with Log-Squared Communication., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (1): 204-215 (2007)A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (1): 216-225 (2007)Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017., and . IACR Cryptology ePrint Archive, (2018)Virtual Wiretap Channel Based on Wireless Two-way Interferometry., , , , and . GLOBECOM, page 6188-6193. IEEE, (2022)Verifiably Multiplicative Secret Sharing., and . IEEE Trans. Inf. Theory, 65 (5): 3233-3245 (2019)The Vector Decomposition Problem., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 93-A (1): 188-193 (2010)Toward Digital Watermarking for Cryptographic Data., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 94-A (1): 270-272 (2011)Detection of Cheaters in Non-interactive Polynomial Evaluation., and . IACR Cryptology ePrint Archive, (2013)