Author of the publication

Computational SS and conversion protocols in both active and passive settings.

, , , , and . IET Inf. Secur., 11 (5): 287-293 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Secure Anonymous Communications with Practical Anonymity Revocation Scheme., , and . IWSEC, volume 4752 of Lecture Notes in Computer Science, page 352-364. Springer, (2007)Fast Large-Scale Honest-Majority MPC for Malicious Adversaries., , , , , , and . CRYPTO (3), volume 10993 of Lecture Notes in Computer Science, page 34-64. Springer, (2018)Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation., , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 98-A (1): 213-222 (2015)Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications., , , , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (1): 128-138 (2007)Extended km-Anonymity for Randomization Applied to Binary Data., , and . PST, page 1-7. IEEE, (2023)k-Anonymous Microdata Release via Post Randomisation Method., , , and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 225-241. Springer, (2015)Conversion Schemes for Unlinkable Signatures That Include Revocable Unlinkability.. IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 89-A (1): 90-98 (2006)Secure Multiparty Computation for Comparator Networks., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 91-A (9): 2349-2355 (2008)Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation., , , and . IACR Cryptology ePrint Archive, (2014)Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead., , , and . IACR Cryptology ePrint Archive, (2014)