Go Ohtake

Orcid: 0009-0006-6896-7156

According to our database1, Go Ohtake authored at least 38 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Impact of Audio on Adaptive Japanese Subtitles and Captions Ruby.
J. Inf. Process., 2024

Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings.
IACR Cryptol. ePrint Arch., 2024

2023
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Outsider-Anonymous Broadcast Encryption with Keyword Search: Generic Construction, CCA Security, and with Sublinear Ciphertexts.
IACR Cryptol. ePrint Arch., 2023

Survey on the Impact of Listening to Audio for Adaptive Japanese Subtitles and Captions Ruby.
Proceedings of the 2023 ACM International Conference on Interactive Media Experiences, 2023

Privacy-Preserving Data Management and Provision System for Personal Data Store.
Proceedings of the HCI International 2023 Posters, 2023

2022
Continuous Group Key Agreement with Flexible Authorization and Its Applications.
IACR Cryptol. ePrint Arch., 2022

Membership Privacy for Asynchronous Group Messaging.
IACR Cryptol. ePrint Arch., 2022

Private Set Intersection for Viewing History with Efficient Data Matching.
Proceedings of the HCI International 2022 Posters, 2022

2021
Privacy-Preserving System for Enriched-Integrated Service.
IEICE Trans. Inf. Syst., 2021

2019
Outsourcing scheme of ABE encryption secure against malicious adversary.
Comput. Secur., 2019

Privacy Preserving System for Real-Time Enriched-Integrated Service with Feedback to Providers.
Proceedings of the HCI for Cybersecurity, Privacy and Trust, 2019

2018
Attribute-Based Encryption for Range Attributes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Chosen ciphertext secure keyed-homomorphic public-key cryptosystems.
Des. Codes Cryptogr., 2018

2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Outsourcing of Verifiable Attribute-Based Keyword Search.
Proceedings of the Secure IT Systems, 2017

2016
Application Authentication System with Efficiently Updatable Signature.
IEICE Trans. Inf. Syst., 2016

2015
Privacy preserving system for integrated broadcast-broadband services using attribute-based encryption.
IEEE Trans. Consumer Electron., 2015

Privacy preserving system for integrated broadcast-broadband services.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

Watermarking for HEVC/H.265 stream.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

An application distribution management system for Hybridcast.
Proceedings of the IEEE International Conference on Consumer Electronics, 2015

2014
Weakened Anonymity of Group Signature and Its Application to Subscription Services.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

2013
Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2013

Partially Wildcarded Attribute-based Encryption and Its Efficient Construction.
Proceedings of the SECRYPT 2013, 2013

Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

2011
Secure Broadcast System with Simultaneous Individual Messaging.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Application Authentication for Hybrid Services of Broadcasting and Communications Networks.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

2010
Efficient Provider Authentication for Bidirectional Broadcasting Service.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Efficient Broadcast Encryption with Personalized Messages.
Proceedings of the Provable Security - 4th International Conference, 2010

2009
A Trade-off Traitor Tracing Scheme.
IEICE Trans. Inf. Syst., 2009

On the Theoretical Gap between Group Signatures with and without Unlinkability.
Proceedings of the Progress in Cryptology, 2009

2008
An Efficient Strong Key-Insulated Signature Scheme and Its Application.
Proceedings of the Public Key Infrastructure, 2008

2007
Anonymous Authentication Scheme for Subscription Services.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2007

Trade-Off Traitor Tracing.
Proceedings of the Progress in Cryptology, 2007

2006
Identified-Service Support System and Its Application to Network Broadcasting Services.
Proceedings of the IEEE International Conference on Systems, 2006

Network Broadcasting System Using Viewer Information.
Proceedings of the IEEE International Conference on Systems, 2006

2004
Managing Encryption and Key Publication Independently in Digital Rights Management Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004

2003
Separating Encryption and Key Issuance in Digital Rights Management Systems.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003


  Loading...