# Kazue Sako

According to our database

Collaborative distances:

^{1}, Kazue Sako authored at least 27 papers between 1994 and 2011.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Other## Links

#### On csauthors.net:

## Bibliography

2011

Verifiable Encryption.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Public Key Cryptography.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Nyberg-Rueppel Signature Scheme.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Goldwasser-Micali Encryption Scheme.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Digital Signature Schemes.

Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.

Proceedings of the HOST 2011, 2011

2010

An Implementation of a Mix-Net Based Network Voting Scheme and Its Use in a Private Organization.

Proceedings of the Towards Trustworthy Elections, New Directions in Electronic Voting, 2010

RLCPS Preface.

Proceedings of the Financial Cryptography and Data Security, 2010

2009

*k*-Times Anonymous Authentication.

IEICE Transactions, 2009

IC card-based single sign-on system that remains secure under card analysis.

Proceedings of the 5th Workshop on Digital Identity Management, 2009

2007

An Efficient Publicly Verifiable Mix-Net for Long Inputs.

IEICE Transactions, 2007

2006

*k*-Times Anonymous Authentication with a Constant Proving Cost.

Proceedings of the Public Key Cryptography, 2006

An Efficient Publicly Verifiable Mix-Net for Long Inputs.

Proceedings of the Financial Cryptography and Data Security, 2006

Using group signatures for identity management and its implementation.

Proceedings of the 2006 Workshop on Digital Identity Management, 2006

2005

Semantic Security.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Probabilistic Public-Key Encryption.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

Electronic Voting Schemes.

Proceedings of the Encyclopedia of Cryptography and Security, 2005

2004

k-Times Anonymous Authentication (Extended Abstract).

Proceedings of the Advances in Cryptology, 2004

2002

An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.

Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001

An Efficient Scheme for Proving a Shuffle.

Proceedings of the Advances in Cryptology, 2001

2000

An Auction Protocol Which Hides Bids of Losers.

Proceedings of the Public Key Cryptography, 2000

Efficient Receipt-Free Voting Based on Homomorphic Encryption.

Proceedings of the Advances in Cryptology, 2000

1999

Implementation of a Digital Lottery Server on WWW.

Proceedings of the Secure Networking - CQRE (Secure) '99, International Exhibition and Congress Düsseldorf, Germany, November 30, 1999

1997

Fault tolerant anonymous channel.

Proceedings of the Information and Communication Security, First International Conference, 1997

1996

Designated Verifier Proofs and Their Applications.

Proceedings of the Advances in Cryptology, 1996

1995

Receipt-Free Mix-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth.

Proceedings of the Advances in Cryptology, 1995

1994

Secure Voting Using Partially Compatible Homomorphisms.

Proceedings of the Advances in Cryptology, 1994