Ryo Kikuchi

According to our database1, Ryo Kikuchi authored at least 31 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
IACR Cryptol. ePrint Arch., 2024

2023
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries.
J. Cryptol., July, 2023

Efficient decision tree training with new data structure for secure multi-party computation.
Proc. Priv. Enhancing Technol., January, 2023

3-Party Secure Computation for RAMs: Optimal and Concretely Efficient.
IACR Cryptol. ePrint Arch., 2023

Polyp Size and Shape Estimation by Using an Endoscopic Hood Information.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Secure Statistical Analysis on Multiple Datasets: Join and Group-By.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Proc. Priv. Enhancing Technol., 2022

Efficient Secure Three-Party Sorting with Applications to Data Analysis and Heavy Hitters.
IACR Cryptol. ePrint Arch., 2022

2019
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation.
IACR Cryptol. ePrint Arch., 2019

An Efficient Secure Three-Party Sorting Protocol with an Honest Majority.
IACR Cryptol. ePrint Arch., 2019

Optimization Method for Controller Parameters Using Support Vector Machine.
Proceedings of the IEEE International Conference on Industrial Technology, 2019

Efficient Secure Multi-Party Protocols for Decision Tree Classification.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority.
IACR Cryptol. ePrint Arch., 2018

Comparative Study of the Effectiveness of Perturbative Methods for Creating Official Microdata in Japan.
Proceedings of the Privacy in Statistical Databases, 2018

High-Throughput Secure AES Computation.
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018

2017
Computational SS and conversion protocols in both active and passive settings.
IET Inf. Secur., 2017

How to Circumvent the Two-Ciphertext Lower Bound for Linear Garbling Schemes.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Comparable Encryption in SIGMOD'16.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

2016
Garbling Scheme for Formulas with Constant Size of Garbled Gates.
IACR Cryptol. ePrint Arch., 2016

Evaluation of Secure Computation in a Distributed Healthcare Setting.
Proceedings of the Exploring Complexity in Health: An Interdisciplinary Systems Approach - Proceedings of MIE2016 at HEC2016, Munich, Germany, 28 August, 2016

2015
Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

k-Anonymous Microdata Release via Post Randomisation Method.
Proceedings of the Advances in Information and Computer Security, 2015

Implementation and evaluation of a combined optimization scheme for routing and channel assignment in wireless mesh networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015

2014
Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead.
IACR Cryptol. ePrint Arch., 2014

2013
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

2011
Strong Security Notions for Timed-Release Public-Key Encryption Revisited.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

2010
A Framework for Constructing Convertible Undeniable Signatures.
Proceedings of the Provable Security - 4th International Conference, 2010


  Loading...