Satoshi Obana

Orcid: 0000-0003-4795-4779

According to our database1, Satoshi Obana authored at least 41 papers between 1995 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Secure Communication via GNSS-based Key Synchronization.
Proceedings of Work-in-Progress in Hardware and Software for Location Computation (WIPHAL 2023), 2023

A Cryptanalysis against the Cheating Detectable Secret Sharing from NISS 2019.
Proceedings of the Eleventh International Symposium on Computing and Networking, CANDAR 2023, Matsue, Japan, November 28, 2023

2022
On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS.
Proceedings of the 2022 International Conference on Localization and GNSS, 2022

Fully Subliminal-Free Schnorr Signature for Nonce.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

2021
Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack.
Proceedings of the 18th International Conference on Security and Cryptography, 2021

Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption.
Proceedings of the 20th International Conference of the Biometrics Special Interest Group, 2021

2020
Compact Verifiably Multiplicative Secret Sharing.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Verifiably Multiplicative Secret Sharing.
IEEE Trans. Inf. Theory, 2019

Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication.
Proceedings of the Emerging Technologies for Authorization and Authentication, 2019

2018
Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Flaws in a Verifiably Multiplicative Secret Sharing Scheme from ICITS 2017.
IACR Cryptol. ePrint Arch., 2018

On the (in)efficiency of non-interactive secure multiparty computation.
Des. Codes Cryptogr., 2018

Updatable Searchable Symmetric Encryption with Fine-Grained Delete Functionality.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

How to Realize Highly Accurate Computation with Fully Homomorphic Encryption.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2016
Searchable symmetric encryption supporting update.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Cheating Detectable Secret Sharing Scheme Suitable for Implementation.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

A Password-Protected Secret Sharing Based on Kurosawa-Desmedt Hybrid Encryption.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

An Efficient Construction of Non-Interactive Secure Multiparty Computation.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters.
IACR Cryptol. ePrint Arch., 2015

Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings.
Proceedings of the Advances in Information and Computer Security, 2015

2014
Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field.
Proceedings of the Advances in Information and Computer Security, 2014

Protocols for evaluating conditional sum on encrypted data.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

2013
Detection of Cheaters in Non-interactive Polynomial Evaluation.
IACR Cryptol. ePrint Arch., 2013

New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems.
Proceedings of the 2013 BIOSIG, 2013

2011
Flexible architecture optimization and ASIC implementation of group signature algorithm using a customized HLS methodology.
Proceedings of the HOST 2011, 2011

Almost Optimum <i>t</i>-Cheater Identifiable Secret Sharing Schemes.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2009
IC card-based single sign-on system that remains secure under card analysis.
Proceedings of the 5th Workshop on Digital Identity Management, 2009

2007
Flaws in Some Secret Sharing Schemes Against Cheating.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution.
Proceedings of the Advances in Cryptology, 2006

2004
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.
IACR Cryptol. ePrint Arch., 2004

2002
An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling.
Proceedings of the Financial Cryptography, 6th International Conference, 2002

2001
Bounds and Combinatorial Structure of Multi-Receiver-Codes.
Des. Codes Cryptogr., 2001

Combinatorial Bounds on Authentication Codes with Arbitration.
Des. Codes Cryptogr., 2001

2000
Combinatorial Classification of Optimal Authentication Codes with Arbitration.
Des. Codes Cryptogr., 2000

1997
A<sup>2</sup>-code = Affine resolvable = BIBD.
Proceedings of the Information and Communication Security, First International Conference, 1997

Characterisation of (k, n) Multi-receiver Authentication.
Proceedings of the Information Security and Privacy, Second Australasian Conference, 1997

1996
Veto is Impossible in Secret Sharing Schemes.
Inf. Process. Lett., 1996

1995
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1995


  Loading...