Satsuya Ohata
According to our database1,
Satsuya Ohata
authored at least 18 papers
between 2014 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2021
Proceedings of the 21st International Workshop on Algorithms in Bioinformatics, 2021
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Inf. Syst., 2020
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.
Proceedings of the Financial Cryptography and Data Security, 2020
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks.
Proceedings of the Applied Cryptography and Network Security, 2020
2019
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts.
IACR Cryptol. ePrint Arch., 2019
Towards High-Throughput Secure MPC over the Internet: Communication-Efficient Two-Party Protocols and Its Application.
CoRR, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the Computer Security, 2018
2016
Secur. Commun. Networks, 2016
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction.
IACR Cryptol. ePrint Arch., 2016
2015
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.
Proceedings of the Topics in Cryptology, 2015
2014
Proceedings of the Advances in Information and Computer Security, 2014