High-throughput semi-honest secure three-party computation with an honest majority T Araki, J Furukawa, Y Lindell, A Nof, K Ohara Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 464 | 2016 |
Optimized honest-majority MPC for malicious adversaries—breaking the 1 billion-gate per second barrier T Araki, A Barak, J Furukawa, T Lichter, Y Lindell, A Nof, K Ohara, ... 2017 IEEE Symposium on Security and Privacy (SP), 843-862, 2017 | 167 | 2017 |
Generalizing the SPDZ compiler for other protocols T Araki, A Barak, J Furukawa, M Keller, Y Lindell, K Ohara, H Tsuchida Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 55 | 2018 |
Secure graph analysis at scale T Araki, J Furukawa, K Ohara, B Pinkas, H Rosemarin, H Tsuchida Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 45 | 2021 |
Privacy-preserving smart metering with verifiability for both billing and energy management K Ohara, Y Sakai, F Yoshida, M Iwamoto, K Ohta Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 23-32, 2014 | 31 | 2014 |
A group signature scheme with unbounded message-dependent opening K Ohara, Y Sakai, K Emura, G Hanaoka Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013 | 25 | 2013 |
Shortening the Libert-Peters-Yung revocable group signature scheme by using the random oracle methodology K Ohara, K Emura, G Hanaoka, A Ishida, K Ohta, Y Sakai IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019 | 21 | 2019 |
High-throughput secure three-party computation of kerberos ticket generation T Araki, A Barak, J Furukawa, Y Lindell, A Nof, K Ohara Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 12 | 2016 |
Oblivious linear group actions and applications N Attrapadung, G Hanaoaka, T Matsuda, H Morita, K Ohara, JCN Schuldt, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 10 | 2021 |
Group Signatures with Message‐Dependent Opening: Formal Definitions and Constructions K Emura, G Hanaoka, Y Kawai, T Matsuda, K Ohara, K Omote, Y Sakai Security and communication networks 2019 (1), 4872403, 2019 | 10 | 2019 |
Efficient dynamic searchable encryption with forward privacy under the decent leakage Y Watanabe, K Ohara, M Iwamoto, K Ohta Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022 | 9 | 2022 |
Secure computation system, secure computation method, secure computation apparatus, distribution information generation apparatus, and methods and programs therefor T Araki, J Furukawa, K Ohara, H Haruna US Patent 11,042,358, 2021 | 9 | 2021 |
How to choose suitable secure multiparty computation using generalized SPDZ T Araki, A Barak, J Furukawa, M Keller, K Ohara, H Tsuchida Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 9 | 2018 |
Revisiting fuzzy signatures: Towards a more risk-free cryptographic authentication system based on biometrics S Katsumata, T Matsuda, W Nakamura, K Ohara, K Takahashi Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 7 | 2021 |
Server device, data search system, search method, and recording medium for extracting concealed data K Ohara, T Araki, J Furukawa US Patent 10,417,442, 2019 | 7 | 2019 |
Information processing apparatus, authentication method, and recording medium for recording computer program Y Tanaka, J Furukawa, K Ohara, T Araki US Patent 11,050,745, 2021 | 6 | 2021 |
How to make a secure index for searchable symmetric encryption, revisited Y Watanabe, T Nakai, K Ohara, T Nojima, Y Liu, M Iwamoto, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022 | 4 | 2022 |
Non-interactive secure multiparty computation for symmetric functions, revisited: More efficient constructions and extensions R Eriguchi, K Ohara, S Yamada, K Nuida Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 4 | 2021 |
Multi-party computation for modular exponentiation based on replicated secret sharing K Ohara, Y Watanabe, M Iwamoto, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019 | 4 | 2019 |
Secure parallel computation on privately partitioned data and applications N Attrapadung, H Morita, K Ohara, JCN Schuldt, T Teruya, K Tozawa Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 3 | 2022 |