default search action
Wakaha Ogata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j43]Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata:
Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext. Des. Codes Cryptogr. 92(2): 277-301 (2024) - [c32]Xichen Zhang, Keitaro Hashimoto, Wakaha Ogata:
Security Model for Authenticated Key Exchange, Reconsidered. SCN (2) 2024: 251-271 - [i13]Hirofumi Yoshioka, Wakaha Ogata, Keitaro Hashimoto:
Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions. IACR Cryptol. ePrint Arch. 2024: 1286 (2024) - 2023
- [j42]Atsunori Ichikawa, Wakaha Ogata:
Perfectly Secure Oblivious Priority Queue. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 272-280 (2023) - 2022
- [j41]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa:
Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 143-159 (2022) - [j40]Yoshifumi Saito, Wakaha Ogata:
Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 203-213 (2022) - 2020
- [j39]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama:
CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(10): 1157-1166 (2020) - [j38]Wakaha Ogata, Takaaki Otemori:
Security analysis of secure kNN and ranked keyword search over encrypted data. Int. J. Inf. Sec. 19(4): 419-425 (2020) - [c31]Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki:
Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks. IHSI 2020: 503-509
2010 – 2019
- 2019
- [j37]Wakaha Ogata, Kaoru Kurosawa:
No-Dictionary Searchable Symmetric Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 114-124 (2019) - [j36]Keitaro Hashimoto, Wakaha Ogata:
Unrestricted and compact certificateless aggregate signature scheme. Inf. Sci. 487: 97-114 (2019) - [j35]Dan Yamamoto, Wakaha Ogata:
Multidivisible Online/Offline Cryptography and Its Application to Signcryptions. Secur. Commun. Networks 2019: 1042649:1-1042649:21 (2019) - [c30]Atsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi:
Efficient Secure Multi-Party Protocols for Decision Tree Classification. ACISP 2019: 362-380 - [c29]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa:
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not \mathtt q -type) Assumptions. IWSEC 2019: 3-22 - [i12]Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama:
CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not $\mathtt{q}$-type) Assumptions. IACR Cryptol. ePrint Arch. 2019: 982 (2019) - [i11]Keitaro Hashimoto, Wakaha Ogata, Toi Tomita:
Tight reduction for generic construction of certificateless signature and its instantiation from DDH assumption. IACR Cryptol. ePrint Arch. 2019: 1367 (2019) - 2017
- [j34]Dan Yamamoto, Wakaha Ogata:
Multi-Divisible On-Line/Off-Line Encryptions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 91-102 (2017) - [j33]Wakaha Ogata, Toshinori Araki:
Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 103-114 (2017) - [j32]Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata:
Computational SS and conversion protocols in both active and passive settings. IET Inf. Secur. 11(5): 287-293 (2017) - [c28]Wakaha Ogata, Kaoru Kurosawa:
Efficient No-dictionary Verifiable Searchable Symmetric Encryption. Financial Cryptography 2017: 498-516 - 2016
- [i10]Mikio Fujiwara, Atsushi Waseda, Ryo Nojima, Shiho Moriai, Wakaha Ogata, Masahide Sasaki:
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing. CoRR abs/1607.00468 (2016) - [i9]Wakaha Ogata, Kaoru Kurosawa:
Efficient No-dictionary Verifiable SSE. IACR Cryptol. ePrint Arch. 2016: 981 (2016) - 2015
- [j31]Nguyen Quoc Viet, Wakaha Ogata:
Certificateless Aggregate Signature Schemes with Improved Security. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 92-99 (2015) - [j30]Ryo Kikuchi, Koji Chida, Dai Ikarashi, Wakaha Ogata, Koki Hamada, Katsumi Takahashi:
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 213-222 (2015) - [c27]Shunsuke Taketani, Wakaha Ogata:
Improvement of UC Secure Searchable Symmetric Encryption Scheme. IWSEC 2015: 135-152 - 2014
- [j29]Wakaha Ogata, Hiroshi Eguchi:
Cheating detectable threshold scheme against most powerful cheaters for long secrets. Des. Codes Cryptogr. 71(3): 527-539 (2014) - 2013
- [j28]Wakaha Ogata, Toshinori Araki:
Cheating Detectable Secret Sharing Schemes for Random Bit Strings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(11): 2230-2234 (2013) - [c26]Wakaha Ogata, Keita Koiwa, Akira Kanaoka, Shin'ichiro Matsuo:
Toward Practical Searchable Symmetric Encryption. IWSEC 2013: 151-167 - 2012
- [j27]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Undeniable and Unpretendable Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 138-150 (2012) - 2011
- [j26]Tatsumi Oba, Wakaha Ogata:
Provably Secure On-Line Secret Sharing Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 139-149 (2011) - [j25]Toshinori Araki, Wakaha Ogata:
A Simple and Efficient Secret Sharing Scheme Secure against Cheating. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1338-1345 (2011) - 2010
- [j24]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 63-75 (2010) - [j23]Toshinori Araki, Wakaha Ogata:
Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 126-135 (2010) - [j22]Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki:
Privacy-preserving similarity evaluation and application to remote biometrics authentication. Soft Comput. 14(5): 529-536 (2010) - [c25]Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata:
A Framework for Constructing Convertible Undeniable Signatures. ProvSec 2010: 70-86 - [c24]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. SCN 2010: 291-308
2000 – 2009
- 2009
- [j21]Kouichi Itoh, Tetsuya Izu, Wakaha Ogata, Takeshi Shimoyama, Masahiko Takenaka:
Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 67-75 (2009) - [j20]Kouichi Itoh, Dai Yamamoto, Jun Yajima, Wakaha Ogata:
Collision-Based Power Attack for RSA with Small Public Exponent. IEICE Trans. Inf. Syst. 92-D(5): 897-908 (2009) - [j19]Le Trieu Phong, Wakaha Ogata:
New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1822-1835 (2009) - [c23]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes. AFRICACRYPT 2009: 116-134 - [c22]Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki:
A Proposal of Efficient Remote Biometric Authentication Protocol. IWSEC 2009: 212-227 - [i8]Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata:
Provably Secure Convertible Undeniable Signatures with Unambiguity. IACR Cryptol. ePrint Arch. 2009: 394 (2009) - 2008
- [j18]Isamu Teranishi, Takuro Oyama, Wakaha Ogata:
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 94-106 (2008) - [j17]Isamu Teranishi, Wakaha Ogata:
Relationship between Standard Model Plaintext Awareness and Message Hiding. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 244-261 (2008) - [c21]Isamu Teranishi, Wakaha Ogata:
Relationship between Two Approaches for Defining the Standard Model PA-ness. ACISP 2008: 113-127 - [c20]Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata:
Stateful identity-based encryption scheme: faster encryption and decryption. AsiaCCS 2008: 381-388 - [c19]Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, Masakatsu Nishigaki:
Privacy-Preserving Similarity Evaluation and Application to Remote Biometrics Authentication. MDAI 2008: 3-14 - [c18]Isamu Teranishi, Wakaha Ogata:
Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. SCN 2008: 109-125 - [i7]Le Trieu Phong, Wakaha Ogata:
Blind HIBE and its Applications to Identity-Based Blind Signature and Blind Decryption. IACR Cryptol. ePrint Arch. 2008: 327 (2008) - 2007
- [j16]Dan Yamamoto, Wakaha Ogata:
A General Model of Structured Multisignatures with Message Flexibility. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 83-90 (2007) - [j15]Le Trieu Phong, Wakaha Ogata:
On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 226-230 (2007) - [j14]Wakaha Ogata, Naoya Matsumoto:
Comments on the Security Proofs of Some Signature Schemes Based on Factorization. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(2): 526-530 (2007) - [c17]Kei Nagai, Hiroaki Kikuchi, Wakaha Ogata, Masakatsu Nishigaki:
ZeroBio - Evaluation and Development of Asymmetric Fingerprint Authentication System Using Oblivious Neural Network Evaluation Protocol. ARES 2007: 1155-1159 - 2006
- [j13]Wakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson:
Optimum Secret Sharing Scheme Secure against Cheating. SIAM J. Discret. Math. 20(1): 79-95 (2006) - [j12]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The security of the FDH variant of Chaum's undeniable signature scheme. IEEE Trans. Inf. Theory 52(5): 2006-2017 (2006) - [c16]Isamu Teranishi, Wakaha Ogata:
Relationship Between Standard Model Plaintext Awareness and Message Hiding. ASIACRYPT 2006: 226-240 - [c15]Isamu Teranishi, Takuro Oyama, Wakaha Ogata:
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. INDOCRYPT 2006: 191-205 - [i6]Le Trieu Phong, Wakaha Ogata:
On a Variation of Kurosawa-Desmedt Encryption Scheme. IACR Cryptol. ePrint Arch. 2006: 31 (2006) - [i5]Le Trieu Phong, Wakaha Ogata:
Some Practical Public-Key Encryption Schemes in both Standard Model and Random Oracle Model. IACR Cryptol. ePrint Arch. 2006: 173 (2006) - 2005
- [j11]Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata:
Efficient Divisible Voting Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 230-238 (2005) - [c14]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. Public Key Cryptography 2005: 328-345 - 2004
- [j10]Wakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson, Hajime Saido:
New combinatorial designs and their applications to authentication codes and secret sharing schemes. Discret. Math. 279(1-3): 383-405 (2004) - [j9]Wakaha Ogata, Ryota Sasahara:
k out of n Oblivious Transfer without Random Oracles. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 147-151 (2004) - [j8]Wakaha Ogata, Kaoru Kurosawa:
Oblivious keyword search. J. Complex. 20(2-3): 356-371 (2004) - [i4]Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. IACR Cryptol. ePrint Arch. 2004: 290 (2004) - 2003
- [j7]Shin'ichiro Matsuo, Wakaha Ogata:
Electronic Ticket Scheme for ITS. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 142-150 (2003) - [j6]Shin'ichiro Matsuo, Wakaha Ogata:
Matching Oblivious Transfer: How to Exchange Valuable Data. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 189-193 (2003) - [c13]Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata:
Divisible Voting Scheme. ISC 2003: 137-150 - [c12]Shin'ichiro Matsuo, Wakaha Ogata:
Brief announcement: a method for exchanging valuable data: how to realize matching oblivious transfer. PODC 2003: 201 - [i3]Natsuki Ishida, Shin'ichiro Matsuo, Wakaha Ogata:
Divisible Voting Scheme. IACR Cryptol. ePrint Arch. 2003: 74 (2003) - 2002
- [j5]Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Wakaha Ogata:
On the bound for anonymous secret sharing schemes. Discret. Appl. Math. 121(1-3): 193-202 (2002) - [c11]Wakaha Ogata, Kaoru Kurosawa:
Bounds for Robust Metering Schemes and Their Relationship with A-code. ASIACRYPT 2002: 64-80 - [c10]Kaoru Kurosawa, Wakaha Ogata:
Bit-Slice Auction Circuit. ESORICS 2002: 24-38 - [i2]Wakaha Ogata, Kaoru Kurosawa:
Oblivious Keyword Search. IACR Cryptol. ePrint Arch. 2002: 182 (2002) - [i1]Kaoru Kurosawa, Wakaha Ogata:
Bit-Slice Auction Circuit. IACR Cryptol. ePrint Arch. 2002: 189 (2002) - 2001
- [c9]Kaoru Kurosawa, Wakaha Ogata, Toshihiko Matsuo, Shuichi Makishima:
IND-CCA Public Key Schemes Equivalent to Factoring n=pq. Public Key Cryptography 2001: 36-47 - 2000
- [c8]Wakaha Ogata, Kaoru Kurosawa:
Provably Secure Metering Scheme. ASIACRYPT 2000: 388-398
1990 – 1999
- 1999
- [j4]Kaoru Kurosawa, Wakaha Ogata:
Efficient Rabin-type Digital Signature Scheme. Des. Codes Cryptogr. 16(1): 53-64 (1999) - [j3]Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata:
On a Fallacious Bound for Authentication Codes. J. Cryptol. 12(3): 155-159 (1999) - 1998
- [j2]Wakaha Ogata, Kaoru Kurosawa:
Some Basic Properties of General Nonperfect Secret Sharing Schemes. J. Univers. Comput. Sci. 4(8): 690-704 (1998) - 1997
- [c7]Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani:
Fault tolerant anonymous channel. ICICS 1997: 440-444 - 1996
- [j1]Wakaha Ogata, Keiichi Sakano, Kaoru Kurosawa:
Multisymbol Majority Vote and Hard Core. Inf. Process. Lett. 58(6): 285-292 (1996) - [c6]Wakaha Ogata, Kaoru Kurosawa:
Optimum Secret Sharing Scheme Secure against Cheating. EUROCRYPT 1996: 200-211 - 1995
- [c5]Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata:
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes. CRYPTO 1995: 410-423 - 1993
- [c4]Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii:
Nonperfect Secret Sharing Schemes and Matroids. EUROCRYPT 1993: 126-141 - 1992
- [c3]Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii:
Nonperfect Secret Sharing Schemes. AUSCRYPT 1992: 56-66 - 1991
- [c2]Wakaha Ogata, Kaoru Kurosawa:
On Claw Free Families. ASIACRYPT 1991: 111-123 - 1990
- [c1]Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii:
General Public Key Residue Cryptosystems and Mental Poker Protocols. EUROCRYPT 1990: 374-388
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-22 00:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint