Follow
Kazuma Ohara
Title
Cited by
Cited by
Year
High-throughput semi-honest secure three-party computation with an honest majority
T Araki, J Furukawa, Y Lindell, A Nof, K Ohara
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
4342016
Optimized honest-majority MPC for malicious adversaries—breaking the 1 billion-gate per second barrier
T Araki, A Barak, J Furukawa, T Lichter, Y Lindell, A Nof, K Ohara, ...
2017 IEEE Symposium on Security and Privacy (SP), 843-862, 2017
1642017
Generalizing the SPDZ compiler for other protocols
T Araki, A Barak, J Furukawa, M Keller, Y Lindell, K Ohara, H Tsuchida
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
532018
Secure graph analysis at scale
T Araki, J Furukawa, K Ohara, B Pinkas, H Rosemarin, H Tsuchida
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
432021
Privacy-preserving smart metering with verifiability for both billing and energy management
K Ohara, Y Sakai, F Yoshida, M Iwamoto, K Ohta
Proceedings of the 2nd ACM workshop on ASIA public-key cryptography, 23-32, 2014
312014
A group signature scheme with unbounded message-dependent opening
K Ohara, Y Sakai, K Emura, G Hanaoka
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
242013
Shortening the Libert-Peters-Yung revocable group signature scheme by using the random oracle methodology
K Ohara, K Emura, G Hanaoka, A Ishida, K Ohta, Y Sakai
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019
202019
High-throughput secure three-party computation of kerberos ticket generation
T Araki, A Barak, J Furukawa, Y Lindell, A Nof, K Ohara
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016
122016
Group signatures with message-dependent opening: Formal definitions and constructions
K Emura, G Hanaoka, Y Kawai, T Matsuda, K Ohara, K Omote, Y Sakai
Security and communication networks 2019, 2019
102019
Oblivious linear group actions and applications
N Attrapadung, G Hanaoaka, T Matsuda, H Morita, K Ohara, JCN Schuldt, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
92021
How to choose suitable secure multiparty computation using generalized SPDZ
T Araki, A Barak, J Furukawa, M Keller, K Ohara, H Tsuchida
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
92018
Secure computation system, secure computation method, secure computation apparatus, distribution information generation apparatus, and methods and programs therefor
T Araki, J Furukawa, K Ohara, H Haruna
US Patent 11,042,358, 2021
82021
Efficient dynamic searchable encryption with forward privacy under the decent leakage
Y Watanabe, K Ohara, M Iwamoto, K Ohta
Proceedings of the Twelfth ACM Conference on Data and Application Security …, 2022
72022
Server device, data search system, search method, and recording medium for extracting concealed data
K Ohara, T Araki, J Furukawa
US Patent 10,417,442, 2019
72019
Revisiting fuzzy signatures: Towards a more risk-free cryptographic authentication system based on biometrics
S Katsumata, T Matsuda, W Nakamura, K Ohara, K Takahashi
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
62021
How to make a secure index for searchable symmetric encryption, revisited
Y Watanabe, T Nakai, K Ohara, T Nojima, Y Liu, M Iwamoto, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022
42022
Non-interactive secure multiparty computation for symmetric functions, revisited: More efficient constructions and extensions
R Eriguchi, K Ohara, S Yamada, K Nuida
Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021
42021
Multi-party computation for modular exponentiation based on replicated secret sharing
K Ohara, Y Watanabe, M Iwamoto, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2019
42019
Semantic definition of anonymity in identity-based encryption and its relation to indistinguishability-based definition
G Hanaoka, M Komatsu, K Ohara, Y Sakai, S Yamada
Computer Security–ESORICS 2020: 25th European Symposium on Research in …, 2020
32020
Constant rounds almost linear complexity multi-party computation for prefix sum
K Ohara, K Ohta, K Suzuki, K Yoneyama
Progress in Cryptology–AFRICACRYPT 2014: 7th International Conference on …, 2014
32014
The system can't perform the operation now. Try again later.
Articles 1–20