Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Satoshi Obana
@inproceedings{DBLP:conf/candar/KanekoO23, author = {Kiminori Kaneko and Satoshi Obana}, title = {A Cryptanalysis against the Cheating Detectable Secret Sharing from {NISS} 2019}, booktitle = {Eleventh International Symposium on Computing and Networking, {CANDAR} 2023, Matsue, Japan, November 28 - Dec. 1, 2023}, pages = {148--154}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CANDAR60563.2023.00027}, doi = {10.1109/CANDAR60563.2023.00027}, timestamp = {Fri, 16 Feb 2024 13:45:14 +0100}, biburl = {https://dblp.org/rec/conf/candar/KanekoO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wiphal/YoshidaMO23, author = {Maki Yoshida and Sumio Morioka and Satoshi Obana}, editor = {Aleksandr Ometov and Jari Nurmi and Elena Simona Lohan and Joaqu{\'{\i}}n Torres{-}Sospedra and Heidi Kuusniemi}, title = {Secure Communication via GNSS-based Key Synchronization}, booktitle = {Proceedings of Work-in-Progress in Hardware and Software for Location Computation {(WIPHAL} 2023), Castellon, Spain, June 06-08, 2023}, series = {{CEUR} Workshop Proceedings}, volume = {3434}, publisher = {CEUR-WS.org}, year = {2023}, url = {https://ceur-ws.org/Vol-3434/paper1.pdf}, timestamp = {Fri, 04 Aug 2023 23:51:40 +0200}, biburl = {https://dblp.org/rec/conf/wiphal/YoshidaMO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SugauchiO22, author = {Sho Sugauchi and Satoshi Obana}, title = {Fully Subliminal-Free Schnorr Signature for Nonce}, booktitle = {Tenth International Symposium on Computing and Networking, {CANDAR} 2022, Himeji, Japan, November 21-24, 2022}, pages = {179--185}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CANDAR57322.2022.00032}, doi = {10.1109/CANDAR57322.2022.00032}, timestamp = {Mon, 13 Feb 2023 21:53:10 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SugauchiO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icl-gnss/YoshidaMO22, author = {Maki Yoshida and Sumio Morioka and Satoshi Obana}, editor = {Jari Nurmi and Elena Simona Lohan and Joaqu{\'{\i}}n Torres{-}Sospedra and Heidi Kuusniemi and Aleksandr Ometov}, title = {On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of {GNSS}}, booktitle = {2022 International Conference on Localization and GNSS, {ICL-GNSS} 2022, Tampere, Finland, June 7-9, 2022}, pages = {1--6}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ICL-GNSS54081.2022.9797034}, doi = {10.1109/ICL-GNSS54081.2022.9797034}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icl-gnss/YoshidaMO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/TamiyaIMOO21, author = {Hiroto Tamiya and Toshiyuki Isshiki and Kengo Mori and Satoshi Obana and Tetsushi Ohki}, editor = {Arslan Br{\"{o}}mme and Christoph Busch and Naser Damer and Antitza Dantcheva and Marta Gomez{-}Barrero and Kiran B. Raja and Christian Rathgeb and Ana Filipa Sequeira and Andreas Uhl}, title = {Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption}, booktitle = {Proceedings of the 20th International Conference of the Biometrics Special Interest Group, {BIOSIG} 2021, Digital Conference, September 15-17, 2021}, series = {{LNI}}, volume = {{P-315}}, pages = {91--100}, publisher = {Gesellschaft f{\"{u}}r Informatik e.V.}, year = {2021}, url = {https://dl.gi.de/handle/20.500.12116/37444}, doi = {10.1109/BIOSIG52210.2021.9548305}, timestamp = {Tue, 19 Dec 2023 17:53:48 +0100}, biburl = {https://dblp.org/rec/conf/biosig/TamiyaIMOO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/SatoO21, author = {Kaichi Sato and Satoshi Obana}, title = {Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function}, booktitle = {Ninth International Symposium on Computing and Networking, {CANDAR} 2021 - Workshops, Matsue, Japan, 23-26 November 2021}, pages = {372--378}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/CANDARW53999.2021.00069}, doi = {10.1109/CANDARW53999.2021.00069}, timestamp = {Fri, 18 Feb 2022 10:36:44 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/SatoO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/UemuraO21, author = {Kaito Uemura and Satoshi Obana}, editor = {Sabrina De Capitani di Vimercati and Pierangela Samarati}, title = {Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack}, booktitle = {Proceedings of the 18th International Conference on Security and Cryptography, {SECRYPT} 2021, July 6-8, 2021}, pages = {692--697}, publisher = {{SCITEPRESS}}, year = {2021}, url = {https://doi.org/10.5220/0010548006920697}, doi = {10.5220/0010548006920697}, timestamp = {Tue, 06 Jun 2023 14:58:01 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/UemuraO21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icete/ObanaY20, author = {Satoshi Obana and Maki Yoshida}, editor = {Pierangela Samarati and Sabrina De Capitani di Vimercati and Mohammad S. Obaidat and Jalel Ben{-}Othman}, title = {Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing}, booktitle = {Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint, Paris, France, July 8-10, 2020}, pages = {322--329}, publisher = {ScitePress}, year = {2020}, url = {https://doi.org/10.5220/0009819203220329}, doi = {10.5220/0009819203220329}, timestamp = {Wed, 29 Jul 2020 16:57:35 +0200}, biburl = {https://dblp.org/rec/conf/icete/ObanaY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/YoshidaO20, author = {Maki Yoshida and Satoshi Obana}, title = {Compact Verifiably Multiplicative Secret Sharing}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {437--441}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366146}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/YoshidaO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/YoshidaO19, author = {Maki Yoshida and Satoshi Obana}, title = {Verifiably Multiplicative Secret Sharing}, journal = {{IEEE} Trans. Inf. Theory}, volume = {65}, number = {5}, pages = {3233--3245}, year = {2019}, url = {https://doi.org/10.1109/TIT.2018.2886262}, doi = {10.1109/TIT.2018.2886262}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/YoshidaO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HigoINOOT19, author = {Haruna Higo and Toshiyuki Isshiki and Masahiro Nara and Satoshi Obana and Toshihiko Okamura and Hiroto Tamiya}, editor = {Andrea Saracino and Paolo Mori}, title = {Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication}, booktitle = {Emerging Technologies for Authorization and Authentication - Second International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg, September 27, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11967}, pages = {86--103}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-39749-4\_6}, doi = {10.1007/978-3-030-39749-4\_6}, timestamp = {Wed, 29 Jan 2020 13:02:14 +0100}, biburl = {https://dblp.org/rec/conf/esorics/HigoINOOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/AgematsuO19, author = {Tomoki Agematsu and Satoshi Obana}, title = {Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme}, booktitle = {2019 Seventh International Symposium on Computing and Networking, {CANDAR} 2019, Nagasaki, Japan, November 25-28, 2019}, pages = {1--9}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CANDAR.2019.00009}, doi = {10.1109/CANDAR.2019.00009}, timestamp = {Mon, 20 Jan 2020 17:19:29 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/AgematsuO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/YoshidaO18, author = {Maki Yoshida and Satoshi Obana}, title = {On the (in)efficiency of non-interactive secure multiparty computation}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {8}, pages = {1793--1805}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0424-7}, doi = {10.1007/S10623-017-0424-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/YoshidaO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HigoIMO18, author = {Haruna Higo and Toshiyuki Isshiki and Kengo Mori and Satoshi Obana}, title = {Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {1}, pages = {138--148}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.138}, doi = {10.1587/TRANSFUN.E101.A.138}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HigoIMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/AgematsuO18, author = {Tomoki Agematsu and Satoshi Obana}, title = {How to Realize Highly Accurate Computation with Fully Homomorphic Encryption}, booktitle = {Sixth International Symposium on Computing and Networking, {CANDAR} Workshops 2018, Takayama, Japan, November 27-30, 2018}, pages = {391--397}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CANDARW.2018.00079}, doi = {10.1109/CANDARW.2018.00079}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/AgematsuO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/MiyanoO18, author = {Motoki Miyano and Satoshi Obana}, title = {Updatable Searchable Symmetric Encryption with Fine-Grained Delete Functionality}, booktitle = {Sixth International Symposium on Computing and Networking, {CANDAR} Workshops 2018, Takayama, Japan, November 27-30, 2018}, pages = {438--444}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CANDARW.2018.00086}, doi = {10.1109/CANDARW.2018.00086}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/MiyanoO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshidaO18, author = {Maki Yoshida and Satoshi Obana}, title = {Flaws in a Verifiably Multiplicative Secret Sharing Scheme from {ICITS} 2017}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {83}, year = {2018}, url = {http://eprint.iacr.org/2018/083}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoshidaO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/YoshidaO17, author = {Maki Yoshida and Satoshi Obana}, editor = {Junji Shikata}, title = {Verifiably Multiplicative Secret Sharing}, booktitle = {Information Theoretic Security - 10th International Conference, {ICITS} 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10681}, pages = {73--82}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72089-0\_5}, doi = {10.1007/978-3-319-72089-0\_5}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/icits/YoshidaO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2017, editor = {Satoshi Obana and Koji Chida}, title = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0}, doi = {10.1007/978-3-319-64200-0}, isbn = {978-3-319-64199-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/ObanaY16, author = {Satoshi Obana and Maki Yoshida}, editor = {Sara Foresti and Giuseppe Persiano}, title = {An Efficient Construction of Non-Interactive Secure Multiparty Computation}, booktitle = {Cryptology and Network Security - 15th International Conference, {CANS} 2016, Milan, Italy, November 14-16, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10052}, pages = {604--614}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-48965-0\_39}, doi = {10.1007/978-3-319-48965-0\_39}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/ObanaY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/AraiO16, author = {Takahiro Arai and Satoshi Obana}, title = {A Password-Protected Secret Sharing Based on Kurosawa-Desmedt Hybrid Encryption}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {597--603}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0108}, doi = {10.1109/CANDAR.2016.0108}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/AraiO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/HoshinoO16, author = {Hidetaka Hoshino and Satoshi Obana}, title = {Cheating Detectable Secret Sharing Scheme Suitable for Implementation}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {623--628}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0112}, doi = {10.1109/CANDAR.2016.0112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/HoshinoO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/AdhikariMORSX16, author = {Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu}, editor = {Anderson C. A. Nascimento and Paulo S. L. M. Barreto}, title = {Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters}, booktitle = {Information Theoretic Security - 9th International Conference, {ICITS} 2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10015}, pages = {3--23}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-49175-2\_1}, doi = {10.1007/978-3-319-49175-2\_1}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/AdhikariMORSX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/NozoeO16, author = {Shunta Nozoe and Satoshi Obana}, title = {Searchable symmetric encryption supporting update}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {713--717}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840518/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/NozoeO16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YoshidaO15, author = {Maki Yoshida and Satoshi Obana}, editor = {Soonhak Kwon and Aaram Yun}, title = {On the (In)Efficiency of Non-Interactive Secure Multiparty Computation}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {185--193}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_12}, doi = {10.1007/978-3-319-30840-1\_12}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YoshidaO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HoshinoO15, author = {Hidetaka Hoshino and Satoshi Obana}, editor = {Keisuke Tanaka and Yuji Suga}, title = {Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings}, booktitle = {Advances in Information and Computer Security - 10th International Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9241}, pages = {213--222}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22425-1\_13}, doi = {10.1007/978-3-319-22425-1\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HoshinoO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HigoIMO15, author = {Haruna Higo and Toshiyuki Isshiki and Kengo Mori and Satoshi Obana}, editor = {Orr Dunkelman and Liam Keliher}, title = {Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {44--64}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_3}, doi = {10.1007/978-3-319-31301-6\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HigoIMO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdhikariMORSX15, author = {Avishek Adhikari and Kirill Morozov and Satoshi Obana and Partha Sarathi Roy and Kouichi Sakurai and Rui Xu}, title = {Efficient Threshold Secret Sharing Schemes Secure against Rushing Cheaters}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1115}, year = {2015}, url = {http://eprint.iacr.org/2015/1115}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdhikariMORSX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/HayashiO14, author = {Hiroki Hayashi and Satoshi Obana}, title = {Protocols for evaluating conditional sum on encrypted data}, booktitle = {International Symposium on Information Theory and its Applications, {ISITA} 2014, Melbourne, Australia, October 26-29, 2014}, pages = {148--152}, publisher = {{IEEE}}, year = {2014}, url = {https://ieeexplore.ieee.org/document/6979821/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/HayashiO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ObanaT14, author = {Satoshi Obana and Kazuya Tsuchida}, editor = {Maki Yoshida and Koichi Mouri}, title = {Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {88--97}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_7}, doi = {10.1007/978-3-319-09843-2\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ObanaT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/biosig/IsshikiAMOOS13, author = {Toshiyuki Isshiki and Toshinori Araki and Kengo Mori and Satoshi Obana and Tetsushi Ohki and Shizuo Sakamoto}, editor = {Arslan Br{\"{o}}mme and Christoph Busch}, title = {New Security Definitions for Biometric Authentication with Template Protection: Toward covering more threats against authentication systems}, booktitle = {2013 {BIOSIG} - Proceedings of the 12th International Conference of Biometrics Special Interest Group, Darmstadt, Germany, September 4-6, 2013}, series = {{LNI}}, volume = {{P-212}}, pages = {171--184}, publisher = {{GI}}, year = {2013}, url = {https://dl.gi.de/handle/20.500.12116/17666}, timestamp = {Tue, 04 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/biosig/IsshikiAMOOS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshidaO13, author = {Maki Yoshida and Satoshi Obana}, title = {Detection of Cheaters in Non-interactive Polynomial Evaluation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2013}, url = {http://eprint.iacr.org/2013/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoshidaO13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Obana11, author = {Satoshi Obana}, editor = {Kenneth G. Paterson}, title = {Almost Optimum \emph{t}-Cheater Identifiable Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6632}, pages = {284--302}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20465-4\_17}, doi = {10.1007/978-3-642-20465-4\_17}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Obana11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/MoriokaIONS11, author = {Sumio Morioka and Toshiyuki Isshiki and Satoshi Obana and Yuichi Nakamura and Kazue Sako}, title = {Flexible architecture optimization and {ASIC} implementation of group signature algorithm using a customized {HLS} methodology}, booktitle = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San Diego, California, {USA}}, pages = {57--62}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/HST.2011.5954996}, doi = {10.1109/HST.2011.5954996}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/MoriokaIONS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dim/FurukawaSO09, author = {Jun Furukawa and Kazue Sako and Satoshi Obana}, editor = {Elisa Bertino and Thomas Gro{\ss} and Kenji Takahashi}, title = {{IC} card-based single sign-on system that remains secure under card analysis}, booktitle = {Proceedings of the 5th Workshop on Digital Identity Management, Chicago, Illinois, USA, November 13, 2009}, pages = {63--72}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655028.1655043}, doi = {10.1145/1655028.1655043}, timestamp = {Tue, 12 Feb 2019 16:55:52 +0100}, biburl = {https://dblp.org/rec/conf/dim/FurukawaSO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ArakiO07, author = {Toshinori Araki and Satoshi Obana}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {Flaws in Some Secret Sharing Schemes Against Cheating}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {122--132}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_10}, doi = {10.1007/978-3-540-73458-1\_10}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ArakiO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/ObanaA06, author = {Satoshi Obana and Toshinori Araki}, editor = {Xuejia Lai and Kefei Chen}, title = {Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {364--379}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_24}, doi = {10.1007/11935230\_24}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/ObanaA06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/MalkinOY04, author = {Tal Malkin and Satoshi Obana and Moti Yung}, editor = {Christian Cachin and Jan Camenisch}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {306--322}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_19}, doi = {10.1007/978-3-540-24676-3\_19}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/MalkinOY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MalkinOY04, author = {Tal Malkin and Satoshi Obana and Moti Yung}, title = {The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {52}, year = {2004}, url = {http://eprint.iacr.org/2004/052}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MalkinOY04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/FurukawaMMOS02, author = {Jun Furukawa and Hiroshi Miyauchi and Kengo Mori and Satoshi Obana and Kazue Sako}, editor = {Matt Blaze}, title = {An Implementation of a Universally Verifiable Electronic Voting Scheme based on Shuffling}, booktitle = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton, Bermuda, March 11-14, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2357}, pages = {16--30}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36504-4\_2}, doi = {10.1007/3-540-36504-4\_2}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/FurukawaMMOS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ObanaK01, author = {Satoshi Obana and Kaoru Kurosawa}, title = {Bounds and Combinatorial Structure of Multi-Receiver-Codes}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {1}, pages = {47--63}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ObanaK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/KurosawaO01, author = {Kaoru Kurosawa and Satoshi Obana}, title = {Combinatorial Bounds on Authentication Codes with Arbitration}, journal = {Des. Codes Cryptogr.}, volume = {22}, number = {3}, pages = {265--281}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/KurosawaO01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/ObanaK00, author = {Satoshi Obana and Kaoru Kurosawa}, title = {Combinatorial Classification of Optimal Authentication Codes with Arbitration}, journal = {Des. Codes Cryptogr.}, volume = {20}, number = {3}, pages = {281--305}, year = {2000}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/ObanaK00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KurosawaO97, author = {Kaoru Kurosawa and Satoshi Obana}, editor = {Vijay Varadharajan and Josef Pieprzyk and Yi Mu}, title = {Characterisation of (k, n) Multi-receiver Authentication}, booktitle = {Information Security and Privacy, Second Australasian Conference, ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1270}, pages = {204--215}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0027927}, doi = {10.1007/BFB0027927}, timestamp = {Sun, 02 Jun 2019 21:26:44 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KurosawaO97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ObanaK97, author = {Satoshi Obana and Kaoru Kurosawa}, editor = {Yongfei Han and Tatsuaki Okamoto and Sihan Qing}, title = {A\({}^{\mbox{2}}\)-code = Affine resolvable = {BIBD}}, booktitle = {Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1334}, pages = {118--129}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0028468}, doi = {10.1007/BFB0028468}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/ObanaK97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/ObanaK96, author = {Satoshi Obana and Kaoru Kurosawa}, title = {Veto is Impossible in Secret Sharing Schemes}, journal = {Inf. Process. Lett.}, volume = {58}, number = {6}, pages = {293--295}, year = {1996}, url = {https://doi.org/10.1016/0020-0190(96)00052-X}, doi = {10.1016/0020-0190(96)00052-X}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/ObanaK96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KurosawaOO95, author = {Kaoru Kurosawa and Satoshi Obana and Wakaha Ogata}, editor = {Don Coppersmith}, title = {t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes}, booktitle = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {963}, pages = {410--423}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-44750-4\_33}, doi = {10.1007/3-540-44750-4\_33}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KurosawaOO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KurosawaO95, author = {Kaoru Kurosawa and Satoshi Obana}, editor = {Louis C. Guillou and Jean{-}Jacques Quisquater}, title = {Combinatorial Bounds for Authentication Codes with Arbitration}, booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {921}, pages = {289--300}, publisher = {Springer}, year = {1995}, url = {https://doi.org/10.1007/3-540-49264-X\_23}, doi = {10.1007/3-540-49264-X\_23}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KurosawaO95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.