BibTeX records: Satoshi Obana

download as .bib file

@inproceedings{DBLP:conf/candar/KanekoO23,
  author       = {Kiminori Kaneko and
                  Satoshi Obana},
  title        = {A Cryptanalysis against the Cheating Detectable Secret Sharing from
                  {NISS} 2019},
  booktitle    = {Eleventh International Symposium on Computing and Networking, {CANDAR}
                  2023, Matsue, Japan, November 28 - Dec. 1, 2023},
  pages        = {148--154},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/CANDAR60563.2023.00027},
  doi          = {10.1109/CANDAR60563.2023.00027},
  timestamp    = {Fri, 16 Feb 2024 13:45:14 +0100},
  biburl       = {https://dblp.org/rec/conf/candar/KanekoO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wiphal/YoshidaMO23,
  author       = {Maki Yoshida and
                  Sumio Morioka and
                  Satoshi Obana},
  editor       = {Aleksandr Ometov and
                  Jari Nurmi and
                  Elena Simona Lohan and
                  Joaqu{\'{\i}}n Torres{-}Sospedra and
                  Heidi Kuusniemi},
  title        = {Secure Communication via GNSS-based Key Synchronization},
  booktitle    = {Proceedings of Work-in-Progress in Hardware and Software for Location
                  Computation {(WIPHAL} 2023), Castellon, Spain, June 06-08, 2023},
  series       = {{CEUR} Workshop Proceedings},
  volume       = {3434},
  publisher    = {CEUR-WS.org},
  year         = {2023},
  url          = {https://ceur-ws.org/Vol-3434/paper1.pdf},
  timestamp    = {Fri, 04 Aug 2023 23:51:40 +0200},
  biburl       = {https://dblp.org/rec/conf/wiphal/YoshidaMO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/SugauchiO22,
  author       = {Sho Sugauchi and
                  Satoshi Obana},
  title        = {Fully Subliminal-Free Schnorr Signature for Nonce},
  booktitle    = {Tenth International Symposium on Computing and Networking, {CANDAR}
                  2022, Himeji, Japan, November 21-24, 2022},
  pages        = {179--185},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CANDAR57322.2022.00032},
  doi          = {10.1109/CANDAR57322.2022.00032},
  timestamp    = {Mon, 13 Feb 2023 21:53:10 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/SugauchiO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icl-gnss/YoshidaMO22,
  author       = {Maki Yoshida and
                  Sumio Morioka and
                  Satoshi Obana},
  editor       = {Jari Nurmi and
                  Elena Simona Lohan and
                  Joaqu{\'{\i}}n Torres{-}Sospedra and
                  Heidi Kuusniemi and
                  Aleksandr Ometov},
  title        = {On Cryptographic Algorithms and Key Length for Delayed Disclosure
                  Authentication of {GNSS}},
  booktitle    = {2022 International Conference on Localization and GNSS, {ICL-GNSS}
                  2022, Tampere, Finland, June 7-9, 2022},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ICL-GNSS54081.2022.9797034},
  doi          = {10.1109/ICL-GNSS54081.2022.9797034},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icl-gnss/YoshidaMO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/TamiyaIMOO21,
  author       = {Hiroto Tamiya and
                  Toshiyuki Isshiki and
                  Kengo Mori and
                  Satoshi Obana and
                  Tetsushi Ohki},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch and
                  Naser Damer and
                  Antitza Dantcheva and
                  Marta Gomez{-}Barrero and
                  Kiran B. Raja and
                  Christian Rathgeb and
                  Ana Filipa Sequeira and
                  Andreas Uhl},
  title        = {Improved Post-quantum-secure Face Template Protection System Based
                  on Packed Homomorphic Encryption},
  booktitle    = {Proceedings of the 20th International Conference of the Biometrics
                  Special Interest Group, {BIOSIG} 2021, Digital Conference, September
                  15-17, 2021},
  series       = {{LNI}},
  volume       = {{P-315}},
  pages        = {91--100},
  publisher    = {Gesellschaft f{\"{u}}r Informatik e.V.},
  year         = {2021},
  url          = {https://dl.gi.de/handle/20.500.12116/37444},
  doi          = {10.1109/BIOSIG52210.2021.9548305},
  timestamp    = {Tue, 19 Dec 2023 17:53:48 +0100},
  biburl       = {https://dblp.org/rec/conf/biosig/TamiyaIMOO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/SatoO21,
  author       = {Kaichi Sato and
                  Satoshi Obana},
  title        = {Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic
                  Authentication Function},
  booktitle    = {Ninth International Symposium on Computing and Networking, {CANDAR}
                  2021 - Workshops, Matsue, Japan, 23-26 November 2021},
  pages        = {372--378},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/CANDARW53999.2021.00069},
  doi          = {10.1109/CANDARW53999.2021.00069},
  timestamp    = {Fri, 18 Feb 2022 10:36:44 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/SatoO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/UemuraO21,
  author       = {Kaito Uemura and
                  Satoshi Obana},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Exposure Resilient Public-key Encryption with Keyword Search against
                  Keyword Guessing Attack},
  booktitle    = {Proceedings of the 18th International Conference on Security and Cryptography,
                  {SECRYPT} 2021, July 6-8, 2021},
  pages        = {692--697},
  publisher    = {{SCITEPRESS}},
  year         = {2021},
  url          = {https://doi.org/10.5220/0010548006920697},
  doi          = {10.5220/0010548006920697},
  timestamp    = {Tue, 06 Jun 2023 14:58:01 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/UemuraO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/ObanaY20,
  author       = {Satoshi Obana and
                  Maki Yoshida},
  editor       = {Pierangela Samarati and
                  Sabrina De Capitani di Vimercati and
                  Mohammad S. Obaidat and
                  Jalel Ben{-}Othman},
  title        = {Efficient Constructions of Non-interactive Secure Multiparty Computation
                  from Pairwise Independent Hashing},
  booktitle    = {Proceedings of the 17th International Joint Conference on e-Business
                  and Telecommunications, {ICETE} 2020 - Volume 2: SECRYPT, Lieusaint,
                  Paris, France, July 8-10, 2020},
  pages        = {322--329},
  publisher    = {ScitePress},
  year         = {2020},
  url          = {https://doi.org/10.5220/0009819203220329},
  doi          = {10.5220/0009819203220329},
  timestamp    = {Wed, 29 Jul 2020 16:57:35 +0200},
  biburl       = {https://dblp.org/rec/conf/icete/ObanaY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/YoshidaO20,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {Compact Verifiably Multiplicative Secret Sharing},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {437--441},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366146},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/YoshidaO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/YoshidaO19,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {Verifiably Multiplicative Secret Sharing},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {65},
  number       = {5},
  pages        = {3233--3245},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIT.2018.2886262},
  doi          = {10.1109/TIT.2018.2886262},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/YoshidaO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HigoINOOT19,
  author       = {Haruna Higo and
                  Toshiyuki Isshiki and
                  Masahiro Nara and
                  Satoshi Obana and
                  Toshihiko Okamura and
                  Hiroto Tamiya},
  editor       = {Andrea Saracino and
                  Paolo Mori},
  title        = {Security Requirements for Store-on-Client and Verify-on-Server Secure
                  Biometric Authentication},
  booktitle    = {Emerging Technologies for Authorization and Authentication - Second
                  International Workshop, {ETAA} 2019, Luxembourg City, Luxembourg,
                  September 27, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11967},
  pages        = {86--103},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-39749-4\_6},
  doi          = {10.1007/978-3-030-39749-4\_6},
  timestamp    = {Wed, 29 Jan 2020 13:02:14 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/HigoINOOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/AgematsuO19,
  author       = {Tomoki Agematsu and
                  Satoshi Obana},
  title        = {Almost Optimal Cheating-Detectable (2, 2, n) Ramp Secret Sharing Scheme},
  booktitle    = {2019 Seventh International Symposium on Computing and Networking,
                  {CANDAR} 2019, Nagasaki, Japan, November 25-28, 2019},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CANDAR.2019.00009},
  doi          = {10.1109/CANDAR.2019.00009},
  timestamp    = {Mon, 20 Jan 2020 17:19:29 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/AgematsuO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/YoshidaO18,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {On the (in)efficiency of non-interactive secure multiparty computation},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {8},
  pages        = {1793--1805},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0424-7},
  doi          = {10.1007/S10623-017-0424-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/YoshidaO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HigoIMO18,
  author       = {Haruna Higo and
                  Toshiyuki Isshiki and
                  Kengo Mori and
                  Satoshi Obana},
  title        = {Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing
                  Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {138--148},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.138},
  doi          = {10.1587/TRANSFUN.E101.A.138},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HigoIMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/AgematsuO18,
  author       = {Tomoki Agematsu and
                  Satoshi Obana},
  title        = {How to Realize Highly Accurate Computation with Fully Homomorphic
                  Encryption},
  booktitle    = {Sixth International Symposium on Computing and Networking, {CANDAR}
                  Workshops 2018, Takayama, Japan, November 27-30, 2018},
  pages        = {391--397},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CANDARW.2018.00079},
  doi          = {10.1109/CANDARW.2018.00079},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/AgematsuO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/MiyanoO18,
  author       = {Motoki Miyano and
                  Satoshi Obana},
  title        = {Updatable Searchable Symmetric Encryption with Fine-Grained Delete
                  Functionality},
  booktitle    = {Sixth International Symposium on Computing and Networking, {CANDAR}
                  Workshops 2018, Takayama, Japan, November 27-30, 2018},
  pages        = {438--444},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/CANDARW.2018.00086},
  doi          = {10.1109/CANDARW.2018.00086},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/MiyanoO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshidaO18,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {Flaws in a Verifiably Multiplicative Secret Sharing Scheme from {ICITS}
                  2017},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {83},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/083},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshidaO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/YoshidaO17,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  editor       = {Junji Shikata},
  title        = {Verifiably Multiplicative Secret Sharing},
  booktitle    = {Information Theoretic Security - 10th International Conference, {ICITS}
                  2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10681},
  pages        = {73--82},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72089-0\_5},
  doi          = {10.1007/978-3-319-72089-0\_5},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/YoshidaO17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2017,
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0},
  doi          = {10.1007/978-3-319-64200-0},
  isbn         = {978-3-319-64199-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/ObanaY16,
  author       = {Satoshi Obana and
                  Maki Yoshida},
  editor       = {Sara Foresti and
                  Giuseppe Persiano},
  title        = {An Efficient Construction of Non-Interactive Secure Multiparty Computation},
  booktitle    = {Cryptology and Network Security - 15th International Conference, {CANS}
                  2016, Milan, Italy, November 14-16, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10052},
  pages        = {604--614},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-48965-0\_39},
  doi          = {10.1007/978-3-319-48965-0\_39},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/ObanaY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/AraiO16,
  author       = {Takahiro Arai and
                  Satoshi Obana},
  title        = {A Password-Protected Secret Sharing Based on Kurosawa-Desmedt Hybrid
                  Encryption},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {597--603},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0108},
  doi          = {10.1109/CANDAR.2016.0108},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/AraiO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/HoshinoO16,
  author       = {Hidetaka Hoshino and
                  Satoshi Obana},
  title        = {Cheating Detectable Secret Sharing Scheme Suitable for Implementation},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {623--628},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0112},
  doi          = {10.1109/CANDAR.2016.0112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/HoshinoO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/AdhikariMORSX16,
  author       = {Avishek Adhikari and
                  Kirill Morozov and
                  Satoshi Obana and
                  Partha Sarathi Roy and
                  Kouichi Sakurai and
                  Rui Xu},
  editor       = {Anderson C. A. Nascimento and
                  Paulo S. L. M. Barreto},
  title        = {Efficient Threshold Secret Sharing Schemes Secure Against Rushing
                  Cheaters},
  booktitle    = {Information Theoretic Security - 9th International Conference, {ICITS}
                  2016, Tacoma, WA, USA, August 9-12, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10015},
  pages        = {3--23},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49175-2\_1},
  doi          = {10.1007/978-3-319-49175-2\_1},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/AdhikariMORSX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/NozoeO16,
  author       = {Shunta Nozoe and
                  Satoshi Obana},
  title        = {Searchable symmetric encryption supporting update},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {713--717},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840518/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/NozoeO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YoshidaO15,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {On the (In)Efficiency of Non-Interactive Secure Multiparty Computation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {185--193},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_12},
  doi          = {10.1007/978-3-319-30840-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YoshidaO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HoshinoO15,
  author       = {Hidetaka Hoshino and
                  Satoshi Obana},
  editor       = {Keisuke Tanaka and
                  Yuji Suga},
  title        = {Almost Optimum Secret Sharing Schemes with Cheating Detection for
                  Random Bit Strings},
  booktitle    = {Advances in Information and Computer Security - 10th International
                  Workshop on Security, {IWSEC} 2015, Nara, Japan, August 26-28, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9241},
  pages        = {213--222},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22425-1\_13},
  doi          = {10.1007/978-3-319-22425-1\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HoshinoO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HigoIMO15,
  author       = {Haruna Higo and
                  Toshiyuki Isshiki and
                  Kengo Mori and
                  Satoshi Obana},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing
                  Attacks},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {44--64},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_3},
  doi          = {10.1007/978-3-319-31301-6\_3},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HigoIMO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdhikariMORSX15,
  author       = {Avishek Adhikari and
                  Kirill Morozov and
                  Satoshi Obana and
                  Partha Sarathi Roy and
                  Kouichi Sakurai and
                  Rui Xu},
  title        = {Efficient Threshold Secret Sharing Schemes Secure against Rushing
                  Cheaters},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1115},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1115},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdhikariMORSX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/HayashiO14,
  author       = {Hiroki Hayashi and
                  Satoshi Obana},
  title        = {Protocols for evaluating conditional sum on encrypted data},
  booktitle    = {International Symposium on Information Theory and its Applications,
                  {ISITA} 2014, Melbourne, Australia, October 26-29, 2014},
  pages        = {148--152},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://ieeexplore.ieee.org/document/6979821/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/HayashiO14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ObanaT14,
  author       = {Satoshi Obana and
                  Kazuya Tsuchida},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary
                  Finite Field},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {88--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_7},
  doi          = {10.1007/978-3-319-09843-2\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ObanaT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/biosig/IsshikiAMOOS13,
  author       = {Toshiyuki Isshiki and
                  Toshinori Araki and
                  Kengo Mori and
                  Satoshi Obana and
                  Tetsushi Ohki and
                  Shizuo Sakamoto},
  editor       = {Arslan Br{\"{o}}mme and
                  Christoph Busch},
  title        = {New Security Definitions for Biometric Authentication with Template
                  Protection: Toward covering more threats against authentication systems},
  booktitle    = {2013 {BIOSIG} - Proceedings of the 12th International Conference of
                  Biometrics Special Interest Group, Darmstadt, Germany, September 4-6,
                  2013},
  series       = {{LNI}},
  volume       = {{P-212}},
  pages        = {171--184},
  publisher    = {{GI}},
  year         = {2013},
  url          = {https://dl.gi.de/handle/20.500.12116/17666},
  timestamp    = {Tue, 04 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/biosig/IsshikiAMOOS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshidaO13,
  author       = {Maki Yoshida and
                  Satoshi Obana},
  title        = {Detection of Cheaters in Non-interactive Polynomial Evaluation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshidaO13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Obana11,
  author       = {Satoshi Obana},
  editor       = {Kenneth G. Paterson},
  title        = {Almost Optimum \emph{t}-Cheater Identifiable Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2011 - 30th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tallinn, Estonia, May 15-19, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6632},
  pages        = {284--302},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20465-4\_17},
  doi          = {10.1007/978-3-642-20465-4\_17},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Obana11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/MoriokaIONS11,
  author       = {Sumio Morioka and
                  Toshiyuki Isshiki and
                  Satoshi Obana and
                  Yuichi Nakamura and
                  Kazue Sako},
  title        = {Flexible architecture optimization and {ASIC} implementation of group
                  signature algorithm using a customized {HLS} methodology},
  booktitle    = {{HOST} 2011, Proceedings of the 2011 {IEEE} International Symposium
                  on Hardware-Oriented Security and Trust (HOST), 5-6 June 2011, San
                  Diego, California, {USA}},
  pages        = {57--62},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/HST.2011.5954996},
  doi          = {10.1109/HST.2011.5954996},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/MoriokaIONS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/FurukawaSO09,
  author       = {Jun Furukawa and
                  Kazue Sako and
                  Satoshi Obana},
  editor       = {Elisa Bertino and
                  Thomas Gro{\ss} and
                  Kenji Takahashi},
  title        = {{IC} card-based single sign-on system that remains secure under card
                  analysis},
  booktitle    = {Proceedings of the 5th Workshop on Digital Identity Management, Chicago,
                  Illinois, USA, November 13, 2009},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655028.1655043},
  doi          = {10.1145/1655028.1655043},
  timestamp    = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/dim/FurukawaSO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ArakiO07,
  author       = {Toshinori Araki and
                  Satoshi Obana},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Flaws in Some Secret Sharing Schemes Against Cheating},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {122--132},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_10},
  doi          = {10.1007/978-3-540-73458-1\_10},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ArakiO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/ObanaA06,
  author       = {Satoshi Obana and
                  Toshinori Araki},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Almost Optimum Secret Sharing Schemes Secure Against Cheating for
                  Arbitrary Secret Distribution},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {364--379},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_24},
  doi          = {10.1007/11935230\_24},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/ObanaA06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/MalkinOY04,
  author       = {Tal Malkin and
                  Satoshi Obana and
                  Moti Yung},
  editor       = {Christian Cachin and
                  Jan Camenisch},
  title        = {The Hierarchy of Key Evolving Signatures and a Characterization of
                  Proxy Signatures},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Interlaken,
                  Switzerland, May 2-6, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3027},
  pages        = {306--322},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24676-3\_19},
  doi          = {10.1007/978-3-540-24676-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/MalkinOY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MalkinOY04,
  author       = {Tal Malkin and
                  Satoshi Obana and
                  Moti Yung},
  title        = {The Hierarchy of Key Evolving Signatures and a Characterization of
                  Proxy Signatures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {52},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/052},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MalkinOY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/FurukawaMMOS02,
  author       = {Jun Furukawa and
                  Hiroshi Miyauchi and
                  Kengo Mori and
                  Satoshi Obana and
                  Kazue Sako},
  editor       = {Matt Blaze},
  title        = {An Implementation of a Universally Verifiable Electronic Voting Scheme
                  based on Shuffling},
  booktitle    = {Financial Cryptography, 6th International Conference, {FC} 2002, Southampton,
                  Bermuda, March 11-14, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2357},
  pages        = {16--30},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36504-4\_2},
  doi          = {10.1007/3-540-36504-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/FurukawaMMOS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ObanaK01,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  title        = {Bounds and Combinatorial Structure of Multi-Receiver-Codes},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {1},
  pages        = {47--63},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ObanaK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/KurosawaO01,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana},
  title        = {Combinatorial Bounds on Authentication Codes with Arbitration},
  journal      = {Des. Codes Cryptogr.},
  volume       = {22},
  number       = {3},
  pages        = {265--281},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/KurosawaO01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/ObanaK00,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  title        = {Combinatorial Classification of Optimal Authentication Codes with
                  Arbitration},
  journal      = {Des. Codes Cryptogr.},
  volume       = {20},
  number       = {3},
  pages        = {281--305},
  year         = {2000},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/ObanaK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaO97,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Characterisation of (k, n) Multi-receiver Authentication},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {204--215},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027927},
  doi          = {10.1007/BFB0027927},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaO97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/ObanaK97,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  editor       = {Yongfei Han and
                  Tatsuaki Okamoto and
                  Sihan Qing},
  title        = {A\({}^{\mbox{2}}\)-code = Affine resolvable = {BIBD}},
  booktitle    = {Information and Communication Security, First International Conference,
                  ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1334},
  pages        = {118--129},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0028468},
  doi          = {10.1007/BFB0028468},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/ObanaK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/ObanaK96,
  author       = {Satoshi Obana and
                  Kaoru Kurosawa},
  title        = {Veto is Impossible in Secret Sharing Schemes},
  journal      = {Inf. Process. Lett.},
  volume       = {58},
  number       = {6},
  pages        = {293--295},
  year         = {1996},
  url          = {https://doi.org/10.1016/0020-0190(96)00052-X},
  doi          = {10.1016/0020-0190(96)00052-X},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/ObanaK96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/KurosawaOO95,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana and
                  Wakaha Ogata},
  editor       = {Don Coppersmith},
  title        = {t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes},
  booktitle    = {Advances in Cryptology - {CRYPTO} '95, 15th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {963},
  pages        = {410--423},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-44750-4\_33},
  doi          = {10.1007/3-540-44750-4\_33},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/KurosawaOO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KurosawaO95,
  author       = {Kaoru Kurosawa and
                  Satoshi Obana},
  editor       = {Louis C. Guillou and
                  Jean{-}Jacques Quisquater},
  title        = {Combinatorial Bounds for Authentication Codes with Arbitration},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
                  on the Theory and Application of Cryptographic Techniques, Saint-Malo,
                  France, May 21-25, 1995, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {921},
  pages        = {289--300},
  publisher    = {Springer},
  year         = {1995},
  url          = {https://doi.org/10.1007/3-540-49264-X\_23},
  doi          = {10.1007/3-540-49264-X\_23},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KurosawaO95.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics