​
Login / Signup
Satsuya Ohata
Publication Activity (10 Years)
Years Active: 2014-2022
Publications (10 Years): 19
Top Topics
Scalar Product
Public Key Encryption
Ciphertext
Secure Multiparty Computation
Top Venues
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
IACR Cryptol. ePrint Arch.
ISITA
TrustCom/BigDataSE
</>
Publications
</>
Keitaro Hiwatashi
,
Satsuya Ohata
,
Koji Nuida
An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(3) (2022)
Yoshiki Nakagawa
,
Satsuya Ohata
,
Kana Shimizu
Efficient privacy-preserving variable-length substring match for genome sequence.
Algorithms Mol. Biol.
17 (1) (2022)
Keitaro Hiwatashi
,
Ken Ogura
,
Satsuya Ohata
,
Koji Nuida
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks.
AsiaCCS
(2021)
Yoshiki Nakagawa
,
Satsuya Ohata
,
Kana Shimizu
Efficient Privacy-Preserving Variable-Length Substring Match for Genome Sequence.
WABI
(2021)
Hiraku Morita
,
Nuttapong Attrapadung
,
Tadanori Teruya
,
Satsuya Ohata
,
Koji Nuida
,
Goichiro Hanaoka
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(1) (2020)
Keitaro Hiwatashi
,
Satsuya Ohata
,
Koji Nuida
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks.
ACNS (1)
(2020)
Satsuya Ohata
Recent Advances in Practical Secure Multi-Party Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(10) (2020)
Satsuya Ohata
,
Koji Nuida
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.
Financial Cryptography
(2020)
Yuya Senzaki
,
Satsuya Ohata
,
Kanta Matsuura
Simple Black-Box Adversarial Examples Generation with Very Few Queries.
IEICE Trans. Inf. Syst.
(2) (2020)
Koji Nuida
,
Satsuya Ohata
,
Shigeo Mitsunari
,
Nuttapong Attrapadung
Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts.
IACR Cryptol. ePrint Arch.
2019 (2019)
Satsuya Ohata
,
Koji Nuida
Towards High-Throughput Secure MPC over the Internet: Communication-Efficient Two-Party Protocols and Its Application.
CoRR
(2019)
Hiraku Morita
,
Nuttapong Attrapadung
,
Tadanori Teruya
,
Satsuya Ohata
,
Koji Nuida
,
Goichiro Hanaoka
Constant-Round Client-Aided Secure Comparison Protocol.
ESORICS (2)
(2018)
Satsuya Ohata
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
More Constructions of Re-Splittable Threshold Public Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci.
(9) (2018)
Satsuya Ohata
,
Takahiro Matsuda
,
Kanta Matsuura
Provably Secure Password Reset Protocol: Model, Definition, and Construction.
TrustCom/BigDataSE
(2018)
Hiraku Morita
,
Nuttapong Attrapadung
,
Satsuya Ohata
,
Shota Yamada
,
Koji Nuida
,
Goichiro Hanaoka
Tree-based Secure Comparison of Secret Shared Data.
ISITA
(2018)
Satsuya Ohata
,
Hiraku Morita
,
Goichiro Hanaoka
Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol.
ISITA
(2018)
Hiraku Morita
,
Nuttapong Attrapadung
,
Satsuya Ohata
,
Koji Nuida
,
Shota Yamada
,
Kana Shimizu
,
Goichiro Hanaoka
,
Kiyoshi Asai
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
ISITA
(2018)
Satsuya Ohata
,
Kanta Matsuura
Proxy re-encryption via indistinguishability obfuscation.
Secur. Commun. Networks
9 (12) (2016)
Satsuya Ohata
,
Takahiro Matsuda
,
Kanta Matsuura
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction.
IACR Cryptol. ePrint Arch.
2016 (2016)
Satsuya Ohata
,
Yutaka Kawai
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
Re-Encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-Encryption.
CT-RSA
(2015)
Satsuya Ohata
,
Yutaka Kawai
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.
IACR Cryptol. ePrint Arch.
2015 (2015)
Satsuya Ohata
,
Takahiro Matsuda
,
Goichiro Hanaoka
,
Kanta Matsuura
More Constructions of Re-splittable Threshold Public Key Encryption.
IWSEC
(2014)