"Kota Takahashi,Keitaro Hashimoto,Wakaha Ogata","Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext",,"Designs, Codes and Cryptography","Springer Nature",,,,2023,Oct. "Atsunori Ichikawa,Wakaha Ogata","Perfectly Secure Oblivious Priority Queue",,"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","The Institute of Electronics, Information and Communication Engineer","Vol. E106-A","Issue 3","pp. 272-280",2023,Mar. "尾形わかは,冨田斗威,高橋健太,西垣正勝","暗号のための脳機能拡張:信用できる計算機が不要な署名方式の提案(その2)","2023年 暗号と情報セキュリティシンポジウム",,,,,,2023,Jan. "松井航輝,尾形わかは","IoT ゲートウェイと複数アプリケーション間の暗号化方式の考察","2023年 暗号と情報セキュリティシンポジウム",,,,,,2023,Jan. "高橋洸太,尾形わかは","符号ベース暗号に対する分散復号方式","2023年 暗号と情報セキュリティシンポジウム",,,,,,2023,Jan. "Toi Tomita,Wakaha Ogata,Kaoru Kurosawa","Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK",,"IEICE Trans. on Fundamentals",,"Vol. Vol.E105-A","No. 3",,2022,Mar. "Yoshifumi Saito,Wakaha Ogata","Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service",,"IEICE Trans. on Fundamentals",,"Vol. E105-A","No. 3",,2022,Mar. "齋藤 拓巳,岡 響,中橋 彬,尾形 わかは","プライバシを保護したRNNによる非対話型文書分類","2022年暗号と情報セキュリティシンポジウム",,,,,,2022,Jan. "松本彩花,尾形わかは,高橋健太,西垣正勝","暗号のための脳機能拡張:信用ができる計算機が不要な署名方式の提案","2022年暗号と情報セキュリティシンポジウム",,,,,,2022,Jan. "兵頭昇虎,尾形 わかは","信頼度を用いた実用的なProof of Personhoodプロトコルの構築","2022年暗号と情報セキュリティシンポジウム",,,,,,2022,Jan. "福成理紀,尾形わかは","真に簡潔なOblivious RAMプロトコルの提案","暗号と情報セキュリティシンポジウム SCIS2021",,,,,,2021,Jan. "齋藤吉史,尾形わかは","信頼できないサーバによる決定木評価の委託計算方式","暗号と情報セキュリティシンポジウム SCIS2021",,,,,,2021,Jan. "Toi Tomita,Wakaha Ogata,Kaoru Kurosawa,Ryo Kuwayama","CCA-Secure Leakege-Resilient Identity-Based Encryption without q-Type Assumptions",,"IEICE Trans. on Fundamentals",,"Vol. E103-A","No. 10","pp. 1157--1166",2020,Oct. "Wakaha Ogata,Takaaki Otemori","Security analysis of secure kNN and ranked keyword search over encrypted data",,"International Journal of Information Security",,"Vol. 19","Issue 4","pp. 419-425",2020,Aug. "Koki Mukaihira,Yasuyoshi Jinno,Takashi Tsuchiya,Tetsushi Ohki,Kenta Takahashi,Wakaha Ogata,Masakatsu Nishigaki","Communication Protocol between Humans and Bank Server Secure against Man-in-the-Browser Attacks","Intelligent Human Systems Integration 2020","Proceedings of the 3rd International Conference on Intelligent Human Systems Integration (IHSI 2020)",,,,"pp. 503-509",2020,Jan. "角田理尚,尾形わかは,高橋健太,西垣正勝","Universal samplerを用いないProof of Human-workの構成とその応用に関する研究","暗号と情報セキュリティシンポジウムSCIS2020","暗号と情報セキュリティシンポジウム予稿集",,,,,2020,Jan. "冨田斗威,尾形わかは,黒澤馨","選択暗号文攻撃に対してoptimally leakage-resilientなIDベース暗号","暗号と情報セキュリティシンポジウムSCIS2020","暗号と情報セキュリティシンポジウム予稿集",,,,,2020,Jan. "橋本啓太郎,尾形わかは,冨田斗威","Certificateless signatureの一般的構成に対するタイトな帰着とDDH仮定に基づく構成","暗号と情報セキュリティシンポジウムSCIS2020","暗号と情報セキュリティシンポジウム予稿集",,,,,2020,Jan. "Toi Tomita,Wakaha Ogata,Kaoru Kurosawa","CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions","IWSEC 2019",,,,,,2019,Aug. "Dan Yamamoto,Wakaha Ogata","Multidivisible Online/Offline Cryptography and Its Application to Signcryptions",,"Security and Communication Networks",,,,,2019,Aug. "Atsunori Ichikawa,Wakaha Ogata,Koki Hamada,Ryo Kikuchi","Efficient Secure Multi-Party Protocols for Decision Tree Classification","ACISP2019",,,,,,2019,July "Keitaro Hashimoto,Wakaha Ogata","Unrestricted and compact certificateless aggregate signature scheme",,"Information Sciences",,"Volume 487",,"pp. 97-114",2019,June "齋藤吉史,尾形わかは","Support Vector Machine を用いたプライバシー保護型データ分類方式の改良","暗号と情報セキュリティシンポジウムSCIS2019","暗号と情報セキュリティシンポジウム予稿集",,,,,2019,Jan. "Wakaha Ogata,Kaoru Kurosawa","No-Dictionary Searchable Symmetric Encryption",,"IEICE Trans. on Fundamentals",,"Vol. E102-A","No. 1","pp. 144-124",2019,Jan. "冨田斗威,尾形わかは,黒澤馨","標準的な仮定のもとでleakage resilient かつCCA安全なIDベースKEM","暗号と情報セキュリティシンポジウムSCIS2019","暗号と情報セキュリティシンポジウム予稿集",,,,,2019,Jan. "神農泰圭,土屋貴史,大木哲史,高橋健太,尾形わかは,西垣正勝","計算機援用セキュリティスキームの一般的構成法",,"情報処理学会論文誌",,"Vol. 59",,"pp. 1557-1569",2018,Sept. "向平浩貴,神農泰圭,土屋貴史,大木哲史,高橋健太,尾形わかは,西垣正勝","Man In The Browser 攻撃対策を実現する人間・銀行サーバ間のセキュア通信プロトコル(その3)","夏のセキュリティワークショップ2018 in 札幌",,,,,,2018,July "小手森崇顕,尾形わかは","内積を用いたランク付きマルチキーワード検索可能暗号の安全性に関する研究","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "中村早織,尾形わかは","Random Decision Tree を使ったよりプライバシーに配慮したプライバシー保護型データマイニング","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "森田晃平,尾形わかは","UOV のOnline/Offline化の研究","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "野村大樹,尾形わかは","階層型ID ベースプロキシ再暗号化方式の提案","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "橋本啓太郎,尾形わかは","Certificateless Aggregate Signature Schemeの構成法と安全性に関する研究","2018年暗号と情報セキュリティシンポジウム",,,,,,2018,Jan. "Yasuyoshi Jinno,Takashi Tsuchiya,Tetsushi Ohki,Kenta Takahashi,Wakaha Ogata,Masakatsu Nishigaki","A Study on Construction and Security of Computer-Aided Security Schemes","4th Annual Conference on Computational Science and Computational Intelligence (CSCI2017)","Proceedings of 4th Annual Conference on Computational Science and Computational Intelligence","Springer",,,"pp. 31-36",2017,Dec. "Ryo Kikuchi,Dai Ikarashi,Koji Chida,Koki Hamada,Wakaha Ogata","Computational Secret Sharing and Conversion Protocols in Both Active and Passive Settings",,"IET Information Security",,"Vol. 11","No. 5","pp. 287-293",2017,July "Wakaha Ogata,Kaoru Kurosawa","Efficient no-dictionary verifiable searchable symmetric encryption","Finantial Cryptology","Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","Springer","Vol. 10322 LNCS",,"pp. 498-516",2017,Apr. "土屋貴史,神農泰圭,藤田真浩,高橋健太,尾形わかは,西垣正勝","Man In The Browser攻撃対策を実現する人間・銀行サーバのセキュア通信プロトコル(その2)","情報処理学会 第76回CSEC研究発表会",,,,,,2017,Mar. "竹谷駿佑,尾形わかは","Unidirectionalな検索可能代理人再暗号化方式の構築","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2017,Jan. "市川敦謙,尾形わかは","Oblivious RAMを用いた効率的な決定木のマルチパーティ計算","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2017,Jan. "Wakaha Ogata,Toshinori Araki","Computationally secure verifiable secret sharing scheme for distributing many secrets",,"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",,"Vol. E100A","No. 1","pp. 103-114",2017,Jan. "Dan Yamamoto,Wakaha Ogata","Multi-divisible on-line/off-line encryptions",,"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",,"Vol. E100A","No. 1","pp. 91-102",2017,Jan. "Fujiwara, M.,Waseda, A.,Nojima, R.,Moriai, S.,Wakaha Ogata,Sasaki, M.","3-2 information theoretically secure distributed storage with QKD and password-authenticated secret sharing",,"Journal of the National Institute of Information and Communications Technology",,"Vol. 64","No. 1","pp. 23-29",2017, "神農泰圭,兼子拓弥,高橋健太,尾形わかは,西垣正勝","計算機援用セキュリティシスムの構成方法と安全性に関する一考察","コンピュータセキュリティシンポジウム(CSS2016)",,,,,,2016,Oct. "Shunsuke Taketani,Wakaha Ogata","Improvement of UC Secure SearchableSymmetric Encryption Scheme","the 10th International Workshop on Security, IWSEC 2015","Advances in Information and Computer Security, the 10th International Workshop on Security, IWSEC 2015, LNCS","Springer","Vol. 9241",,"pp. 135--152",2016,Aug. "Mikio Fujiwara,Aatsushi Waseda,Ryo Nojima,Shiho Moriai,Wakaha Ogata,Masahide Sasaki","Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing",,"Scientific Reports",,,,,2016,June "尾形わかは","様々なプロキシ再暗号化方式を統合するフレームワーク","暗号と情報セキュリティシンポジウム",,,,,,2016,Jan. "市川敦謙,菊池亮,尾形わかは","決定木の秘密計算における効率比較と事前計算を用いた効率化","暗号と情報セキュリティシンポジウム",,,,,,2016,Jan. "神農泰圭,兼子拓弥,高橋健太,尾形わかは,西垣正勝","計算機援用計算量理論的安全性の定式化に関する一検討","暗号と情報セキュリティシンポジウム",,,,,,2016,Jan. "中川 峻,尾形わかは","Proxy Re-Signcryptionの安全性と構成に関する研究","暗号と情報セキュリティシンポジウム",,,,,,2016,Jan. "平野千歩,尾形わかは","誤検知回避機能付きユーザ間通信型不正コピー検知システムに関する研究","暗号と情報セキュリティシンポジウム",,,,,,2016,Jan. "市川敦謙,尾形わかは","能動的な不正に対して安全な不正検出可能パスワード付秘密分散法","電子情報通信学会ISEC研究会","電子情報通信学会技術研究報告","電子情報通信学会","Vol. 115","No. 28","pp. 23--30",2015,May "Nguyen Quoc Viet,Wakaha Ogata","Certificateless Aggregate Signature Schemes with Improved Security",,"IEICE Trans. on Fundamentals",,"Vol. E98-A","No. 1","pp. 92-99",2015,Jan. "Ryo KIKUCHI,Koji CHIDA,Dai IKARASHI,Wakaha OGATA,Koki HAMADA,Katsumi TAKAHASHI","Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation",,"IEICE Trans. on Fundamentals",,"Vol. E98-A","No. 1","pp. 213-222",2015,Jan. "尾形わかは,金岡晃,松尾真一郎","実用的な多機能検索可能暗号方式 ?身も蓋もない方式を考えてみた?","暗号と情報セキュリティシンポジウム",,,,,,2015, "ユ サンウォン,尾形わかは","複数キーワードによるランク付き検索可能暗号の改善","暗号と情報セキュリティシンポジウム",,,,,,2015, "高橋一馬,尾形わかは","Shamir のしきい値法におけるCold-Boot Attack による秘密の復元の効率化","暗号と情報セキュリティシンポジウム",,,,,,2015, "Wakaha Ogata,Hiroshi Eguchi","Cheating Detectable Threshold Scheme against Most Powerful Cheaters for Long Secrets",,"Designs, Codes and Cryptography",,"Vol. 71","No. 3","pp. 527-539",2014,Mar. "岩波純也,尾形わかは","高い安全性と効率を持つDynamic SSE の構築","2014年 暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "吉岡奈瑠美,尾形わかは","能動的な不正に対して安全な効率的なパスワード付秘密分散法","2014年 暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "早稲田篤志,尾形わかは,野島良,盛合志帆","Active な攻撃者に対して情報理論的秘匿性を持つパスワード認証機能付き秘密分散法",,"暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "Le Dang Khoa,Wakaha Ogata","A Study on Identification Scheme Based on Subset Sum Problem","2014年 暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "Wakaha Ogata,Toshinori Araki","Cheating Detectable Secret Sharing Schemes for Random Bit Strings",,"IEICE Trans. on Fundamentals",,"Vol. E96-A","No. 11","pp. 2230-2234",2013,Nov. "Wakaha Ogata,Keita Koiwa,Akira Kanaoka,Shin'ichiro Matsuo","Toward Practical Searchable Symmetric Encryption","the 8th International Workshop on Security (IWSEC 2013)","Lecture notes in computer science, LNCS",,"Vol. 8231",,"pp. 151-167",2013,Nov. "尾形わかは","TK-7-2 暗号技術の現在と未来(TK-7.ICT技術が開く未来〜女性研究者の視点から〜,大会委員会企画)",,"電子情報通信学会総合大会講演論文集","一般社団法人電子情報通信学会","Vol. 2013",,"pp. "SSS-64"-"SSS-65"",2013,Mar. "NGUYEN QUOC VIET,Wakaha Ogata","Two New Schemes of Certificateless Aggregate Signature with Improvement of Security","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "岩波 純也,尾形わかは","ドキュメント追加後も安全で効率的な検索可能暗号","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "北原 昂,尾形わかは","検索結果を秘匿する検索可能暗号方式","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "尾形わかは","情報理論的に安全なパスワード付秘密分散法の安全性と効率化","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "山本敬史,尾形わかは","Shamirのしきい値法における部分的なシェアからの秘密の復元","第35回情報理論とその応用シンポジウム予稿集(CD-ROM),SITA2012",,,,,,2012,Dec. "西垣正勝,渡邊幸聖,小田雅洋,米山裕太,山本匠,高橋健太,尾形わかは,菊池浩明","曖昧性を含んだ多項式による特徴量関数の秘匿評価を利用したテンプレート保護型生体認証",,"情報処理学会論文誌",,"Vol. 53","No. 9","pp. 2254-2266",2012,Sept. "柿沼匡志,尾形わかは","ランダム鍵ビットを用いたPKCS#1に基づくRSA暗号の秘密鍵の復元","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","Undeniable and Unpretendable Signatures",,"IEICE Trans. on Fundamentals",,"Vol. E95-A","No. 1","pp. 138-150",2012,Jan. "尾形わかは","多数の秘密の分散に適する計算量理論的検証可能秘密分散共有法","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "北原昂,尾形わかは","効率的な暗号化されたまま行われる生体認証プロトコル","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "江口宏,尾形わかは","n-1人の不正者に対して安全なより効率の良い(k,n)閾値法","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "大庭達海,尾形わかは","秘密の持ち逃げを不可能とする秘密分散共有法","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Toshinori Araki,Wakaha Ogata","A Simple and Efficient Secret Sharing Scheme Secure against Cheating",,"IEICE Trans. on Fundamentals",,"Vol. E94-A","No. 6","pp. 1338--1345",2011,June "小田雅洋,渡邊幸聖,山本匠,高橋健太,尾形わかは,菊池浩明,西垣正勝","Fuzzy Vault Schemeにおけるチャフ空間拡大に関する検討","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Tatsumi Oba,Wakaha Ogata","Provably Secure On-line Secret Sharing Scheme",,"IEICE Trans. on Fundamentals",,"Vol. E94-A","No. 1","pp. 139-149",2011,Jan. "尾形わかは,松尾真一郎,金岡晃","Searchable symmetrc encryptionはどこまで安全にすべきか?","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "柿沼匡志,菊池亮,尾形わかは","否認不可署名のinvisibilityとanonymityの関係性に関する再考","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "尾形わかは,荒木俊則","ビット列に対する不正検出可能しきい値法","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "荒木俊則,尾形わかは","シンプルで効率的な不正検出可能しきい値法","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "佐瀬大治郎,尾形わかは,菊池浩明,西垣正勝","ゼロ知識性が証明可能なリモート生体認証方式","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "渡邊幸聖,小田雅洋,山本匠,高橋健太,尾形わかは,菊池浩明,西垣正勝","曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証:その改良と安全性証明","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Ryou Kikuchi,Le Trieu Phong,Wakaha Ogata","A Framework for Constructing Convertible Undeniable Signatures","The Fourth International Conference on Provable Security (ProvSec 2010)","Proc. of ProvSec 2010",,,,,2010,Oct. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","Provably Secure Convertible Undeniable Signatures with Unambiguity","Seventh Conference on Security and Cryptography for Networks","Proc. of 7th International Conference, SCN 2010, LNCS Vol. 6280",,,,"pp. 291-308",2010,Sept. "菊池亮,尾形わかは","変換可能否認不可署名の一般的構成法","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2010,Jan. "大川戸惇,尾形わかは","SubsetDifference法におけるstorage sizeの削減に関する考察","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2010,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","Provably Secure Convertible Undeniable Signatures with Unambiguity","the 2010 Simposium on Cryptography and Information Security","Proceedings of the 2010 Simposium on Cryptography and Information Security",,,,,2010,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","New RSA-Based (Selectively) Convertible Undeniable Signature Schemes",,"IEICE Trans. on Fundamentals",,"Vol. E93-A","No. 1","pp. 63-75",2010,Jan. "渡邉幸聖,小田雅洋,山本匠,尾形わかは,菊池浩明,西垣正勝","曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2010,Jan. "Toshinori Araki,Wakaha Ogata","Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels",,"IEICE Trans. on Fundamentals",,"Vol. E93-A","No. 1","pp. 126-135",2010,Jan. "大庭達海,尾形わかは","証明可能安全性を持つオンライン秘密分散方式","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2010,Jan. "Kikuchi, H.,Nagai, K.,Wakaha Ogata,Nishigaki, M.","Privacy-preserving similarity evaluation and application to remote biometrics authentication",,"Soft Computing",,"Vol. 14","No. 5","pp. 529-536",2010, "Taiki Sakashita,Yoichi Shibata,Takumi Yamamoto,Kenta Takahashi,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","A Proposal of Efficient Remote Biometric Authentication Protocol",,"Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009, LNCS",,"Vol. 5824",,"pp. 212-227",2009,Oct. "Le Trieu Phong,Wakaha Ogata","New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model",,"IEICE Trans. on Fundamentals",,"Vol. 1822-1835","No. 8","pp. 1822-1835",2009,Aug. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","New RSA-Based (Selectively) Convertible Undeniable Signature Schemes","AfricaCrypt 2009","Progress in Cryptology -- AFRICACRYPT 2009, LNCS",,"Vol. 5580",,"pp. 1116-134",2009,June "Kouichi Itou,Dai Yamamoto,Jun Yajima,Wakaha Ogata","Collision-based Power Attack for RSA with Small Public Exponent",,"IEICE Trans. on Information",,"Vol. E92-D",,,2009,May "川口勝久,尾形わかは","属性ベース暗号とその応用","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 3C1-1",2009,Jan. "生野陽子,尾形わかは,比嘉邦彦","テレワーク導入企業における情報セキュリティの調査研究","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 4E2-2",2009,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","New RSA-Based (Selectively) Convertible Undeniable Signature Schemes","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009,3C1-1",,,," 3B4-4",2009,Jan. "赤岩 怜,尾形わかは","スタンダードモデルにおいて安全なIDベースオンライン/オフライン署名方式","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 3B3-2",2009,Jan. "菊池浩明,河野 瞬,畔上洋平,西垣正勝,尾形わかは","直交基底指紋への参照度を特徴量とした安全な生体認証プロトコル","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 2F4-3",2009,Jan. "寺西 勇,尾形わかは","Cramer-Shoup暗号の統計的PA安全性","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 2B2-2",2009,Jan. "菊池 亮,尾形わかは","KRモデルで汎用結合性を持つ検証可能な紛失通信プロトコルの提案","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 1B1-4",2009,Jan. "Kouichi Itou,Tetsuya Izu,Wakaha Ogata,Masahiko Takenaka","Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate",,"IEICE Trans. on fundamentals",,"Vol. E92-A","No. 1","pp. 67-75",2009,Jan. "Hiroaki Kikuchi,Kei Nagai,Wakaha Ogata,Masakatsu Nishigaki,Wakaha Ogata","Privacy-Preserving Similarity Evaluation and Application ot Remote Biometrics Authentication","Modeling Decisions for Artifical Intellegence","Proc. of Modeling Decisions for Artifical Intellegence",,,,,2008,Nov. "伊藤孝一,伊豆 哲也,尾形わかは,武中正彦","Bleichenbacher 攻撃と証明可能安全性との関係について","コンピュータセキュリティシンポジウム2008","コンピュータセキュリティシンポジウム2008論文集 (CSS2008)",,,,,2008,Oct. "伊藤孝一,山本 大,矢嶋 純,尾形わかは","乗算を用いた指数のランダム化対策への電力解析","コンピュータセキュリティシンポジウム2008","コンピュータセキュリティシンポジウム2008論文集 (CSS2008)",,,,,2008,Oct. "小田雅洋,尾形わかは,菊池浩明,西垣正勝","G3C-ZKIPを用いた非対称生体認証","コンピュータセキュリティシンポジウム2008","コンピュータセキュリティシンポジウム2008論文集 (CSS2008),",,,,"pp. 695-700",2008,Oct. "Isamu Teranishi,Wakaha Ogata","Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption","Sixth Conference on Security and Cryptography for Networks (SCN'08)","Proc. of Sixth Conference on Security and Cryptography for Networks (SCN'08)",,"Vol. LNCS Vol.5229",,"pp. 109-125",2008,Sept. "Isamu Teranishi,Wakaha Ogata","Relationship between Two Approaches for Defining the Standard Model PA-ness","The 13th Australasian Conference on Information Security and Privacy (ACISP'08)","Proc. of The 13th Australasian Conference on Information Security and Privacy (ACISP'08), LNCS",,"Vol. 5107",,"pp. 113-127",2008,July "生野陽子,尾形わかは,比嘉邦彦","テレワークのセキュリティ問題に対する考察","日本テレワーク学会研究発表会","日本テレワーク学会研究発表会予稿集",,,,,2008,June "阿部正己,尾形わかは","プライバシ保護を考慮したRFID方式の大規模システムへの適用",,"電子情報通信学会論文誌「基礎・境界:A」",,"Vol. J91-A","No. 3","pp. 399-410",2008,Mar. "平井康雅,松尾真一郎,尾形わかは","暗号技術危殆化に伴う再署名に関する考察",,"情報処理学会研究報告",,"Vol. 2008","No. 21","pp. 201-206",2008,Mar. "Le Trieu Phong,Hiroto Matsuoka,Wakaha Ogata","Stateful Identity-Based Encryption Scheme: FasterEncryption and Decryption","ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)","Proc. of annual ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)",,,,"pp. 381-388",2008,Mar. "Wakaha Ogata,Phong Le Trieu","Blind HIBE and its Application to Blind Decryption","The 2008 Symposium onCryptography and Information Security","SCIS2008",,,,"pp. 4D1-2",2008,Jan. "Isamu Teranishi,Takuro Oyama,Wakaha Ogata","General Conversion for Obtaining Strongly Existentially Unforgeable Signatures",,"IEICE Transaction",,"Vol. E91-A","No. 1","pp. 94-106",2008,Jan. "永井 慧,菊池浩明,尾形わかは,西垣正勝","秘密計算に適する距離の使用によるリモート生体認証","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 2B3-3",2008,Jan. "坂下泰紀,柴田陽一,高橋健太,尾形わかは,菊池浩明,西垣正勝","ZKIP とほぼ同等の安全性を有する効率的なリモート生体認証の提案","暗号と情報セキュリティシンポジウム","SCIS2008",,,,"pp. 2B3-4",2008,Jan. "Isamu Teranishi,Wakaha Ogata","Relationship between Standard Model Plaintext Awareness and Message Hiding",,"IEICE Transaction",,"vol. E91-A","No. 1","pp. 244-261",2008,Jan. "尾形わかは,菊池浩明,西垣 正勝","区間のZKIPを用いた生体認証方式の改良","第30回情報理論とその応用シンポジウム","第30回情報理論とその応用シンポジウム (SITA2007) 予稿集",,,,"pp. 689-693",2007,Nov. "Isamu Teranishi,Takuro Oyama,Wakaha Ogata","General Conversion for Obtaining Strongly Existentially Unforgeable Signatures",,"Progress in Cryptology - INDOCRYPT 2006, Lecture Notes in Computer Science",,"Vol. 4329",,"pp. 191-205",2006,Dec. "Isamu Teranishi,Wakaha Ogata","Relationship between Standard Model Plaintext Awareness and Message Hiding",,"Advances in Cryptology – ASIACRYPT 2006, Lecture Notes in Computer Science",,"Vol. 4284",,"pp. 226-240",2006,Dec. "尾形わかは,菊池 浩明,西垣 正勝","リモートバイオメトリクス認証に有効な「近い」ことを示す零知識証明プロトコル",,"第29回情報理論とその応用シンポジウム予稿集 SITA2006,",,,,"pp. 319-322",2006,Nov. "永井慧,菊池浩明,尾形わかは,西垣正勝","ZeroBio -- 秘匿ニューラルネットワーク評価を用いた指紋認証システム",,"コンピュータセキュリティシンポジウム予稿集",,,,"pp. 633-638",2006,Oct. "Dan Yamamoto,Wakaha Ogata","Structured Aggregate Signatures",,"Proc. of SCIS 2006",,,,"pp. 3A4-3",2006,Jan. "飯野 徹,松尾 真一郎,松岡 廣登,尾形 わかは","省リソースデバイスに適したパスワード認証鍵交換",,"暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 3D3-3",2006,Jan. "山下 修平,尾形わかは","多項式を用いた秘密分散共有法に関する一考察",,"暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 1F2-2",2006,Jan. "Le Trieu Phong,Wakaha Ogata","On a Variation of Kurosawa-Desmedt Encryption Scheme",,"Proc. of SCIS 2006",,,,"pp. 2A2-3",2006,Jan. "松本直也,尾形わかは","ディジタル署名の安全性証明に関する研究",,"暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 3A2-1",2006,Jan. "Wakaha Ogata,Kaoru Kurosawa,Douglas R. Stinson","Optimum Secret Sharing Scheme Secure against Cheating",,"SIAM Journal of Discrete Mathematics",,"Vol. 20",,"pp. 79-95",2006, "Wakaha Ogata,Kaoru Kurosawa,Swee-Huay Heng","The Security of the FDH Variant of Chaum's Undeniable Signature Scheme",,"IEEE Trans. on Information Theory",,"Vol. 52","No. 5","pp. 2006-2017",2006, "飯野 徹,松尾真一郎,松岡廣登,尾形わかは","非対称3者間PAKEプロトコル",,"電子情報通信学会技術研究報告",,"Vol. 105","No. 396","pp. 63-70",2005,Nov. "W. Ogata,K. Kurosawa,S. H. Heng","The Security of the FDH Variant of Chaum's Undeniable Signature Scheme",,"Proc. of PKC2005, LNCS",,"Vol. 3386",,"pp. 328-345",2005, "N. Ishida,S. Mastuo,W. Ogata","Efficient Divisible Voting Scheme",,"IEICE Trans.",,"Vol. E88-A","No. 1","pp. 230-238",2005, "黒澤馨,尾形わかは","電子情報通信レクチャーシリーズ 『現代暗号の基礎数理』",,"電子情報通信学会編,コロナ社","電子情報通信学会編,コロナ社",,,,2004, "尾形 わかは,檜座 哲夫,ズォング ベト カン","RSA暗号を利用した効率的な木構造鍵管理方式",,"2004年 暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 195-200",2004, "石田夏樹,尾形わかは","MIX-netと準同型性に基づいた電子投票方式",,"電子情報通信学会技術研究報告",,,,"pp. ISEC2004-61",2004, "W. Ogata,K. Kurosawa","Oblivious Keyword Search",,"Journal of Complexity",,"Vol. 20",,"pp. 356-371",2004, "W. Ogata,K. Kurosawa,D. R. Stinson,H. Saido","New Combinatorial Designs and Their Applications to Authentication Codes and Secret Sharing Schemes",,"Discrete Mathematics",,"Vol. 279/1-3",,"pp. 383-405",2004, "W. Ogata,R. Sasahara","k out of n Oblivious Transfer without Random Oracles",,"IEICE Trans.",,"Vol. E87-A",,"pp. 147-151",2004, "S.Matsuo,W.Ogata","Matching Oblivious Transfer: How to Exchange Valuable Data",,"IEICE Transaction",,"Vol. E86-A",,"pp. 189-193",2003, "S.Matsuo,W.Ogata","A Method for Exchanging Valuable Data : How to Realize Matching Oblivious Transfer",,"Proc. of 22nd ACM symposium on Principles of Distributed Computing (PODC)",,,,"pp. 201",2003, "N. Ishida,S. Matsuo,W. Ogata","Divisible Voting Scheme",,"Information security, Proc. of ISC 2003, Lecture Notes in Computer Science",,"Vol. 2851",,"pp. 137?150",2003, "石田夏樹,尾形わかは","準同型暗号系に基づいた分割可能な複数票電子投票方式",,"2003年 暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 197-202",2003, "S.Matsuo,W.Ogata","Electronic Ticket Scheme for ITS",,"IEICE Transaction",,"Vol. E86-A",,"pp. 142-150",2003, "Wakaha Ogata,Kaoru Kurosawa","Bounds for Metering Scheme and Their Relationship with A2-code",,"Proc. of Asiacrypt 2002, Lecture Notes in Computer Science",,"Vol. 2501",,"pp. 64-80",2002, "Kaoru Kurosawa,Wakaha Ogata","Bit Slice Auction Protocol",,"Proc. of ESORICS2002, Lecture Notes in Computer Science",,"Vol. 2502",,"pp. 24-38",2002, "松尾真一郎,尾形わかは","分割可能な複数票電子投票方式",,"電子情報通信学会技術研究報告",,"Vol. 102","No. 511","pp. 1-6",2002, "松尾真一郎,尾形 わかは","データ交換可能な多対多マッチングプロトコル",,"2002年 暗号と情報セキュリティシンポジウム",,,,,2002, "Wataru Kishimoto,K.Okada,K.Kurosawa,W.Ogata","On the Bound for Anonymous Secret Sharing Schemes",,"Discrete Applied Mathematics",,"Vol. 121","Issue s 1-3","pp. 193-202",2001, "尾形わかは,黒澤馨","安全性が証明可能な metering scheme","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 875-880",2001, "K.Kurosawa,W.Ogata,Toshihiko Matsuo,S.Makishima","IND-CCA Public Key Schemes Equivalent to Factoring N=pq","PKC 2001","Lecture Notes in Computer Science, Proc. of PKC2001",,"Vol. 1992",,"pp. 36-47",2001, "W. Ogata","On the Practical Secret Sharing Scheme",,"IEICE Transaction",,"Vol. E84-A",,"pp. 256-261",2001, "尾形わかは","実用的な秘密分散共有法 --- Robust Ramp Scheme",,"暗号と情報セキュリティシンポジウム",,"Vol. SCIS2000-A36",,,2000, "Wakaha Ogata,Kaoru Kurosawa","Provably Secure Metering Scheme",,"Lecture Notes in Computer Science, Proc. of Asiacrypt2000",,"Vol. 1976",,"pp. 388-398",2000, "板倉征男,岩田哲,尾形わかは,黒澤馨,辻井重男","DNA情報を組み込んだ公開鍵暗号方式",,"電子情報通信学会技術研究報告",,"Vol. ISEC2000-42",,,2000, "K. Kurosawa,Wakaha Ogata","Efficient Rabin-type Digital Signature Scheme",,"Designs, Codes and Cryptography",,"Vol. 16","No. 1","pp. 53-64",1999, "Carlo Blundo,Alfredo De Santis,K. Kurosawa,Wakaha Ogata","Fallacious Bound for Authentication Codes",,"Journal of Cryptology",,"Vol. 12","No. 3","pp. 155-159",1999, "大西正晃,増田景一,尾形わかは,坂上仁志,高橋豐","実景対応型イメージマップシステム","平11電気関係学会関西支部連合大会","平11電気関係学会関西支部連合大会",,"Vol. G13-11",,,1999, "中垣智宏,尾形わかは,坂上仁志,高橋豐","ネットワークを介したメルチメディア・データ編集における排他制御機構","平11電気関係学会関西支部連合大会","平11電気関係学会関西支部連合大会",,"Vol. G13-5",,,1999, "平修一,尾形わかは,坂上仁志,高橋豐","配送確認を行う電子メールシステムの構築","1999年電子情報通信学会総合大会","1999年電子情報通信学会総合大会予稿集",,,,"pp. 199",1999, "高谷和伯,尾形わかは,坂上仁志,高橋豐","プライバシーを保護する鍵寄託方式","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 899-904",1999, "黒澤馨,尾形わかは","効率の良いRabin型デジタル署名方式","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 539-544",1999, "若林昌子,尾形わかは,坂上仁志,高橋豐","最大限の秘匿を可能にする電子メールシステムの構築","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 111-116",1999, "C.Blundo,A.De Santis,黒澤 馨,尾形 わかは","認証コードのある下界の誤りとその訂正","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,"Vol. SCIS'98-6.3.B",,,1998, "高谷和伯,尾形わかは,坂上仁志,高橋豐","利用者のプライバシーを考慮した鍵寄託方式",,"平10電気関係学会関西支部連合大会",,"Vol. G13-6",,,1998, "志村一平,尾形わかは,坂上仁志,高橋豐","セキュリティを考慮した遠隔ログインシステムの構築",,"平10電気関係学会関西支部連合大会",,"Vol. G13-7",,,1998, "Wakaha Ogata,Kaoru Kurosawa","Some Basic Properties of General Nonperfect Secret Sharing Schemes",,"Journal of Universal Computer Science",,"Vol. 4","No. 8","pp. 690-704",1998, "須永忠治,尾形わかは,坂上仁志,高橋豐","群離脱認識プロトコルの経路制御への応用","平10電気関係学会関西支部連合大会","平10電気関係学会関西支部連合大会",,"Vol. G13-16",,,1998, "山地宏,尾形わかは,坂上仁志,高橋豐","相互仮想現実感でのデータ伝送遅延の影響評価装置",,"平10電気関係学会関西支部連合大会",,"Vol. G13-8",,,1998, "尾形 わかは,黒澤 馨,Kazunori TAKATANI","(k,n)閾値匿名通信路とその応用",,"暗号と情報セキュリティシンポジウム",,"Vol. SCIS'97-27F",,,1997, "尾形わかは,高谷和伯","効率的な票分割型電子投票方式の構成","電子情報通信学会総合大会","電子情報通信学会総合大会予稿集",,,,,1997, "須永忠治,尾形わかは,坂上仁志,高橋豐","群れ離脱認識プロトコルのLANへの実装","電子情報通信学会1997年ソサイエティ大会","電子情報通信学会1997年ソサイエティ大会講演論文集",,"Vol. B-7-140",,,1997, "Wakaha OGATA,Kaoru KUROSAWA,Kazue Sako,Kazunori TAKATANI","Fault Tolerant Anonymous Channel",,"Proc. of ICICS'97, Lecture Notes in Computer Science",,"Vol. 1334",,"pp. 440-444",1997, "Kaoru Kurosawa,Yutaka Katayama,Wakaha OGATA","Reshufflable and Laziness Tolerant Mental Card Game Protocol",,"IEICE Transaction",,"Vol. E80-A",,"pp. 72-78",1997, "K.Okada,W.Ogata,K.Sakano,K.Kurosawa","Analysis on Secret Sharing Schemes with Non-Graphical Access Structures",,"IEICE Transaction",,"Vol. E80-A",,"pp. 85-89",1997, "Wakaha OGATA,Keiichi SAKANO,Kaoru KUROSAWA","Multisymbol Majority Vote and Hard Core",,"Information Processing Letters",,"Vol. 58",,"pp. 285-292",1996, "尾形わかは,黒澤馨","不正者に対して最も安全な秘密分散共有法",,"電子情報通信学会技術研究報告",,"Vol. ISEC96-41",,,1996, "Wakaha Ogata,Kaoru Kurosawa","Optimum Secret Sharing Scheme Secure against Cheating","Eurocrypt'96","Proc. of Eurocrypt'96, Lecture Notes in Computer Science",,"Vol. 1070",,"pp. 200-211",1996, "Kaoru Kurosawa,Satoshi Obana,Wakaha Ogata","t-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes","CRYPTO'95","Proc. of CRYPTO'95, Lecture Notes in Computer Science",,"Vol. 963",,"pp. 410-423",1995, "Kaoru Kurosawa,Wakaha Ogata,Shigeo Tsujii","4-move Perfect ZKIP for Some Promise Problem",,"IEICE Transaction",,"Vol. E78-A",,"pp. 34-41",1995, "小林康喜,広田吉希,尾形わかは,坂上仁志,高橋豐","群分割のシミュレーション",,"平7電気関係学会関西支部連合大会",,"Vol. G13-8",,,1995, "尾形 わかは,黒澤 馨","Some new results on nonperfect secret sharing schemes",,"電子情報通信学会技術研究報告",,"Vol. ISEC95-44",,,1995, "尾形わかは","A Study on Secret Sharing Schemes and Computational Cryptology",,,,,,,1994, "黒澤 馨,Y.Katayama,尾形 わかは","Reshufflable and laziness tolerant mantal card game protocol","応用数理学会平成6年度年会","応用数理学会平成6年度年会予稿集",,,,"pp. 164",1994, "Wakaha Ogata,Kaoru Kurosawa","On claw free families",,"IEICE Transaction",,"Vol. E77-A",,"pp. 72-80",1994, "尾形わかは,黒澤馨,辻井重男","Nonperfect secret sharing scheme",,"暗号と情報セキュリティシンポジウム",,"Vol. SCIS'93-16D",,,1993, "K.Kurosawa,K.Okada,K.Sakano,W.Ogata,S.Tsujii","Nonperfect Secret Sharing Schemes and Matroids","Eurocrypt'93","Proc. of Eurocrypt'93, Lecture Notes in Computer Science",,"Vol. 765",,"pp. 126-141",1993, "尾形わかは,阪野恵市,黒澤馨","Multivalued hard core",,"暗号と情報セキュリティシンポジウム",,"Vol. SCIS'93-9B",,,1993, "岡田光司,尾形わかは,黒澤馨","An Optimal share size in a perfect secret sharing scheme","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム",,"Vol. SCIS'93-11C",,,1993, "W.Ogata,K.Kurosawa,S.Tsujii","Nonperfect Secret Sharing Schemes",,"Proc. of Auscrypt'92, Lecture Notes in Computer Science",,"Vol. 718",,"pp. 56-66",1992, "尾形わかは,阪野恵市,黒澤馨","多値のハードコアのインバータ","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,"Vol. SCIS'92-4D",,,1992, "Wakaha Ogata,Kaoru Kurosawa","On Claw free Families","Asiacrypt'91","Proc. of Asiacrypt'91, Lecture Notes in Computer Science",,"Vol. 739",,"pp. 111-123",1991, "尾形わかは,黒澤馨","Claw free familyの構成法",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-22",,,1990, "K.Kurosawa,Y.Katayama W.Ogata,Wakaha Ogata,S.Tsujii","General Public key residue cryptosystem and mental poker protocols","Eurocrypt'90","Proc. of Eurocrypt'90, Lecture Notes in Computer Science",,"Vol. 473",,"pp. 374-388",1990, "黒澤馨,尾形わかは,辻井重男","4 move ゼロ知識証明",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-15",,,1990, "黒澤馨,尾形わかは,辻井重男","2 move ゼロ知識証明",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-14",,,1990, "黒澤馨,尾形わかは,伊東利哉,辻井重男","4-move zero-knowledge interactive proof systems",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-39",,,1990, "黒澤馨,板倉わかは,片山裕","多次剰余のゼロ知識証明とそのmental pokerへの応用","第12回情報理論とその応用シンポジウム","第12回情報理論とその応用シンポジウム予稿集",,,,"pp. 453-458",1989, "片山裕,板倉わかは,黒澤馨","ゼロ知識証明における通信量の削減について",,"電子情報通信学会技術研究報告",,"Vol. ISEC89-37",,,1989,