"Kota Takahashi,Keitaro Hashimoto,Wakaha Ogata","Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext",,"Designs, Codes and Cryptography","Springer Nature",,,,2023,Oct. "Atsunori Ichikawa,Wakaha Ogata","Perfectly Secure Oblivious Priority Queue",,"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","The Institute of Electronics, Information and Communication Engineer","Vol. E106-A","Issue 3","pp. 272-280",2023,Mar. "Wakaha Ogata,Toi Tomita,Kenta Takahashi,Masakatsu Nishigaki","Brain function extension for cryptography : How to realize digital signature without trustworthy machine, Ver. 2.0","2023 Symposium on Cryptography and Information Security",,,,,,2023,Jan. "Koki Matsui,Wakaha Ogata","A Study of Encryption Scheme between IoT Gateway and Applications","2023 Symposium on Cryptography and Information Security",,,,,,2023,Jan. "Kota Takahashi,Wakaha Ogata","Distributed decryption for code-based cryptography","2023 Symposium on Cryptography and Information Security",,,,,,2023,Jan. "Toi Tomita,Wakaha Ogata,Kaoru Kurosawa","Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK",,"IEICE Trans. on Fundamentals",,"Vol. Vol.E105-A","No. 3",,2022,Mar. "Yoshifumi Saito,Wakaha Ogata","Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service",,"IEICE Trans. on Fundamentals",,"Vol. E105-A","No. 3",,2022,Mar. "Takumi Saito,Hibiki Oka,Akira Nakahashi,Wakaha Ogata","One round classification of encrypted text data using RNN","2022 Symposium on Cryptography and Information Security",,,,,,2022,Jan. "Ayaka Matsumoto,Wakaha Ogata,Kenta Takahashi,Masakatsu Nishigaki","Brain function extension for cryptography : How to realize digital signature without trustworthy terminal","2022 Symposium on Cryptography and Information Security",,,,,,2022,Jan. "Hyodo Shogo,Ogata Wakaha","A Practical Proof of Personhood Protocol Using Credit Score","2022 Symposium on Cryptography and Information Security",,,,,,2022,Jan. "Riki Fukunari,Wakaha Ogata","真に簡潔なOblivious RAMプロトコルの提案","暗号と情報セキュリティシンポジウム SCIS2021",,,,,,2021,Jan. "Yoshifumi Saito,Wakaha Ogata","信頼できないサーバによる決定木評価の委託計算方式","暗号と情報セキュリティシンポジウム SCIS2021",,,,,,2021,Jan. "Toi Tomita,Wakaha Ogata,Kaoru Kurosawa,Ryo Kuwayama","CCA-Secure Leakege-Resilient Identity-Based Encryption without q-Type Assumptions",,"IEICE Trans. on Fundamentals",,"Vol. E103-A","No. 10","pp. 1157--1166",2020,Oct. "Wakaha Ogata,Takaaki Otemori","Security analysis of secure kNN and ranked keyword search over encrypted data",,"International Journal of Information Security",,"Vol. 19","Issue 4","pp. 419-425",2020,Aug. "Koki Mukaihira,Yasuyoshi Jinno,Takashi Tsuchiya,Tetsushi Ohki,Kenta Takahashi,Wakaha Ogata,Masakatsu Nishigaki","Communication Protocol between Humans and Bank Server Secure against Man-in-the-Browser Attacks","Intelligent Human Systems Integration 2020","Proceedings of the 3rd International Conference on Intelligent Human Systems Integration (IHSI 2020)",,,,"pp. 503-509",2020,Jan. "Masataka Tsunoda,Wakaha Ogata,Kenta Takahashi,Masakatsu Nishigaki","Universal samplerを用いないProof of Human-workの構成とその応用に関する研究","暗号と情報セキュリティシンポジウムSCIS2020","暗号と情報セキュリティシンポジウム予稿集",,,,,2020,Jan. "Toui Tomita,Wakaha Ogata,Kaoru Kurosawa","選択暗号文攻撃に対してoptimally leakage-resilientなIDベース暗号","暗号と情報セキュリティシンポジウムSCIS2020","暗号と情報セキュリティシンポジウム予稿集",,,,,2020,Jan. "Keitarou Hashimoto,Wakaha Ogata,Toui Tomita","Certificateless signatureの一般的構成に対するタイトな帰着とDDH仮定に基づく構成","暗号と情報セキュリティシンポジウムSCIS2020","暗号と情報セキュリティシンポジウム予稿集",,,,,2020,Jan. "Toi Tomita,Wakaha Ogata,Kaoru Kurosawa","CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q-type) Assumptions","IWSEC 2019",,,,,,2019,Aug. "Dan Yamamoto,Wakaha Ogata","Multidivisible Online/Offline Cryptography and Its Application to Signcryptions",,"Security and Communication Networks",,,,,2019,Aug. "Atsunori Ichikawa,Wakaha Ogata,Koki Hamada,Ryo Kikuchi","Efficient Secure Multi-Party Protocols for Decision Tree Classification","ACISP2019",,,,,,2019,July "Keitaro Hashimoto,Wakaha Ogata","Unrestricted and compact certificateless aggregate signature scheme",,"Information Sciences",,"Volume 487",,"pp. 97-114",2019,June "Yoshifumi Saito,Wakaha Ogata","Support Vector Machine を用いたプライバシー保護型データ分類方式の改良","暗号と情報セキュリティシンポジウムSCIS2019","暗号と情報セキュリティシンポジウム予稿集",,,,,2019,Jan. "Wakaha Ogata,Kaoru Kurosawa","No-Dictionary Searchable Symmetric Encryption",,"IEICE Trans. on Fundamentals",,"Vol. E102-A","No. 1","pp. 144-124",2019,Jan. "Toui Tomita,Wakaha Ogata,Kaoru Kurosawa","標準的な仮定のもとでleakage resilient かつCCA安全なIDベースKEM","暗号と情報セキュリティシンポジウムSCIS2019","暗号と情報セキュリティシンポジウム予稿集",,,,,2019,Jan. "神農泰圭,土屋貴史,大木哲史,高橋健太,Wakaha Ogata,Masakatsu Nishigaki","計算機援用セキュリティスキームの一般的構成法",,"情報処理学会論文誌",,"Vol. 59",,"pp. 1557-1569",2018,Sept. "向平浩貴,神農泰圭,土屋貴史,大木哲史,高橋健太,Wakaha Ogata,Masakatsu Nishigaki","Man In The Browser 攻撃対策を実現する人間・銀行サーバ間のセキュア通信プロトコル(その3)","夏のセキュリティワークショップ2018 in 札幌",,,,,,2018,July "Takaaki Otemori,Wakaha Ogata","内積を用いたランク付きマルチキーワード検索可能暗号の安全性に関する研究","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "Saori Nakamura,Wakaha Ogata","Random Decision Tree を使ったよりプライバシーに配慮したプライバシー保護型データマイニング","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "Kohei Morita,Wakaha Ogata","UOV のOnline/Offline化の研究","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "Hiroki Nomura,Wakaha Ogata","階層型ID ベースプロキシ再暗号化方式の提案","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2018,Jan. "Keitarou Hashimoto,Wakaha Ogata","Certificateless Aggregate Signature Schemeの構成法と安全性に関する研究","2018年暗号と情報セキュリティシンポジウム",,,,,,2018,Jan. "Yasuyoshi Jinno,Takashi Tsuchiya,Tetsushi Ohki,Kenta Takahashi,Wakaha Ogata,Masakatsu Nishigaki","A Study on Construction and Security of Computer-Aided Security Schemes","4th Annual Conference on Computational Science and Computational Intelligence (CSCI2017)","Proceedings of 4th Annual Conference on Computational Science and Computational Intelligence","Springer",,,"pp. 31-36",2017,Dec. "Ryo Kikuchi,Dai Ikarashi,Koji Chida,Koki Hamada,Wakaha Ogata","Computational Secret Sharing and Conversion Protocols in Both Active and Passive Settings",,"IET Information Security",,"Vol. 11","No. 5","pp. 287-293",2017,July "Wakaha Ogata,Kaoru Kurosawa","Efficient no-dictionary verifiable searchable symmetric encryption","Finantial Cryptology","Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","Springer","Vol. 10322 LNCS",,"pp. 498-516",2017,Apr. "土屋貴史,神農泰圭,藤田真浩,高橋健太,Wakaha Ogata,Masakatsu Nishigaki","Man In The Browser攻撃対策を実現する人間・銀行サーバのセキュア通信プロトコル(その2)","情報処理学会 第76回CSEC研究発表会",,,,,,2017,Mar. "Shunsuke Taketani,Wakaha Ogata","Unidirectionalな検索可能代理人再暗号化方式の構築","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2017,Jan. "Atsunori Ichikawa,Wakaha Ogata","Oblivious RAMを用いた効率的な決定木のマルチパーティ計算","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2017,Jan. "Wakaha Ogata,Toshinori Araki","Computationally secure verifiable secret sharing scheme for distributing many secrets",,"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",,"Vol. E100A","No. 1","pp. 103-114",2017,Jan. "Dan Yamamoto,Wakaha Ogata","Multi-divisible on-line/off-line encryptions",,"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",,"Vol. E100A","No. 1","pp. 91-102",2017,Jan. "Fujiwara, M.,Waseda, A.,Nojima, R.,Moriai, S.,Wakaha Ogata,Sasaki, M.","3-2 information theoretically secure distributed storage with QKD and password-authenticated secret sharing",,"Journal of the National Institute of Information and Communications Technology",,"Vol. 64","No. 1","pp. 23-29",2017, "神農泰圭,兼子拓弥,高橋健太,Wakaha Ogata,Masakatsu Nishigaki","計算機援用セキュリティシスムの構成方法と安全性に関する一考察","コンピュータセキュリティシンポジウム(CSS2016)",,,,,,2016,Oct. "Shunsuke Taketani,Wakaha Ogata","Improvement of UC Secure SearchableSymmetric Encryption Scheme","the 10th International Workshop on Security, IWSEC 2015","Advances in Information and Computer Security, the 10th International Workshop on Security, IWSEC 2015, LNCS","Springer","Vol. 9241",,"pp. 135--152",2016,Aug. "Mikio Fujiwara,Aatsushi Waseda,Ryo Nojima,Shiho Moriai,Wakaha Ogata,Masahide Sasaki","Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing",,"Scientific Reports",,,,,2016,June "Wakaha Ogata","Integration of Various Proxy Re-encryptions","The 33nd Symposium on Cryptography and Information Security",,,,,,2016,Jan. "Atsunori Ichikawa,Ryou Kikuchi,Wakaha Ogata","Efficiency comparison of Secure Decision Tree Computation and Its Improvement by Offline Computation","The 33nd Symposium on Cryptography and Information Security",,,,,,2016,Jan. "Tasuyoshi Jinno,Takuya Kaneko,Kenta Takahashi,Wakaha Ogata,Masakatsu Nishigaki","A Study on Formularization of Computer Aided Computational Security","The 33nd Symposium on Cryptography and Information Security",,,,,,2016,Jan. "Shun Nakagawa,Wakaha Ogata","A study on the securing and construction of proxy re-signcryption","The 33nd Symposium on Cryptography and Information Security",,,,,,2016,Jan. "Kazuho Hirano,Wakaha Ogata","A Study on User-to-User Communication Typed Illegal Copy Detection System with Misdetection Avoidance Function","The 33nd Symposium on Cryptography and Information Security",,,,,,2016,Jan. "Atsunori ICHIKAWA,Wakaha OGATA","Cheating detectable multi-use password protected secret sharing secure","電子情報通信学会ISEC研究会","IEICE technical report","IEICE","Vol. 115","No. 28","pp. 23--30",2015,May "Nguyen Quoc Viet,Wakaha Ogata","Certificateless Aggregate Signature Schemes with Improved Security",,"IEICE Trans. on Fundamentals",,"Vol. E98-A","No. 1","pp. 92-99",2015,Jan. "Ryo KIKUCHI,Koji CHIDA,Dai IKARASHI,Wakaha OGATA,Koki HAMADA,Katsumi TAKAHASHI","Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation",,"IEICE Trans. on Fundamentals",,"Vol. E98-A","No. 1","pp. 213-222",2015,Jan. "Wakaha Ogata,Akira Kanaoka,Shin'ichiro Matsuo","Practical Multi-Functional Searchable Encryption","The 32nd Symposium on Cryptography and Information Security",,,,,,2015, "Sangwon Yoo,Wakaha Ogata","Improved Privacy-Preserving Multi-keyword Ranked Search","The 32nd Symposium on Cryptography and Information Security",,,,,,2015, "Kazuma Takahashi,Wakaha Ogata","Improvement of Secret Recovery Using Cold-Boot Attack for Shamir's Secret Sharing","The 32nd Symposium on Cryptography and Information Security",,,,,,2015, "Wakaha Ogata,Hiroshi Eguchi","Cheating Detectable Threshold Scheme against Most Powerful Cheaters for Long Secrets",,"Designs, Codes and Cryptography",,"Vol. 71","No. 3","pp. 527-539",2014,Mar. "Junya Iwanami,Wakaha Ogata","高い安全性と効率を持つDynamic SSE の構築","2014年 暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "Narumi Yoshioka,Wakaha Ogata","能動的な不正に対して安全な効率的なパスワード付秘密分散法","2014年 暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "早稲田篤志,Wakaha Ogata,野島良,盛合志帆","Active な攻撃者に対して情報理論的秘匿性を持つパスワード認証機能付き秘密分散法",,"暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "Le Dang Khoa,Wakaha Ogata","A Study on Identification Scheme Based on Subset Sum Problem","2014年 暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,,2014,Jan. "Wakaha Ogata,Toshinori Araki","Cheating Detectable Secret Sharing Schemes for Random Bit Strings",,"IEICE Trans. on Fundamentals",,"Vol. E96-A","No. 11","pp. 2230-2234",2013,Nov. "Wakaha Ogata,Keita Koiwa,Akira Kanaoka,Shin'ichiro Matsuo","Toward Practical Searchable Symmetric Encryption","the 8th International Workshop on Security (IWSEC 2013)","Lecture notes in computer science, LNCS",,"Vol. 8231",,"pp. 151-167",2013,Nov. "Wakaha Ogata","TK-7-2 暗号技術の現在と未来(TK-7.ICT技術が開く未来〜女性研究者の視点から〜,大会委員会企画)",,"電子情報通信学会総合大会講演論文集","一般社団法人電子情報通信学会","Vol. 2013",,"pp. "SSS-64"-"SSS-65"",2013,Mar. "NGUYEN QUOC VIET,Wakaha Ogata","Two New Schemes of Certificateless Aggregate Signature with Improvement of Security","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "Junya Iwanami,Wakaha Ogata","ドキュメント追加後も安全で効率的な検索可能暗号","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "Koh Kitahara,Wakaha Ogata","検索結果を秘匿する検索可能暗号方式","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "Wakaha Ogata","情報理論的に安全なパスワード付秘密分散法の安全性と効率化","暗号と情報セキュリティシンポジウム,SCIS2013","暗号と情報セキュリティシンポジウム予稿集(CD-ROM) SCIS2013",,,,,2013,Jan. "Takahumi Yamamoto,Wakaha Ogata","Shamirのしきい値法における部分的なシェアからの秘密の復元","第35回情報理論とその応用シンポジウム予稿集(CD-ROM),SITA2012",,,,,,2012,Dec. "Masakatsu Nishigaki,渡邊幸聖,小田雅洋,米山裕太,山本匠,高橋健太,Wakaha Ogata,Hiroaki Kikuchi","曖昧性を含んだ多項式による特徴量関数の秘匿評価を利用したテンプレート保護型生体認証",,"情報処理学会論文誌",,"Vol. 53","No. 9","pp. 2254-2266",2012,Sept. "Masayuki Kakinuma,Wakaha Ogata","ランダム鍵ビットを用いたPKCS#1に基づくRSA暗号の秘密鍵の復元","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","Undeniable and Unpretendable Signatures",,"IEICE Trans. on Fundamentals",,"Vol. E95-A","No. 1","pp. 138-150",2012,Jan. "Wakaha Ogata","多数の秘密の分散に適する計算量理論的検証可能秘密分散共有法","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Koh Kitahara,Wakaha Ogata","効率的な暗号化されたまま行われる生体認証プロトコル","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Hiroshi Eguchi,Wakaha Ogata","n-1人の不正者に対して安全なより効率の良い(k,n)閾値法","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Tatsumi Oba,Wakaha Ogata","秘密の持ち逃げを不可能とする秘密分散共有法","2012年暗号と情報セキュリティシンポジウム","2012年 暗号と情報セキュリティシンポジウム予稿集",,,,,2012,Jan. "Toshinori Araki,Wakaha Ogata","A Simple and Efficient Secret Sharing Scheme Secure against Cheating",,"IEICE Trans. on Fundamentals",,"Vol. E94-A","No. 6","pp. 1338--1345",2011,June "小田雅洋,渡邊幸聖,山本匠,高橋健太,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","Fuzzy Vault Schemeにおけるチャフ空間拡大に関する検討","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Tatsumi Oba,Wakaha Ogata","Provably Secure On-line Secret Sharing Scheme",,"IEICE Trans. on Fundamentals",,"Vol. E94-A","No. 1","pp. 139-149",2011,Jan. "Wakaha Ogata,Shin'ichiro Matsuo,Akira Kanaoka","Searchable symmetrc encryptionはどこまで安全にすべきか?","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Masayuki Kakinuma,Ryou Kikuchi,Wakaha Ogata","否認不可署名のinvisibilityとanonymityの関係性に関する再考","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Wakaha Ogata,Toshinori Araki","ビット列に対する不正検出可能しきい値法","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "unknown unknown,Wakaha Ogata","シンプルで効率的な不正検出可能しきい値法","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Daijiro Sase,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","ゼロ知識性が証明可能なリモート生体認証方式","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "渡邊幸聖,小田雅洋,山本匠,高橋健太,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証:その改良と安全性証明","2011年暗号と情報セキュリティシンポジウム","2011年暗号と情報セキュリティシンポジウム予稿集",,,,,2011,Jan. "Ryou Kikuchi,Le Trieu Phong,Wakaha Ogata","A Framework for Constructing Convertible Undeniable Signatures","The Fourth International Conference on Provable Security (ProvSec 2010)","Proc. of ProvSec 2010",,,,,2010,Oct. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","Provably Secure Convertible Undeniable Signatures with Unambiguity","Seventh Conference on Security and Cryptography for Networks","Proc. of 7th International Conference, SCN 2010, LNCS Vol. 6280",,,,"pp. 291-308",2010,Sept. "Ryou Kikuchi,Wakaha Ogata","変換可能否認不可署名の一般的構成法","the 2010 Simposium on Cryptography and Information Security","Proceedings of the 2010 Simposium on Cryptography and Information Security",,,,,2010,Jan. "Atsushi Okawado,Wakaha Ogata","SubsetDifference法におけるstorage sizeの削減に関する考察","the 2010 Simposium on Cryptography and Information Security","Proceedings of the 2010 Simposium on Cryptography and Information Security",,,,,2010,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","Provably Secure Convertible Undeniable Signatures with Unambiguity","the 2010 Simposium on Cryptography and Information Security","Proceedings of the 2010 Simposium on Cryptography and Information Security",,,,,2010,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","New RSA-Based (Selectively) Convertible Undeniable Signature Schemes",,"IEICE Trans. on Fundamentals",,"Vol. E93-A","No. 1","pp. 63-75",2010,Jan. "渡邉幸聖,小田雅洋,山本匠,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証","the 2010 Simposium on Cryptography and Information Security","Proceedings of the 2010 Simposium on Cryptography and Information Security",,,,,2010,Jan. "Toshinori Araki,Wakaha Ogata","Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels",,"IEICE Trans. on Fundamentals",,"Vol. E93-A","No. 1","pp. 126-135",2010,Jan. "Tatsumi Oba,Wakaha Ogata","証明可能安全性を持つオンライン秘密分散方式","the 2010 Simposium on Cryptography and Information Security","Proceedings of the 2010 Simposium on Cryptography and Information Security",,,,,2010,Jan. "Kikuchi, H.,Nagai, K.,Wakaha Ogata,Nishigaki, M.","Privacy-preserving similarity evaluation and application to remote biometrics authentication",,"Soft Computing",,"Vol. 14","No. 5","pp. 529-536",2010, "Taiki Sakashita,Yoichi Shibata,Takumi Yamamoto,Kenta Takahashi,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","A Proposal of Efficient Remote Biometric Authentication Protocol",,"Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009, LNCS",,"Vol. 5824",,"pp. 212-227",2009,Oct. "Le Trieu Phong,Wakaha Ogata","New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model",,"IEICE Trans. on Fundamentals",,"Vol. 1822-1835","No. 8","pp. 1822-1835",2009,Aug. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","New RSA-Based (Selectively) Convertible Undeniable Signature Schemes","AfricaCrypt 2009","Progress in Cryptology -- AFRICACRYPT 2009, LNCS",,"Vol. 5580",,"pp. 1116-134",2009,June "Kouichi Itou,Dai Yamamoto,Jun Yajima,Wakaha Ogata","Collision-based Power Attack for RSA with Small Public Exponent",,"IEICE Trans. on Information",,"Vol. E92-D",,,2009,May "Katsuhisa Kawaguchi,Wakaha Ogata","属性ベース暗号とその応用","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 3C1-1",2009,Jan. "Yoko Shono,Wakaha Ogata,Kunihiko Higa","テレワーク導入企業における情報セキュリティの調査研究","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 4E2-2",2009,Jan. "Le Trieu Phong,Kaoru Kurosawa,Wakaha Ogata","New RSA-Based (Selectively) Convertible Undeniable Signature Schemes","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009,3C1-1",,,," 3B4-4",2009,Jan. "Rei Akaiwa,Wakaha Ogata","スタンダードモデルにおいて安全なIDベースオンライン/オフライン署名方式","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 3B3-2",2009,Jan. "Hiroaki Kikuchi,Shun Kawano,Youhei Azegami,Katumasa Nishigaki,Wakaha Ogata","直交基底指紋への参照度を特徴量とした安全な生体認証プロトコル","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 2F4-3",2009,Jan. "Isamu Teranishi,Wakaha Ogata","Cramer-Shoup暗号の統計的PA安全性","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 2B2-2",2009,Jan. "Ryo Kikuchi,Wakaha Ogata","KRモデルで汎用結合性を持つ検証可能な紛失通信プロトコルの提案","2009年暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集(CD-ROM),SCIS2009",,,," 1B1-4",2009,Jan. "Kouichi Itou,Tetsuya Izu,Wakaha Ogata,Masahiko Takenaka","Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate",,"IEICE Trans. on fundamentals",,"Vol. E92-A","No. 1","pp. 67-75",2009,Jan. "Hiroaki Kikuchi,Kei Nagai,Wakaha Ogata,Masakatsu Nishigaki,Wakaha Ogata","Privacy-Preserving Similarity Evaluation and Application ot Remote Biometrics Authentication","Modeling Decisions for Artifical Intellegence","Proc. of Modeling Decisions for Artifical Intellegence",,,,,2008,Nov. "Kouichi Itou,Tetsuya Izu,Wakaha Ogata,Masahiko Takenaka","Bleichenbacher 攻撃と証明可能安全性との関係について","コンピュータセキュリティシンポジウム2008","コンピュータセキュリティシンポジウム2008論文集 (CSS2008)",,,,,2008,Oct. "Kouichi Itou,Dai Yamamoto,Jun Yajima,Wakaha Ogata","乗算を用いた指数のランダム化対策への電力解析","コンピュータセキュリティシンポジウム2008","コンピュータセキュリティシンポジウム2008論文集 (CSS2008)",,,,,2008,Oct. "Masahiro Oda,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","G3C-ZKIPを用いた非対称生体認証","コンピュータセキュリティシンポジウム2008","コンピュータセキュリティシンポジウム2008論文集 (CSS2008),",,,,"pp. 695-700",2008,Oct. "Isamu Teranishi,Wakaha Ogata","Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption","Sixth Conference on Security and Cryptography for Networks (SCN'08)","Proc. of Sixth Conference on Security and Cryptography for Networks (SCN'08)",,"Vol. LNCS Vol.5229",,"pp. 109-125",2008,Sept. "Isamu Teranishi,Wakaha Ogata","Relationship between Two Approaches for Defining the Standard Model PA-ness","The 13th Australasian Conference on Information Security and Privacy (ACISP'08)","Proc. of The 13th Australasian Conference on Information Security and Privacy (ACISP'08), LNCS",,"Vol. 5107",,"pp. 113-127",2008,July "Yoko Shono,Wakaha Ogata,Kunihiko Higa","テレワークのセキュリティ問題に対する考察","日本テレワーク学会研究発表会","日本テレワーク学会研究発表会予稿集",,,,,2008,June "Masaki ABE,Wakaha OGATA","Application of privacy protection RFID methods to large-scale systems",,"電子情報通信学会論文誌「基礎・境界:A」",,"Vol. J91-A","No. 3","pp. 399-410",2008,Mar. "平井康雅,松尾真一郎,Wakaha Ogata","暗号技術危殆化に伴う再署名に関する考察",,"情報処理学会研究報告",,"Vol. 2008","No. 21","pp. 201-206",2008,Mar. "Le Trieu Phong,Hiroto Matsuoka,Wakaha Ogata","Stateful Identity-Based Encryption Scheme: FasterEncryption and Decryption","ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)","Proc. of annual ACM Symposium on Information, Computer and Communications Security (ASIACCS'08)",,,,"pp. 381-388",2008,Mar. "Wakaha Ogata,Phong Le Trieu","Blind HIBE and its Application to Blind Decryption","The 2008 Symposium onCryptography and Information Security","SCIS2008",,,,"pp. 4D1-2",2008,Jan. "Isamu Teranishi,Takuro Oyama,Wakaha Ogata","General Conversion for Obtaining Strongly Existentially Unforgeable Signatures",,"IEICE Transaction",,"Vol. E91-A","No. 1","pp. 94-106",2008,Jan. "永井 慧,菊池浩明,Wakaha Ogata,西垣正勝","秘密計算に適する距離の使用によるリモート生体認証","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 2B3-3",2008,Jan. "Taiki Sakashita,Yoichi Shibata,Kenta Takahashi,Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","A Proposal of efficient remote Biometric Authentication Protocol","The 2008 Symposium on Cryptography and Information Security","SCIS2008",,,,"pp. 2B3-4",2008,Jan. "Isamu Teranishi,Wakaha Ogata","Relationship between Standard Model Plaintext Awareness and Message Hiding",,"IEICE Transaction",,"vol. E91-A","No. 1","pp. 244-261",2008,Jan. "Wakaha Ogata,Hiroaki Kikuchi,Masakatsu Nishigaki","Improvement of the biometric authentication system using ZKIP","The 30th Symposium on Information Theory and its Applications","The 30th Symposium on Information Theory and its Applications (SITA2007)",,,,"pp. 689-693",2007,Nov. "Isamu Teranishi,Takuro Oyama,Wakaha Ogata","General Conversion for Obtaining Strongly Existentially Unforgeable Signatures",,"Progress in Cryptology - INDOCRYPT 2006, Lecture Notes in Computer Science",,"Vol. 4329",,"pp. 191-205",2006,Dec. "Isamu Teranishi,Wakaha Ogata","Relationship between Standard Model Plaintext Awareness and Message Hiding",,"Advances in Cryptology – ASIACRYPT 2006, Lecture Notes in Computer Science",,"Vol. 4284",,"pp. 226-240",2006,Dec. "尾形わかは,菊池 浩明,西垣 正勝","リモートバイオメトリクス認証に有効な「近い」ことを示す零知識証明プロトコル",,"第29回情報理論とその応用シンポジウム予稿集 SITA2006,",,,,"pp. 319-322",2006,Nov. "永井慧,菊池浩明,尾形わかは,西垣正勝","ZeroBio -- 秘匿ニューラルネットワーク評価を用いた指紋認証システム",,"コンピュータセキュリティシンポジウム予稿集",,,,"pp. 633-638",2006,Oct. "Dan Yamamoto,Wakaha Ogata","Structured Aggregate Signatures",,"Proc. of SCIS 2006",,,,"pp. 3A4-3",2006,Jan. "飯野 徹,松尾 真一郎,松岡 廣登,尾形 わかは","省リソースデバイスに適したパスワード認証鍵交換",,"暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 3D3-3",2006,Jan. "山下 修平,尾形わかは","多項式を用いた秘密分散共有法に関する一考察",,"暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 1F2-2",2006,Jan. "Le Trieu Phong,Wakaha Ogata","On a Variation of Kurosawa-Desmedt Encryption Scheme",,"Proc. of SCIS 2006",,,,"pp. 2A2-3",2006,Jan. "松本直也,尾形わかは","ディジタル署名の安全性証明に関する研究",,"暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 3A2-1",2006,Jan. "Wakaha Ogata,Kaoru Kurosawa,Douglas R. Stinson","Optimum Secret Sharing Scheme Secure against Cheating",,"SIAM Journal of Discrete Mathematics",,"Vol. 20",,"pp. 79-95",2006, "Wakaha Ogata,Kaoru Kurosawa,Swee-Huay Heng","The Security of the FDH Variant of Chaum's Undeniable Signature Scheme",,"IEEE Trans. on Information Theory",,"Vol. 52","No. 5","pp. 2006-2017",2006, "飯野 徹,松尾真一郎,松岡廣登,尾形わかは","非対称3者間PAKEプロトコル",,"電子情報通信学会技術研究報告",,"Vol. 105","No. 396","pp. 63-70",2005,Nov. "W. Ogata,K. Kurosawa,S. H. Heng","The Security of the FDH Variant of Chaum's Undeniable Signature Scheme",,"Proc. of PKC2005, LNCS",,"Vol. 3386",,"pp. 328-345",2005, "N. Ishida,S. Mastuo,W. Ogata","Efficient Divisible Voting Scheme",,"IEICE Trans.",,"Vol. E88-A","No. 1","pp. 230-238",2005, "黒澤馨,尾形わかは","電子情報通信レクチャーシリーズ 『現代暗号の基礎数理』",,"電子情報通信学会編,コロナ社","電子情報通信学会編,コロナ社",,,,2004, "尾形 わかは,檜座 哲夫,ズォング ベト カン","RSA暗号を利用した効率的な木構造鍵管理方式",,"2004年 暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 195-200",2004, "石田夏樹,Wakaha Ogata","MIX-netと準同型性に基づいた電子投票方式",,"電子情報通信学会技術研究報告",,,,"pp. ISEC2004-61",2004, "W. Ogata,K. Kurosawa","Oblivious Keyword Search",,"Journal of Complexity",,"Vol. 20",,"pp. 356-371",2004, "W. Ogata,K. Kurosawa,D. R. Stinson,H. Saido","New Combinatorial Designs and Their Applications to Authentication Codes and Secret Sharing Schemes",,"Discrete Mathematics",,"Vol. 279/1-3",,"pp. 383-405",2004, "W. Ogata,R. Sasahara","k out of n Oblivious Transfer without Random Oracles",,"IEICE Trans.",,"Vol. E87-A",,"pp. 147-151",2004, "S.Matsuo,W.Ogata","Matching Oblivious Transfer: How to Exchange Valuable Data",,"IEICE Transaction",,"Vol. E86-A",,"pp. 189-193",2003, "S.Matsuo,W.Ogata","A Method for Exchanging Valuable Data : How to Realize Matching Oblivious Transfer",,"Proc. of 22nd ACM symposium on Principles of Distributed Computing (PODC)",,,,"pp. 201",2003, "N. Ishida,S. Matsuo,W. Ogata","Divisible Voting Scheme",,"Information security, Proc. of ISC 2003, Lecture Notes in Computer Science",,"Vol. 2851",,"pp. 137?150",2003, "石田夏樹,尾形わかは","準同型暗号系に基づいた分割可能な複数票電子投票方式",,"2003年 暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 197-202",2003, "S.Matsuo,W.Ogata","Electronic Ticket Scheme for ITS",,"IEICE Transaction",,"Vol. E86-A",,"pp. 142-150",2003, "Wakaha Ogata,Kaoru Kurosawa","Bounds for Metering Scheme and Their Relationship with A2-code",,"Proc. of Asiacrypt 2002, Lecture Notes in Computer Science",,"Vol. 2501",,"pp. 64-80",2002, "Kaoru Kurosawa,Wakaha Ogata","Bit Slice Auction Protocol",,"Proc. of ESORICS2002, Lecture Notes in Computer Science",,"Vol. 2502",,"pp. 24-38",2002, "松尾真一郎,Wakaha Ogata","分割可能な複数票電子投票方式",,"電子情報通信学会技術研究報告",,"Vol. 102","No. 511","pp. 1-6",2002, "Shin'ichiro Matsuo,Wakaha Ogata","データ交換可能な多対多マッチングプロトコル",,"2002年 暗号と情報セキュリティシンポジウム",,,,,2002, "Wataru Kishimoto,K.Okada,K.Kurosawa,W.Ogata","On the Bound for Anonymous Secret Sharing Schemes",,"Discrete Applied Mathematics",,"Vol. 121","Issue s 1-3","pp. 193-202",2001, "Wakaha Ogata,Kaoru Kurosawa","安全性が証明可能な metering scheme","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 875-880",2001, "K.Kurosawa,W.Ogata,Toshihiko Matsuo,S.Makishima","IND-CCA Public Key Schemes Equivalent to Factoring N=pq","PKC 2001","Lecture Notes in Computer Science, Proc. of PKC2001",,"Vol. 1992",,"pp. 36-47",2001, "W. Ogata","On the Practical Secret Sharing Scheme",,"IEICE Transaction",,"Vol. E84-A",,"pp. 256-261",2001, "Wakaha Ogata","実用的な秘密分散共有法 --- Robust Ramp Scheme",,"暗号と情報セキュリティシンポジウム",,"Vol. SCIS2000-A36",,,2000, "Wakaha Ogata,Kaoru Kurosawa","Provably Secure Metering Scheme",,"Lecture Notes in Computer Science, Proc. of Asiacrypt2000",,"Vol. 1976",,"pp. 388-398",2000, "板倉征男,岩田哲,Wakaha Ogata,Kaoru Kurosawa,Shigeo Tsujii","DNA情報を組み込んだ公開鍵暗号方式",,"電子情報通信学会技術研究報告",,"Vol. ISEC2000-42",,,2000, "K. Kurosawa,Wakaha Ogata","Efficient Rabin-type Digital Signature Scheme",,"Designs, Codes and Cryptography",,"Vol. 16","No. 1","pp. 53-64",1999, "Carlo Blundo,Alfredo De Santis,K. Kurosawa,Wakaha Ogata","Fallacious Bound for Authentication Codes",,"Journal of Cryptology",,"Vol. 12","No. 3","pp. 155-159",1999, "大西正晃,増田景一,Wakaha Ogata,坂上仁志,高橋豐","実景対応型イメージマップシステム","平11電気関係学会関西支部連合大会","平11電気関係学会関西支部連合大会",,"Vol. G13-11",,,1999, "中垣智宏,Wakaha Ogata,坂上仁志,高橋豐","ネットワークを介したメルチメディア・データ編集における排他制御機構","平11電気関係学会関西支部連合大会","平11電気関係学会関西支部連合大会",,"Vol. G13-5",,,1999, "平修一,Wakaha Ogata,坂上仁志,高橋豐","配送確認を行う電子メールシステムの構築","1999年電子情報通信学会総合大会","1999年電子情報通信学会総合大会予稿集",,,,"pp. 199",1999, "高谷和伯,Wakaha Ogata,坂上仁志,高橋豐","プライバシーを保護する鍵寄託方式","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 899-904",1999, "Kaoru Kurosawa,Wakaha Ogata","効率の良いRabin型デジタル署名方式","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 539-544",1999, "若林昌子,Wakaha Ogata,坂上仁志,高橋豐","最大限の秘匿を可能にする電子メールシステムの構築","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,,,"pp. 111-116",1999, "C.Blundo,A.De Santis,K.Kurosawa,W.Ogata","認証コードのある下界の誤りとその訂正","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,"Vol. SCIS'98-6.3.B",,,1998, "高谷和伯,Wakaha Ogata,坂上仁志,高橋豐","利用者のプライバシーを考慮した鍵寄託方式",,"平10電気関係学会関西支部連合大会",,"Vol. G13-6",,,1998, "志村一平,Wakaha Ogata,坂上仁志,高橋豐","セキュリティを考慮した遠隔ログインシステムの構築",,"平10電気関係学会関西支部連合大会",,"Vol. G13-7",,,1998, "Wakaha Ogata,Kaoru Kurosawa","Some Basic Properties of General Nonperfect Secret Sharing Schemes",,"Journal of Universal Computer Science",,"Vol. 4","No. 8","pp. 690-704",1998, "須永忠治,Wakaha Ogata,坂上仁志,高橋豐","群離脱認識プロトコルの経路制御への応用","平10電気関係学会関西支部連合大会","平10電気関係学会関西支部連合大会",,"Vol. G13-16",,,1998, "山地宏,Wakaha Ogata,坂上仁志,高橋豐","相互仮想現実感でのデータ伝送遅延の影響評価装置",,"平10電気関係学会関西支部連合大会",,"Vol. G13-8",,,1998, "Wakaha OGATA,Kaoru KUROSAWA,Kazunori TAKATANI","(k,n)閾値匿名通信路とその応用",,"暗号と情報セキュリティシンポジウム",,"Vol. SCIS'97-27F",,,1997, "Wakaha Ogata,高谷和伯","効率的な票分割型電子投票方式の構成","電子情報通信学会総合大会","電子情報通信学会総合大会予稿集",,,,,1997, "須永忠治,Wakaha Ogata,坂上仁志,高橋豐","群れ離脱認識プロトコルのLANへの実装","電子情報通信学会1997年ソサイエティ大会","電子情報通信学会1997年ソサイエティ大会講演論文集",,"Vol. B-7-140",,,1997, "Wakaha OGATA,Kaoru KUROSAWA,Kazue Sako,Kazunori TAKATANI","Fault Tolerant Anonymous Channel",,"Proc. of ICICS'97, Lecture Notes in Computer Science",,"Vol. 1334",,"pp. 440-444",1997, "Kaoru Kurosawa,Yutaka Katayama,Wakaha OGATA","Reshufflable and Laziness Tolerant Mental Card Game Protocol",,"IEICE Transaction",,"Vol. E80-A",,"pp. 72-78",1997, "K.Okada,W.Ogata,K.Sakano,K.Kurosawa","Analysis on Secret Sharing Schemes with Non-Graphical Access Structures",,"IEICE Transaction",,"Vol. E80-A",,"pp. 85-89",1997, "Wakaha OGATA,Keiichi SAKANO,Kaoru KUROSAWA","Multisymbol Majority Vote and Hard Core",,"Information Processing Letters",,"Vol. 58",,"pp. 285-292",1996, "Wakaha Ogata,Kaoru Kurosawa","不正者に対して最も安全な秘密分散共有法",,"電子情報通信学会技術研究報告",,"Vol. ISEC96-41",,,1996, "Wakaha Ogata,Kaoru Kurosawa","Optimum Secret Sharing Scheme Secure against Cheating","Eurocrypt'96","Proc. of Eurocrypt'96, Lecture Notes in Computer Science",,"Vol. 1070",,"pp. 200-211",1996, "Kaoru Kurosawa,Satoshi Obana,Wakaha Ogata","t-Cheater Identifiable (k,n) Threshold Secret Sharing Schemes","CRYPTO'95","Proc. of CRYPTO'95, Lecture Notes in Computer Science",,"Vol. 963",,"pp. 410-423",1995, "Kaoru Kurosawa,Wakaha Ogata,Shigeo Tsujii","4-move Perfect ZKIP for Some Promise Problem",,"IEICE Transaction",,"Vol. E78-A",,"pp. 34-41",1995, "小林康喜,広田吉希,Wakaha Ogata,坂上仁志,高橋豐","群分割のシミュレーション",,"平7電気関係学会関西支部連合大会",,"Vol. G13-8",,,1995, "Wakaha OGATA,Kaoru KUROSAWA","Some new results on nonperfect secret sharing schemes",,"電子情報通信学会技術研究報告",,"Vol. ISEC95-44",,,1995, "Wakaha Ogata","A Study on Secret Sharing Schemes and Computational Cryptology",,,,,,,1994, "K.Kurosawa,Y.Katayama,W.Ogata","Reshufflable and laziness tolerant mantal card game protocol","応用数理学会平成6年度年会","応用数理学会平成6年度年会予稿集",,,,"pp. 164",1994, "Wakaha Ogata,Kaoru Kurosawa","On claw free families",,"IEICE Transaction",,"Vol. E77-A",,"pp. 72-80",1994, "Wakaha Ogata,Kaoru Kurosawa,Shigeo Tsujii","Nonperfect secret sharing scheme",,"Proc. of the 1993 Symposium on Cryptography and Information Security",,"Vol. SCIS'93-16D",,,1993, "K.Kurosawa,K.Okada,K.Sakano,W.Ogata,S.Tsujii","Nonperfect Secret Sharing Schemes and Matroids","Eurocrypt'93","Proc. of Eurocrypt'93, Lecture Notes in Computer Science",,"Vol. 765",,"pp. 126-141",1993, "Wakaha Ogata,阪野恵市,Kaoru Kurosawa","Multivalued hard core",,"Proc. of the 1993 Symposium on Cryptography and Information Security",,"Vol. SCIS'93-9B",,,1993, "岡田光司,Wakaha Ogata,Kaoru Kurosawa","An Optimal share size in a perfect secret sharing scheme","暗号と情報セキュリティシンポジウム","Proc. of the 1993 Symposium on Cryptography and Information Security",,"Vol. SCIS'93-11C",,,1993, "W.Ogata,K.Kurosawa,S.Tsujii","Nonperfect Secret Sharing Schemes",,"Proc. of Auscrypt'92, Lecture Notes in Computer Science",,"Vol. 718",,"pp. 56-66",1992, "Wakaha Ogata,阪野恵市,Kaoru Kurosawa","多値のハードコアのインバータ","暗号と情報セキュリティシンポジウム","暗号と情報セキュリティシンポジウム予稿集",,"Vol. SCIS'92-4D",,,1992, "Wakaha Ogata,Kaoru Kurosawa","On Claw free Families","Asiacrypt'91","Proc. of Asiacrypt'91, Lecture Notes in Computer Science",,"Vol. 739",,"pp. 111-123",1991, "Wakaha Ogata,Kaoru Kurosawa","Claw free familyの構成法",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-22",,,1990, "K.Kurosawa,Y.Katayama W.Ogata,Wakaha Ogata,S.Tsujii","General Public key residue cryptosystem and mental poker protocols","Eurocrypt'90","Proc. of Eurocrypt'90, Lecture Notes in Computer Science",,"Vol. 473",,"pp. 374-388",1990, "Kaoru Kurosawa,Wakaha Ogata,Shigeo Tsujii","4 move ゼロ知識証明",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-15",,,1990, "Kaoru Kurosawa,Wakaha Ogata,Shigeo Tsujii","2 move ゼロ知識証明",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-14",,,1990, "Kaoru Kurosawa,Wakaha Ogata,Toshiya Itoh,Shigeo Tsujii","4-move zero-knowledge interactive proof systems",,"電子情報通信学会技術研究報告",,"Vol. ISEC90-39",,,1990, "Kaoru Kurosawa,Wakaha Itakura,片山裕","多次剰余のゼロ知識証明とそのmental pokerへの応用","第12回情報理論とその応用シンポジウム","第12回情報理論とその応用シンポジウム予稿集",,,,"pp. 453-458",1989, "Yusuke Katayama,Wakaha Itakura,Kaoru Kurosawa","ゼロ知識証明における通信量の削減について",,"電子情報通信学会技術研究報告",,"Vol. ISEC89-37",,,1989,