Satoshi Obana

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Verifiably Multiplicative Secret Sharing
IEEE Transactions on Information Theory
2019-07-19Paper
An efficient construction of non-interactive secure multiparty computation2018-10-26Paper
Almost optimum secret sharing schemes with cheating detection for random bit strings2018-10-24Paper
On the (in)efficiency of non-interactive secure multiparty computation
Designs, Codes and Cryptography
2018-07-03Paper
Verifiably multiplicative secret sharing2018-03-16Paper
Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
Lecture Notes in Computer Science
2017-01-06Paper
Privacy-preserving fingerprint authentication resistant to hill-climbing attacks
Lecture Notes in Computer Science
2016-05-19Paper
On the (in)efficiency of non-interactive secure multiparty computation
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Cheating detectable secret sharing schemes supporting an arbitrary finite field
Advances in Information and Computer Security
2015-05-27Paper
Almost optimum \(t\)-cheater identifiable secret sharing schemes
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
An implementation of a universally verifiable electronic voting scheme based on shuffling
Financial Cryptography
2011-04-20Paper
Flaws in Some Secret Sharing Schemes Against Cheating
Information Security and Privacy
2009-03-06Paper
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Advances in Cryptology - EUROCRYPT 2004
Lecture Notes in Computer Science
2007-09-25Paper
Combinatorial classification of optimal authentication codes with arbitration
Designs, Codes and Cryptography
2002-01-31Paper
scientific article; zbMATH DE number 1676650 (Why is no real title available?)2001-11-25Paper
Combinatorial bounds on authentication codes with arbitration.
Designs, Codes and Cryptography
2001-07-03Paper
Bounds and combinatorial structure of \((k,n)\) multi-receiver \(A\)-codes
Designs, Codes and Cryptography
2001-02-18Paper
scientific article; zbMATH DE number 1500491 (Why is no real title available?)2000-09-04Paper
A2-code = Affine resolvable + BIBD
Information and Communications Security
1998-07-03Paper
scientific article; zbMATH DE number 1030973 (Why is no real title available?)1997-11-23Paper
Veto is impossible in secret sharing schemes
Information Processing Letters
1997-02-27Paper


Research outcomes over time


This page was built for person: Satoshi Obana