Updated on 2026/03/05

写真a

 
OGATA WAKAHA
 
Organization
School of Engineering Professor
Title
Professor
External link

News & Topics

Degree

  • Doctor of Engineering ( Tokyo Institute of Technology )

Research Interests

  • Modern Cryptology

  • 情報セキュリティ

  • Information security

  • 現代暗号理論

Research Areas

  • Manufacturing Technology (Mechanical Engineering, Electrical and Electronic Engineering, Chemical Engineering) / Communication and network engineering

Education

  • 東京工業大学大学院   理工学研究科   電気・電子工学専攻

    - 1994

      More details

    Country: Japan

    researchmap

  • Tokyo Institute of Technology   School of Science   Dept. of Physics

    - 1989

      More details

    Country: Japan

    researchmap

Research History

Professional Memberships

  • 日本セキュリティ・マネジメント学会

      More details

  • 電子情報通信学会

      More details

Papers

  • Round-Optimal Authenticated Key Exchange with Full Forward Privacy

    Koki Matsui, Shoma Kanzaki, Wakaha Ogata, Keitaro Hashimoto

    IACR Communications in Cryptology   2025.7

     More details

    Publishing type:Research paper (scientific journal)  

    DOI: 10.62056/a0iv7ta5v

    researchmap

  • Security Model for Authenticated Key Exchange, Reconsidered Reviewed International journal

    Xichen Zhang, Keitaro Hashimoto, Wakaha Ogata

    Lecture Notes in Computer Science   251 - 271   2024.9

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Nature Switzerland  

    DOI: 10.1007/978-3-031-71073-5_12

    researchmap

  • Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext Reviewed International journal

    Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata

    Designs, Codes and Cryptography   2024.2

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1007/s10623-023-01309-2

    researchmap

  • Perfectly Secure Oblivious Priority Queue Reviewed International journal

    Atsunori ICHIKAWA, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E106.A ( 3 )   272 - 280   2023.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.2022cip0019

    researchmap

  • Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK Reviewed International journal

    Toi TOMITA, Wakaha OGATA, Kaoru KUROSAWA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E105.A ( 3 )   143 - 159   2022.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.2021cip0003

    researchmap

  • Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service Reviewed International journal

    Yoshifumi SAITO, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E105.A ( 3 )   203 - 213   2022.3

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.2021cip0004

    researchmap

  • CCA-Secure Leakage-Resilient Identity-Based Encryption without q-Type Assumptions Reviewed

    Toi TOMITA, Wakaha OGATA, Kaoru KUROSAWA, Ryo KUWAYAMA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E103.A ( 10 )   1157 - 1166   2020.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.2019dmp0013

    Scopus

    researchmap

  • Communication Protocol Between Humans and Bank Server Secure Against Man-in-the-Browser Attacks Reviewed International journal

    Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki

    Advances in Intelligent Systems and Computing   503 - 509   2020.1

     More details

    Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-39512-4_79

    researchmap

  • Multidivisible Online/Offline Cryptography and Its Application to Signcryptions Reviewed International journal

    Dan Yamamoto, Wakaha Ogata

    Security and Communication Networks   2019   1 - 21   2019.10

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Wiley  

    We introduce a general concept of multidivisible online/offline (MDO) cryptography, which covers the previous works including online/offline cryptographic schemes, divisible online/offline signatures, incrementally executable signcryptions, and multidivisible online/offline encryptions. We then present the notion of multidivisible online/offline signcryptions (MDOSCs) as novel application of MDO cryptography. We define several security notions for MDOSCs and show implications and separations between these security notions. We also present a generic construction of MDOSC that achieves the strongest security notions with regard to confidentiality and unforgeability. Using MDOSC schemes, the computationally restricted and/or bandwidth-restricted devices can transmit messages in both confidential and authenticated way with low computational overhead and/or low-bandwidth network.

    DOI: 10.1155/2019/1042649

    researchmap

    Other Link: http://downloads.hindawi.com/journals/scn/2019/1042649.xml

  • Security analysis of secure kNN and ranked keyword search over encrypted data Reviewed International journal

    Wakaha Ogata, Takaaki Otemori

    International Journal of Information Security   19 ( 4 )   419 - 425   2019.8

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s10207-019-00461-y

    researchmap

    Other Link: http://link.springer.com/article/10.1007/s10207-019-00461-y/fulltext.html

  • Unrestricted and compact certificateless aggregate signature scheme Reviewed International journal

    Keitaro Hashimoto, Wakaha Ogata

    Information Sciences   487   97 - 114   2019.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Elsevier BV  

    DOI: 10.1016/j.ins.2019.03.005

    researchmap

  • Efficient Secure Multi-Party Protocols for Decision Tree Classification Reviewed International journal

    Atsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi

    Lecture Notes in Computer Science   362 - 380   2019.5

     More details

    Language:English   Publishing type:Part of collection (book)   Publisher:Springer International Publishing  

    DOI: 10.1007/978-3-030-21548-4_20

    researchmap

  • No-Dictionary Searchable Symmetric Encryption Reviewed International journal

    Wakaha OGATA, Kaoru KUROSAWA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E102.A ( 1 )   114 - 124   2019.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.e102.a.114

    Scopus

    researchmap

  • CCA-secure leakage-resilient identity-based key-encapsulation from simple (Not q-type) assumptions Reviewed

    Toi Tomita, Wakaha Ogata, Kaoru Kurosawa

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   11689   3 - 22   2019

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-030-26834-3_1

    Scopus

    researchmap

  • General Constructions of Computer-aided Security Schemes

    Yasuyoshi, Jinno, Takashi, Tsuchiya, Tetsushi, Ohki, Kenta, Takahashi, Wakaha, Ogata, Masakatsu, Nishigaki

    59 ( 9 )   1557 - 1569   2018.9

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    CiNii Books

    CiNii Research

    researchmap

    Other Link: https://shizuoka.repo.nii.ac.jp/records/10846

  • Computational SS and conversion protocols in both active and passive settings Reviewed International journal

    Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata

    IET Information Security   11 ( 5 )   287 - 293   2017.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institution of Engineering and Technology (IET)  

    DOI: 10.1049/iet-ifs.2016.0276

    researchmap

    Other Link: https://onlinelibrary.wiley.com/doi/full-xml/10.1049/iet-ifs.2016.0276

  • Efficient no-dictionary verifiable searchable symmetric encryption Reviewed

    Wakaha Ogata, Kaoru Kurosawa

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   10322   498 - 516   2017

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/978-3-319-70972-7_28

    Scopus

    researchmap

  • Multi-Divisible On-Line/Off-Line Encryptions Reviewed International journal

    Dan YAMAMOTO, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E100.A ( 1 )   91 - 102   2017

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.e100.a.91

    researchmap

  • 3-2 Information Theoretically Secure Distributed Storage with QKD and Password-Authenticated Secret Sharing

    Mikio Fujiwara, Atsushi Waseda, Ryo Nojima, Shiho Moriai, Wakaha Ogata, Masahide Sasaki

    Journal of the National Institute of Information and Communications Technology   2017

     More details

    Language:English   Publishing type:Research paper (bulletin of university, research institution)  

    DOI: 10.24812/nictjournal.64.1_023

    researchmap

  • Computationally Secure Verifiable Secret Sharing Scheme for Distributing Many Secrets Reviewed International journal

    Wakaha OGATA, Toshinori ARAKI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E100.A ( 1 )   103 - 114   2017

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.e100.a.103

    researchmap

  • Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing Reviewed International journal

    Mikio Fujiwara AND, 藤原, 幹生, AND Aatsushi Waseda AND, 早稲田, 篤志, AND Ryo, Nojima AND, 野島 良 AND Shiho Moriai AND, 盛合, 志帆, AND Wakaha Ogata AND, 尾形, わかは AND, Masahide, Sasaki AND, 佐々木, 雅

    Scientific Reports   2016.7

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    <jats:title>Abstract</jats:title><jats:p>Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct them, the data owner should gather plural pieces. Shamir’s (<jats:italic>k, n</jats:italic>)-threshold scheme, in which the data are split into <jats:italic>n</jats:italic> pieces (shares) for storage and at least <jats:italic>k</jats:italic> pieces of them must be gathered for reconstruction, furnishes information theoretic security, that is, even if attackers could collect shares of less than the threshold <jats:italic>k</jats:italic>, they cannot get any information about the data, even with unlimited computing power. Behind this scenario, however, assumed is that data transmission and authentication must be perfectly secure, which is not trivial in practice. Here we propose a totally information theoretically secure distributed storage system based on a user-friendly single-password-authenticated secret sharing scheme and secure transmission using quantum key distribution and demonstrate it in the Tokyo metropolitan area (≤90 km).</jats:p>

    DOI: 10.1038/srep28988

    researchmap

  • Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation Reviewed

    Ryo Kikuchi, Koji Chida, Dai Ikarashi, Wakaha Ogata, Koki Hamada, Katsumi Takahashi

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E98A ( 1 )   213 - 222   2015.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E98.A.213

    Web of Science

    researchmap

  • Cheating Detectable Secret Sharing Schemes for Random Bit Strings Reviewed International journal

    Wakaha OGATA, Toshinori ARAKI

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E96.A ( 11 )   2230 - 2234   2013

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transfun.e96.a.2230

    researchmap

  • Undeniable and Unpretendable Signatures Reviewed

    Le Trieu Phong, AND Kaoru, Kurosawa AND, 黒澤 馨, AND Wakaha Ogata AND, 尾形 わかは

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   95-A ( 1 )   138 - 150   2012

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E95.A.138

    researchmap

    Other Link: http://dblp.uni-trier.de/db/journals/ieicet/ieicet95a.html#journals/ieicet/PhongKO12

  • Provably Secure On-Line Secret Sharing Scheme Reviewed

    Tatsumi Oba, Wakaha Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E94A ( 1 )   139 - 149   2011.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1587/transfun.E94.A.139

    Web of Science

    researchmap

  • Provably Secure Convertible Undeniable Signatures with Unambiguity Reviewed

    Le Trieu Phong, AND Kaoru, Kurosawa AND, Wakaha Ogata

    Security and Cryptography for Networks (SCN) 2010   291 - 308   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-642-15317-4_19

    researchmap

  • A Framework for Constructing Convertible Undeniable Signatures. Reviewed International journal

    Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata

    Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings   70 - 86   2010

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer  

    DOI: 10.1007/978-3-642-16280-0_5

    researchmap

  • New RSA-Based (Selectively) Convertible Undeniable Signature Schemes Reviewed International journal

    Le Trieu PHONG, Kaoru KUROSAWA, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E93-A ( 1 )   63 - 75   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers ({IEICE})  

    DOI: 10.1587/transfun.e93.a.63

    researchmap

  • Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels Reviewed International journal

    Toshinori ARAKI, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E93-A ( 1 )   126 - 135   2010

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers ({IEICE})  

    DOI: 10.1587/transfun.e93.a.126

    researchmap

  • Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate Reviewed International journal

    Kouichi ITOH, Tetsuya IZU, Wakaha OGATA, Takeshi SHIMOYAMA, Masahiko TAKENAKA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 1 )   67 - 75   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers ({IEICE})  

    DOI: 10.1587/transfun.e92.a.67

    researchmap

  • Collision-Based Power Attack for RSA with Small Public Exponent Reviewed International journal

    Kouichi ITOH, Dai YAMAMOTO, Jun YAJIMA, Wakaha OGATA

    IEICE Transactions on Information and Systems   E92-D ( 5 )   897 - 908   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers (IEICE)  

    DOI: 10.1587/transinf.e92.d.897

    researchmap

  • A Proposal of Efficient Remote Biometric Authentication Protocol Reviewed

    Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki

    Lecture Notes in Computer Science   212 - 227   2009

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Berlin Heidelberg  

    DOI: 10.1007/978-3-642-04846-3_14

    researchmap

  • New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model Reviewed International journal

    Le Trieu PHONG, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 8 )   1822 - 1835   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers ({IEICE})  

    DOI: 10.1587/transfun.e92.a.1822

    researchmap

  • New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model Reviewed International journal

    Le Trieu PHONG, Wakaha OGATA

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences   E92-A ( 8 )   1822 - 1835   2009

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Institute of Electronics, Information and Communications Engineers ({IEICE})  

    DOI: 10.1587/transfun.e92.a.1822

    researchmap

  • General conversion for obtaining strongly existentially unforgeable signatures Reviewed International journal

    Isamu Teranishi, Takuro Oyama, Wakaha Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 1 )   94 - 106   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e9l-a.1.94

    Web of Science

    researchmap

  • Relationship between standard model plaintext awareness and message hiding Reviewed International journal

    Isamu Teranishi, Wakaha Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 1 )   244 - 261   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e91-a.1.244

    Web of Science

    researchmap

  • Relationship between standard model plaintext awareness and message hiding Reviewed International journal

    Isamu Teranishi, Wakaha Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E91A ( 1 )   244 - 261   2008.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e91-a.1.244

    Web of Science

    researchmap

  • Stateful identity-based encryption scheme: faster encryption and decryption. Reviewed

    Le Trieu Phong, Hiroto Matsuoka, Wakaha Ogata

    Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008   381 - 388   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:ACM  

    DOI: 10.1145/1368310.1368367

    researchmap

    Other Link: http://dblp.uni-trier.de/db/conf/ccs/asiaccs2008.html#conf/ccs/PhongMO08

  • Application of privacy protection RFID methods to large-scale systems Reviewed

    Masaki ABE, Wakaha OGATA

    J91-A ( 3 )   399 - 410   2008

     More details

    Language:Japanese   Publishing type:Research paper (scientific journal)  

    researchmap

  • Relationship between Two Approaches for Defining the Standard Model PA-ness Reviewed

    Isamu Teranishi, Wakaha Ogata

    Lecture Notes in Computer Science   113 - 127   2008

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Berlin Heidelberg  

    DOI: 10.1007/978-3-540-70500-0_9

    researchmap

  • On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme. Reviewed International journal

    Le Trieu Phong, Wakaha Ogata

    IEICE Transactions   90-A ( 1 )   226 - 230   2007

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/e90-a.1.226

    researchmap

  • The security of the FDH variant of Chaum's undeniable signature scheme Reviewed International journal

    W. Ogata, K. Kurosawa, Swee-Huay Heng

    IEEE Transactions on Information Theory   52 ( 5 )   2006 - 2017   2006.5

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/tit.2006.872853

    Web of Science

    researchmap

  • The security of the FDH variant of Chaum's undeniable signature scheme Reviewed International journal

    W. Ogata, K. Kurosawa, Swee-Huay Heng

    IEEE Transactions on Information Theory   52 ( 5 )   2006 - 2017   2006.5

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1109/tit.2006.872853

    Web of Science

    researchmap

  • Optimum secret sharing scheme secure against cheating Reviewed International coauthorship International journal

    W Ogata, K Kurosawa, DR Stinson

    SIAM JOURNAL ON DISCRETE MATHEMATICS   20 ( 1 )   79 - 95   2006

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1137/S0895480100378689

    Web of Science

    researchmap

  • Relationship between standard model plaintext awareness and message hiding Reviewed

    Isamu Teranishi, Wakaha Ogata

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2006   4284   226 - +   2006

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Optimum secret sharing scheme secure against cheating Reviewed International coauthorship International journal

    W Ogata, K Kurosawa, DR Stinson

    SIAM JOURNAL ON DISCRETE MATHEMATICS   20 ( 1 )   79 - 95   2006

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1137/S0895480100378689

    Web of Science

    researchmap

  • Efficient divisible voting scheme Reviewed International journal

    N Ishida, S Matsuo, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E88A ( 1 )   230 - 238   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.230

    Web of Science

    researchmap

  • Efficient divisible voting scheme Reviewed International journal

    N Ishida, S Matsuo, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E88A ( 1 )   230 - 238   2005.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1093/ietfec/E88-A.1.230

    Web of Science

    researchmap

  • The Security of the FDH Variant of Chaum’s Undeniable Signature Scheme Reviewed International journal

    Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng

    Lecture Notes in Computer Science   328 - 345   2005

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Berlin Heidelberg  

    DOI: 10.1007/978-3-540-30580-4_23

    researchmap

  • Oblivious keyword search Reviewed International journal

    W Ogata, K Kurosawa

    JOURNAL OF COMPLEXITY   20 ( 2-3 )   356 - 371   2004.4

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jco.2003.08.023

    Web of Science

    researchmap

  • Oblivious keyword search Reviewed International journal

    W Ogata, K Kurosawa

    JOURNAL OF COMPLEXITY   20 ( 2-3 )   356 - 371   2004.4

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/j.jco.2003.08.023

    Web of Science

    researchmap

  • New combinatorial designs and their applications to authentication codes and secret sharing schemes Reviewed International coauthorship International journal

    W Ogata, K Kurosawa, DR Stinson, H Saido

    DISCRETE MATHEMATICS   279 ( 1-3 )   383 - 405   2004.3

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0012-365X(03)00283-8

    Web of Science

    researchmap

  • New combinatorial designs and their applications to authentication codes and secret sharing schemes Reviewed International coauthorship International journal

    W Ogata, K Kurosawa, DR Stinson, H Saido

    DISCRETE MATHEMATICS   279 ( 1-3 )   383 - 405   2004.3

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0012-365X(03)00283-8

    Web of Science

    researchmap

  • k out of n oblivious transfer without random oracles Reviewed International journal

    Wakaha Ogata, Ryota Sasahara

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E87A ( 1 )   147 - 151   2004.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    CiNii Books

    researchmap

  • Electronic ticket scheme for ITS Reviewed International journal

    S Matsuo, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E86A ( 1 )   142 - 150   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Matching oblivious transfer: How to exchange valuable data Reviewed International journal

    S Matsuo, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E86A ( 1 )   189 - 193   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Matching oblivious transfer: How to exchange valuable data Reviewed International journal

    S Matsuo, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E86A ( 1 )   189 - 193   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Electronic ticket scheme for ITS Reviewed International journal

    S Matsuo, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E86A ( 1 )   142 - 150   2003.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • On the bound for anonymous secret sharing schemes Reviewed

    Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Wakaha Ogata

    Discrete Applied Mathematics   121 ( 1-3 )   193 - 202   2002.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0166-218X(01)00236-0

    Scopus

    researchmap

  • On the bound for anonymous secret sharing schemes Reviewed

    Wataru Kishimoto, Koji Okada, Kaoru Kurosawa, Wakaha Ogata

    Discrete Applied Mathematics   121 ( 1-3 )   193 - 202   2002.9

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/S0166-218X(01)00236-0

    Scopus

    researchmap

  • Bounds for robust metering schemes and their relationship with A^2-code Reviewed International journal

    W Ogata, K Kurosawa

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS   2501   64 - 80   2002

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Bit-slice auction circuit Reviewed

    K Kurosawa, W Ogata

    COMPUTER SECURITY - ESORICS 2002, PROCEEDINGS   2502   24 - 38   2002

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • On the practical secret sharing scheme Reviewed International journal

    W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E84A ( 1 )   256 - 261   2001.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • On the practical secret sharing scheme Reviewed International journal

    W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E84A ( 1 )   256 - 261   2001.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • IND-CCA public key schemes equivalent to factoring n=pq Reviewed International journal

    K Kurosawa, W Ogata, T Matsuo, S Makishima

    PUBLIC KEY CRYPTOGRAPHY, PROCEEDINGS   1992   36 - 47   2001

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • Provably secure metering scheme Reviewed

    W Ogata, K Kurosawa

    ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS   1976   388 - 398   2000

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • On a Fallacious Bound for Authentication Codes Reviewed International coauthorship International journal

    Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata

    Journal of Cryptology   12 ( 3 )   155 - 159   1999.6

     More details

    Language:English   Publishing type:Research paper (scientific journal)   Publisher:Springer Science and Business Media LLC  

    DOI: 10.1007/s001459900049

    Scopus

    researchmap

    Other Link: http://link.springer.com/article/10.1007/s001459900049/fulltext.html

  • Efficient Rabin-type digital signature scheme Reviewed

    K Kurosawa, W Ogata

    DESIGNS CODES AND CRYPTOGRAPHY   16 ( 1 )   53 - 64   1999.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Efficient Rabin-type digital signature scheme Reviewed

    K Kurosawa, W Ogata

    DESIGNS CODES AND CRYPTOGRAPHY   16 ( 1 )   53 - 64   1999.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Some Basic Properties of General Nonperfect Secret Sharing Schemes Reviewed International journal

    Wakaha Ogata, Kaoru Kurosawa

    Journal of Universal Computer Science   4 ( 8 )   690 - 704   1998.8

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.3217/jucs-004-08-0690

    researchmap

  • Reshufflable and laziness tolerant mental card game protocol Reviewed International journal

    K Kurosawa, Y Katayama, W Ogata

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E80A ( 1 )   72 - 78   1997.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Analysis on secret sharing schemes with non-graphical access structures Reviewed

    K Okada, W Ogata, K Sakano, K Kurosawa

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E80A ( 1 )   85 - 89   1997.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Analysis on secret sharing schemes with non-graphical access structures Reviewed

    K Okada, W Ogata, K Sakano, K Kurosawa

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E80A ( 1 )   85 - 89   1997.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Fault tolerant anonymous channel Reviewed

    Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani

    Lecture Notes in Computer Science   440 - 444   1997

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Berlin Heidelberg  

    DOI: 10.1007/bfb0028500

    researchmap

  • Multisymbol majority vote and hard core Reviewed

    W Ogata, K Sakano, K Kurosawa

    INFORMATION PROCESSING LETTERS   58 ( 6 )   285 - 292   1996.6

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    DOI: 10.1016/0020-0190(96)00058-0

    Web of Science

    researchmap

  • Optimum secret sharing scheme secure against cheating Reviewed

    W Ogata, K Kurosawa

    ADVANCES IN CRYPTOLOGY - EUROCRYPT '96   1070   200 - 211   1996

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • 4-MOVE PERFECT ZKIP FOR SOME PROMISE PROBLEMS Reviewed International journal

    K KUROSAWA, W OGATA, S TSUJII

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E78A ( 1 )   34 - 41   1995.1

     More details

    Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • t-Cheater identifiable (k,n) threshold secret sharing schemes Reviewed

    K Kurosawa, S Obana, W Ogata

    ADVANCES IN CRYPTOLOGY - CRYPTO '95   963   410 - 423   1995

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

  • ON CLAW FREE FAMILIES Reviewed International journal

    W OGATA, K KUROSAWA

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E77A ( 1 )   72 - 80   1994.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • ON CLAW FREE FAMILIES Reviewed International journal

    W OGATA, K KUROSAWA

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES   E77A ( 1 )   72 - 80   1994.1

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (scientific journal)  

    Web of Science

    researchmap

  • Multivalued hard core

    Proc. of the 1993 Symposium on Cryptography and Information Security   1993

     More details

  • An Optimal share size in a perfect secret sharing scheme

    Proc. of the 1993 Symposium on Cryptography and Information Security   1993

     More details

  • Nonperfect secret sharing schemes Reviewed

    Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)   718   56 - 66   1993

     More details

    Authorship:Lead author   Language:English   Publishing type:Research paper (international conference proceedings)   Publisher:Springer Verlag  

    DOI: 10.1007/3-540-57220-1_52

    Scopus

    researchmap

  • GENERAL PUBLIC KEY RESIDUE CRYPTOSYSTEMS AND MENTAL POKER PROTOCOLS Reviewed

    K KUROSAWA, Y KATAYAMA, W OGATA, S TSUJII

    LECTURE NOTES IN COMPUTER SCIENCE   473   374 - 388   1991

     More details

    Language:English   Publishing type:Research paper (international conference proceedings)  

    Web of Science

    researchmap

▼display all

Books

  • 電子情報通信レクチャーシリーズ 『現代暗号の基礎数理』

    電子情報通信学会編,コロナ社  2004 

     More details

MISC

▼display all

Presentations

  • Design and Evaluation of User Interface for Server-Aided In-Brain Signature

    Harada, Ryunosuke, Hatakeyama, Wataru, Enomoto, Sena, Hasegawa, Kakeru, Tomita, Toi, Takahashi, Kenta, Ogata, Wakaha, Nishigaki, Masakatsu

    IPSJ SIG Technical Report  2024.7 

     More details

    Event date: 2024.7

    Language:Japanese  

    researchmap

  • Secure Communication Protocol between Humans and a Bank Server Secure against Man-In-The-Browser Attack

    Koki, Mukaihira, Yasuyoshi, Jinno, Takashi, Tsuchiya, Tetsushi, Ohki, Kenta, Takahashi, Wakaha, Ogata, Masakatsu, Nishigaki

    2019.12 

     More details

    Event date: 2019.12

    Language:Japanese  

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00201431/

  • General Constructions of Computer-aided Security Schemes

    Yasuyoshi, Jinno, Takashi, Tsuchiya, Tetsushi, Ohki, Kenta, Takahashi, Wakaha, Ogata, Masakatsu, Nishigaki

    2018.9 

     More details

    Event date: 2018.9

    Language:Japanese  

    researchmap

    Other Link: https://shizuoka.repo.nii.ac.jp/records/10846

  • Man In The Browser攻撃対策を実現する人間・銀行サーバ間のセキュア通信プロトコル(その3)—技術と社会・倫理

    向平 浩貴, 神農 泰圭, 土屋 貴史, 大木 哲史, 高橋 健太, 尾形 わかは, 西垣 正勝

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報  2018.7  東京 : 電子情報通信学会

     More details

    Event date: 2018.7

    Language:Japanese  

    researchmap

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I029142740

  • Secure Communications Protocol Between Humans and a Bank Server to Prevent Man In The Browser Attack (part 2)

    2017.2 

     More details

    Event date: 2017.2

    Language:Japanese  

    researchmap

  • A Study on Construction and Security of Computer Aided Security System

    Computer Security Symposium 2016  2016.10 

     More details

    Event date: 2016.10

    Language:Japanese  

    researchmap

    Other Link: https://ipsj.ixsq.nii.ac.jp/records/175863

  • A Study o n Formularization of Computer Aided Computational Security

    2016 Symposium on Cryptography and Information Security  2016.1 

     More details

    Event date: 2016.1

    Language:Japanese  

    researchmap

  • 能動的な不正に対して安全な不正検出可能パスワード付秘密分散法—Cheating detectable multi-use password protected secret sharing secure against active adversary—情報セキュリティ

    市川 敦謙, 尾形 わかは

    電子情報通信学会技術研究報告 = IEICE technical report : 信学技報  2015.5  東京 : 電子情報通信学会

     More details

    Event date: 2015.5

    Language:Japanese  

    researchmap

    Other Link: https://ndlsearch.ndl.go.jp/books/R000000004-I026495344

  • 実用的な多機能検索可能暗号方式 ~身も蓋もない方式を考えてみた~

    尾形わかは, 松尾真一郎, 金岡晃

    2015年暗号と情報セキュリティシンポジウム(SCIS 2015)  2015.1 

     More details

    Event date: 2015.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 複数キーワードによるランク付き検索可能暗号の改善

    ユ サンウォン, 尾形わかは

    暗号と情報セキュリティシンポジウム  2015.1 

     More details

    Event date: 2015

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Searchable symmetrc encryptionはどこまで安全にすべきか?

    尾形わかは, 金岡 晃, 松尾真一郎

    2011年暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Event date: 2011.1

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ChaumのUndeniable Signatureの安全性評価

    尾形わかは, 黒澤馨, ヘンスィーフィー

    暗号と情報セキュリティシンポジウム(SCIS2005)  2005.1 

     More details

    Event date: 2007

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • メッセージ制限付き署名の新しいモデルと構成法

    小山 拓郎, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2007)  2007.1 

     More details

    Event date: 2007

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 多項式を用いた秘密分散共有法に関数する一考察

    山下修平, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2006)  2006.1 

     More details

    Event date: 2007

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • スタンダードPAとメッセージ秘匿性との関係

    寺西勇, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2007)  2007.1 

     More details

    Event date: 2007

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • スタンダードモデルPAの新しい特徴づけ

    寺西勇, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2007)  2007.1 

     More details

    Event date: 2007

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • MIX-netと準同型性に基づいた電子投票方式

    石田夏樹, 尾形わかは

    電子情報通信学会技術研究報告  2004 

     More details

    Event date: 2004

    researchmap

  • Divisible Voting Scheme

    MATSUO Shin'ichiro, OGATA Wakaha

    Technical report of IEICE. ISEC  2002  The Institute of Electronics, Information and Communication Engineers

     More details

    Event date: 2002

    Language:Japanese  

    Electronic voting is considered as one of major applications of cryptographic protocols and many researches are conducted in this area. Most of existing schemes are mainly for election in which each voter has one ballot. However, there are many cases in which each voter has multiple ballots, for example general meeting of stockholders. Existing schemes are not practical for these cases. In this paper, we propose a new voting scheme in which each voter has multiple ballots and votes divisible ballots for multiple candidates. We give some requirements for divisible voting schemes and show that our protocol fulfills them. In our protocol, privacy of each voter's choice holds and any voters cannot vote irregular ballots. Our protocol contains no interactive proof system. Thus, it is more efficient than other voting schemes.

    researchmap

  • A Public - key Cryptosystem based on Biomedical - information DNA

    ITAKURA Yukio, IWATA Tetsu, OGATA Wakaha, KUROSAWA Kaoru, TSUJII Shigeo

    IPSJ SIG Notes  2000.7  Information Processing Society of Japan (IPSJ)

     More details

    Event date: 2000.7

    Language:Japanese  

    Authentication using biomedical-information is widely studied. Among some biomedical informations, digital DNA information can be used as an identification data. In this paper, we first discuss about its extraction, treatment, and characteristics. Then we discuss the advantages of implementing DNA information in public key cryptosystems. Finally, we present some concrete implementations.

    researchmap

    Other Link: http://id.nii.ac.jp/1001/00045302/

  • 実用的な秘密分散共有法 --- Robust Ramp Scheme

    尾形わかは

    暗号と情報セキュリティシンポジウム  2000 

     More details

    Event date: 2000

    researchmap

  • プライバシを保護した非対話文書分類の高性能化に関する研究

    北原優平, 岡 響, 中橋 彬, 尾形わかは

    電子情報通信学会 ISEC研究会  2024.3 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • HERAに対する代数攻撃の改良

    山本 大輔, 劉 富康, 尾形 わかは

    SCIS2025  2025.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • A Tightly Secure Signature in the Multi-User Setting with Corruptions Based on Discrete-Logarithm Assumption

    Keitaro Hashimoto, Wakaha Ogata, Yusuke Sakai

    SCIS2025  2025.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • Full Forward Privacyを持ち冗長な通信が不要な認証鍵交換

    松井 航輝, 橋本 啓太郎尾形, わかは

    SCIS2025  2025.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 標準モデルで安全なプライバシー保護付き認証鍵交換のラウンド数削減

    神崎 翔午, 橋本 啓太郎, 尾形 わかは

    SCIS2025  2025.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Privacy-Preserving Inference of Machine Learning Models without Retraining

    Sato Guilherme, Ogata Wakaha

    SCIS2025  2025.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • Oblivious RAMを用いた効率的な決定木のマルチパーティ計算

    市川 敦謙, 尾形 わかは

    SCIS2017  2017.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Unidirectionalな検索可能代理人再暗号化方式の構築

    竹谷駿佑, 尾形わかは

    SCIS2017  2017.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Certificateless Aggregate Signature Schemeの構成法と安全性に関する研究

    橋本啓太郎, 尾形わかは

    SCIS2018  2018 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • UOVのOnline/Offline化の研究

    森田 晃平, 尾形 わかは

    SCIS2018  2018 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Proxy Re-Signcryption の安全性と構成に関する研究

    中川峻, 尾形わかは

    SICS2016  2016.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 誤検知回避機能付きユーザ間通信型不正コピー検知システムに関する研究

    平野千歩, 尾形わかは

    SICS2016  2016.1 

     More details

    Language:Japanese  

    researchmap

  • 決定木の秘密計算における効率比較と事前計算を用いた効率化

    市川敦謙, 菊池亮, 尾形わかは

    SICS2016  2016.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 様々なプロキシ再暗号方式を統合するフレームワーク

    尾形わかは

    SICS2016  2016 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • IoTゲートウェイと複数アプリケーション間の暗号化方式の考察

    松井航輝, 尾形わかは

    SCIS2023  2023.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 符号ベース暗号に対する分散復号方式

    高橋洸太, 尾形わかは

    SCIS2023  2023.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • デジタル署名の複数ユーザセキュリティにおける帰着ロスの下限について

    吉岡 啓史, 尾形 わかは, 橋本 啓太郎

    SCIS2024  2024.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 暗号のための脳機能拡張:信用できる計算機が不要な署名方式の提案 (その2)

    尾形わかは, 冨田斗威, 高橋健太, 西垣正勝

    SCIS2023  2023.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 真に簡潔なOblivious RAMプロトコルの提案

    福成理紀, 尾形わかは

    SCIS2021  2021.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Universal samplerを用いないProof of Human-workの構成とその応用に関する研究

    角田理尚, 尾形 わかは, 高橋 健太, 西垣 正勝

    SCIS2020  2020.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 暗号のための脳機能拡張:信用できる計算機が不要な署名方式の提案

    松本 彩花, 尾形 わかは, 高橋 健太, 西垣 正勝

    SCIS2022  2022.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 信頼できないサーバによる決定木評価の委託計算方式

    齋藤 吉史, 尾形 わかは

    SCIS2021  2021.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 信頼度を用いた実用的なProof of Personhoodプロトコルの提案

    兵頭昇虎, 尾形わかは

    SCIS2022  2022.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • プライバシを保護したRNNによる非対話型文書分類

    齋藤拓巳, 岡響, 中橋彬, 尾形わかは

    SCIS2022  2022.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 標準的な仮定のもとでleakage resilientかつCCA安全なIDベースKEM

    冨田斗威, 尾形わかは, 黒澤馨

    SCIS2019  2019.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Support Vector Machineを用いたプライバシー保護型データ分類方式の改良

    齋藤吉史, 尾形わかは

    SCIS2019  2019.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Certificateless signatureの一般的構成に対するタイトな帰着とDDH仮定に基づく構成

    橋本啓太郎, 尾形わかは, 冨田斗威

    SCIS2020  2020.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 選択暗号文攻撃に対してoptimally leakage-resilientなIDベース暗号

    冨田 斗威, 尾形 わかは, 黒澤 馨

    SCIS2020  2020.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 階層型IDベースプロキシ再暗号化方式の提案

    野村 大樹, 尾形 わかは

    SCIS2018  2018.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 内積を用いたランク付きマルチキーワード検索可能暗号の安全性に関する研究

    小手森崇顕, 尾形わかは

    SCIS2018  2018.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Random Decision Treeを使ったよりプライバシーに配慮したプライバシー保護型データマイニング

    中村 早織, 尾形 わかは

    SCIS2018  2018.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Reshufflable and laziness tolerant mantal card game protocol

    1994 

     More details

  • 群分割のシミュレーション

    平7電気関係学会関西支部連合大会  1995 

     More details

  • Nonperfect secret sharing scheme

    Proc. of the 1993 Symposium on Cryptography and Information Security  1993 

     More details

  • 効率的な票分割型電子投票方式の構成

    電子情報通信学会総合大会  1997 

     More details

  • (k,n)閾値匿名通信路とその応用

    暗号と情報セキュリティシンポジウム  1997 

     More details

  • 群離脱認識プロトコルの経路制御への応用

    平10電気関係学会関西支部連合大会  1998 

     More details

  • 不正者に対して最も安全な秘密分散共有法

    電子情報通信学会技術研究報告  1996 

     More details

  • 群れ離脱認識プロトコルのLANへの実装

    電子情報通信学会1997年ソサイエティ大会  1997 

     More details

  • ゼロ知識証明における通信量の削減について

    電子情報通信学会技術研究報告  1989 

     More details

  • Claw free familyの構成法

    電子情報通信学会技術研究報告  1990 

     More details

  • 4-move zero-knowledge interactive proof systems

    1990 

     More details

  • 多次剰余のゼロ知識証明とそのmental pokerへの応用

    第12回情報理論とその応用シンポジウム  1989 

     More details

  • 2 move ゼロ知識証明

    電子情報通信学会技術研究報告  1990 

     More details

  • 多値のハードコアのインバータ

    暗号と情報セキュリティシンポジウム  1992 

     More details

  • k-Resilient ID-based Hybrid 暗号について

    荒木俊則, オガタワカハ

    暗号と情報セキュリティシンポジウム(SCIS2005)  2005.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 準同型性とMIX-netに基づいた電子投票方式の評価

    小山拓郎, 石田夏樹, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2005)  2005.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Divisible Voting Scheme

    2003 

     More details

  • A Method for Exchanging Valuable Data : How to Realize Matching Oblivious Transfer

    2003 

     More details

    Presentation type:Poster presentation  

    researchmap

  • RSA暗号を利用した効率的な木構造鍵管理方式

    2004 

     More details

  • 非対称3者間PAKEプロトコル

    電子情報通信学会技術研究報告  2005 

     More details

  • フレキシブルな料金形態を可能とする視聴率調査方式

    阿部正己, 荒木俊則, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2005)  2005.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • リモートバイオメトリクス認証に有効な「近い」ことを示す零知識証明プロトコル

    尾形わかは, 菊地浩明, 西垣正勝

    第29回情報理論とその応用シンポジウム予稿集 SITA2006  2006.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ZeroBio -- 秘匿ニューラルネットワーク評価を用いた指紋認証システム

    永井 慧, 菊池 浩明, 尾形 わかは, 西垣 正勝

    コンピュータセキュリティシンポジウム予稿集(CSS2006)  2006.10 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 省リソースデバイスに適したパスワード認証鍵交換

    飯野 徹, 松尾 真一郎, 松岡 廣登, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2006)  2006.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 実景対応型イメージマップシステム

    平11電気関係学会関西支部連合大会  1999 

     More details

  • ネットワークを介したメルチメディア・データ編集における排他制御機構

    平11電気関係学会関西支部連合大会  1999 

     More details

  • 配送確認を行う電子メールシステムの構築

    1999年電子情報通信学会総合大会  1999 

     More details

  • プライバシーを保護する鍵寄託方式

    暗号と情報セキュリティシンポジウム  1999 

     More details

  • 相互仮想現実感でのデータ伝送遅延の影響評価装置

    平10電気関係学会関西支部連合大会  1998 

     More details

  • セキュリティを考慮した遠隔ログインシステムの構築

    平10電気関係学会関西支部連合大会  1998 

     More details

  • 利用者のプライバシーを考慮した鍵寄託方式

    平10電気関係学会関西支部連合大会  1998 

     More details

  • 認証コードのある下界の誤りとその訂正

    暗号と情報セキュリティシンポジウム  1998 

     More details

  • 効率の良いRabin型デジタル署名方式

    暗号と情報セキュリティシンポジウム  1999 

     More details

  • 最大限の秘匿を可能にする電子メールシステムの構築

    暗号と情報セキュリティシンポジウム  1999 

     More details

  • データ交換可能な多対多マッチングプロトコル

    2002年 暗号と情報セキュリティシンポジウム  2002 

     More details

  • DNA情報を組み込んだ公開鍵暗号方式

    電子情報通信学会技術研究報告  2000 

     More details

  • 安全性が証明可能な metering scheme

    暗号と情報セキュリティシンポジウム  2001 

     More details

  • 準同型暗号系に基づいた分割可能な複数票電子投票方式

    2003 

     More details

  • 証明可能安全性を持つオンライン秘密分散方式

    大庭 達海, 尾形わかは

    暗号と情報セキュリティシンポジウム (SCIS2010)  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証

    渡邊 幸聖, 小田 雅洋, 山 本匠, 尾形 わかは, 菊池 浩明, 西垣正勝

    暗号と情報セキュリティシンポジウム(SCIS2010)  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 変換可能否認不可署名の一般的構成法

    菊池亮, 尾形わかは

    暗号と情報セキュリティシンポジウム (SCIS2010)  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Subset Difference法におけるstorage sizeの削減に関する考察

    大川戸 惇, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2010)  2010.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ディジタル署名の安全性証明に関する研究

    松本直也, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2006)  2006.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Structured Aggregate Signatures

    Dan Yamamoto, Wakaha Ogata

    Proc. of SCIS 2006  2006.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • 暗号技術危殆化に伴う再署名に関する考察

    平井 康雅, 松尾 真一郎, 尾形わかは

    情報処理学会研究報告  2008.3 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • On a Variation of Kurosawa-Desmedt Encryption Scheme

    Le Trieu Phong, Wakaha Ogata

    Proc. of SCIS 2006  2006.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • 区間のZKIPを用いた生体認証方式の改良

    尾形,わかは, 菊池浩明, 西垣正勝

    第30回情報理論とその応用シンポジウム(SITA2007)  2007.11 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Blind HIBE and its Application to Blind Decryption

    Le Trieu Phong, Wakaha Ogata

    The 2008 Symposium on Cryptography and Information Security (SCIS2008)  2008.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • 秘密計算に適する距離の使用によるリモート生体認証

    永井慧, 菊池浩明, 尾形わかは, 西垣正勝

    暗号と情報セキュリティシンポジウム(SCIS2008)  2008.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • A Proposal of efficient remote Biometric Authentication Protocol

    Taiki Sakashita, Yoichi Shibata, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi, Masakatsu Nishigaki

    The 2008 Symposium on Cryptography and Information Security  2008.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Activeな攻撃者に対して情報理論的秘匿性を持つパスワード認証機能付き秘密分散法

    早稲田篤志, 尾形わかは, 野島良, 盛合志帆

    暗号と情報セキュリティシンポジウム (SCIS2014)  2014.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 高い安全性と効率を持つDynamic SSEの構築

    岩波純也, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2014)  2014.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • A Study on Identification Scheme Based on Subset Sum Problem

    Le Dang Khoa, Wakaha Ogata

    Symposium on Cryptography and Information Security (SCIS2014)  2014.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • 能動的な不正に対して安全な効率的なパスワード付秘密分散法

    吉岡奈瑠美, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2014)  2014.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Shamirのしきい値法における Cold-Boot Attackによる秘密の復元の効率化

    高橋 一馬, 尾形 わかは

    暗号と情報セキュリティシンポジウム (SCIS2015)  2015.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 秘密の持ち逃げを不可能とする秘密分散共有法

    大庭達海, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2012)  2012.2 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ランダム鍵ビットを用いたPKCS#1に基づくRSA暗号の秘密鍵の復元

    柿沼匡志, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2012)  2012.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 多数の秘密の分散に適する計算量理論的検証可能秘密分散共有法

    尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2012)  2012.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 否認不可署名のinvisibilityとanonymityの関係性に関する再考

    柿沼匡志, 菊池亮, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 検索結果を秘匿する検索可能暗号方式

    北原 昂, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2013)  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 情報理論的に安全なパスワード付秘密分散法の安全性と効率化

    尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2013)  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 効率的な暗号化されたまま行われる生体認証プロトコル

    北原 昂, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2012)  2012.2 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • n-1人の不正者に対して安全なより効率の良い(k,n)閾値法

    江口宏, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2012)  2012.2 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Two New Schemes of Certificateless Aggregate Signature with Improvement of Security

    NGUYEN, QUOC VIET, Wakaha OGTA

    Symposium on Cryptography and Information Security (SCIS2013)  2013.1 

     More details

    Language:Bengali   Presentation type:Oral presentation (general)  

    researchmap

  • ドキュメント追加後も安全で効率的な検索可能暗号

    岩波純也, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2013)  2013.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • スタンダードモデルにおいて安全なIDベースオンライン/オフライン署名方式

    赤岩 怜, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2009)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 属性ベース暗号とその応用

    川口勝久, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2009)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • New RSA-Based (Selectively) Convertible Undeniable Signature Schemes

    Le Trieu, Kaoru Kurosaw, Wakaha Ogata

    Symposium on Cryptography and Information Security (SCIS2009)  2009.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • ゼロ知識性が証明可能なリモート生体認証方式

    佐瀬大治郎, 尾形わかは, 菊池浩明, 西垣正勝

    暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 曖昧性を含んだ多項式による特徴量関数を利用した非対称生体認証:その改良と安全性証明

    渡邊幸聖, 小田雅洋, 山本匠, 高橋健太, 尾形わかは, 菊池浩明, 西垣正勝

    暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Provably Secure Convertible Undeniable Signatures with Unambiguity

    Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata

    Symposium on Cryptography and Information Security (SCIS2010)  2010.1 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

  • テレワーク導入企業における情報セキュリティの調査研究

    生野陽子, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2009)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • ビット列に対する不正検出可能しきい値法

    尾形わかは, 荒木俊則

    暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • シンプルで効率的な不正検出可能しきい値法

    荒木俊則, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Fuzzy Vault Schemeにおけるチャフ空間拡大に関する検討

    小田雅洋, 渡邊幸聖, 山本匠, 高橋健太, 尾形わかは, 菊池浩明, 西垣正勝

    暗号と情報セキュリティシンポジウム(SCIS2011)  2011.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 多項式の根のゼロ知識証明とリモートバイオメトリクスへの応用

    菊池 浩明, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2007)  2007.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Cramer-Shoup暗号の統計的PA安全性

    寺西勇, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2009)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • KRモデルで汎用結合性を持つ検証可能な紛失通信プロトコルの提案

    菊池亮, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2009)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 強偽造不可能性を満たす署名方式を作る一般的変換方法

    寺西勇, 小山 拓郎, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2007)  2007.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • RFIDプライバシ保護方式に対する一考察 ---OSK/AO方式の評価---

    阿部 正己, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2007)  2007.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • 直交基底指紋への参照度を特徴量とした安全な生体認証プロトコル

    菊池浩明, 河野瞬, 畔上洋平, 西垣正勝, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2009)  2009.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • k--Resilient ID-based Hybrid暗号について

    荒木俊則, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2005)  2005.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Time-Evolving署名方式の改良法

    ズオング カン ベト, 黒澤馨, 尾形わかは

    暗号と情報セキュリティシンポジウム(SCIS2005)  2005.1 

     More details

    Language:Japanese   Presentation type:Oral presentation (general)  

    researchmap

  • Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions International conference

    Hirofumi Yoshioka, Wakaha Ogata, Keitaro Hashimoto

    The Conference for Failed Approaches and Insightful Losses in Cryptology (CFail)  2024.8 

     More details

    Language:English   Presentation type:Oral presentation (general)  

    researchmap

▼display all

Works

  • ユーザブルセキュリティを実現する暗号プロトコルの安全性に関する調査研究

    2005 - 2008

     More details

    Work type:Artistic work  

    researchmap

Research Projects

  • A study on modern cryptology and its applications

    1995

      More details

    Grant type:Competitive

    researchmap

  • 現代暗号理論とその応用に関する研究

    1995

      More details

    Grant type:Competitive

    researchmap