110 results on '"Obana, Satoshi"'
Search Results
2. Security Requirements for Store-on-Client and Verify-on-Server Secure Biometric Authentication
3. Verifiably Multiplicative Secret Sharing
4. Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
5. On the (In)Efficiency of Non-Interactive Secure Multiparty Computation
6. Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters
7. An Efficient Construction of Non-Interactive Secure Multiparty Computation
8. Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
9. On the (in)efficiency of non-interactive secure multiparty computation
10. Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field
11. Fully Subliminal-Free Schnorr Signature for Nonce
12. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
13. Flaws in Some Secret Sharing Schemes Against Cheating
14. Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
15. On Cryptographic Algorithms and Key Length for Delayed Disclosure Authentication of GNSS
16. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
17. An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling
18. An Efficient Construction of Non-Interactive Secure Multiparty Computation
19. On the (In)Efficiency of Non-Interactive Secure Multiparty Computation
20. A 2-code = Affine resolvable + BIBD
21. Characterization of (k, n) multi-receiver authentication
22. Combinatorial Bounds for Authentication Codes with Arbitration
23. t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
24. Cheating Detectable Secret Sharing Scheme from Multiplicative Homomorphic Authentication Function
25. Almost Optimum Secret Sharing Schemes with Cheating Detection for Random Bit Strings
26. Improved Post-quantum-secure Face Template Protection System Based on Packed Homomorphic Encryption
27. Homeostatic Regulation of Intestinal Epithelia by Intraepithelial γδ T Cells
28. Cheating Detectable Secret Sharing Schemes Supporting an Arbitrary Finite Field
29. Exposure Resilient Public-key Encryption with Keyword Search against Keyword Guessing Attack
30. Almost Optimum t-Cheater Identifiable Secret Sharing Schemes
31. Combinatorial Bounds on Authentication Codes with Arbitration
32. Bounds and Combinatorial Structure of (k,n) Multi-Receiver A-Codes
33. Combinatorial Classification of Optimal Authentication Codes with Arbitration
34. Efficient Constructions of Non-interactive Secure Multiparty Computation from Pairwise Independent Hashing
35. Almost Optimal Cheating-Detectable (2,2,n) Ramp Secret Sharing Scheme
36. Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
37. The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
38. An Implementation of a Universally Verifiable Electronic Voting Scheme Based on Shuffling
39. Homeostatic regulation of intestinal epithelia by intraepithelial gamma-delta T cells
40. Characterization of (k, n) multi-receiver authentication
41. A2-code = Affine resolvable + BIBD
42. Combinatorial Bounds for Authentication Codes with Arbitration
43. t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
44. Verifiably Multiplicative Secret Sharing
45. Updatable Searchable Symmetric Encryption with Fine-Grained Delete Functionality
46. How to Realize Highly Accurate Computation with Fully Homomorphic Encryption
47. Privacy-Preserving Fingerprint Authentication Resistant to Hill-Climbing Attacks
48. A Password-Protected Secret Sharing Based on Kurosawa-Desmedt Hybrid Encryption
49. Cheating Detectable Secret Sharing Scheme Suitable for Implementation
50. Flaws in Some Secret Sharing Schemes Against Cheating
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.