Skip to main content

and
  1. No Access

    Article

    Security analysis of secure kNN and ranked keyword search over encrypted data

    Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner...

    Wakaha Ogata, Takaaki Otemori in International Journal of Information Security (2020)

  2. Article

    On a Fallacious Bound for Authentication Codes

    We show that the lower bound on substitution success probability P S provided by Theorem 3.8 in De Soete's paper [4], which appeared earlier in this journal, ...

    Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata in Journal of Cryptology (1999)