Skip to main content

and
  1. Article

    Open Access

    Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext

    Threshold public-key encryption (threshold PKE) has various useful applications. A lot of threshold PKE schemes are proposed based on RSA, Diffie–Hellman and lattice, but to the best of our knowledge, code-based ...

    Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata in Designs, Codes and Cryptography (2024)

  2. No Access

    Article

    Security analysis of secure kNN and ranked keyword search over encrypted data

    Wong et al. proposed a novel symmetric encryption scheme in which we can find the k-nearest neighbors from encrypted data and an encrypted query. Their scheme uses a pair of encryption functions that has an inner...

    Wakaha Ogata, Takaaki Otemori in International Journal of Information Security (2020)

  3. No Access

    Article

    Cheating detectable threshold scheme against most powerful cheaters for long secrets

    In this paper, we propose a framework of cheating-detectable threshold schemes against the most powerful cheaters. Our scheme is used to distribute long secrets, and the share size is almost optimum. If the th...

    Wakaha Ogata, Hiroshi Eguchi in Designs, Codes and Cryptography (2014)

  4. No Access

    Article

    Efficient Rabin-type Digital Signature Scheme

    Rabin's cryptosystem was proved to be as hard as factorization. However, Rabin's digital signature schemes is probabilistic. This paper shows two efficient Rabin type digital signature schemes, a basic scheme ...

    Kaoru Kurosawa, Wakaha Ogata in Designs, Codes and Cryptography (1999)