Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    3-Party Secure Computation for RAMs: Optimal and Concretely Efficient

    A distributed oblivious RAM (DORAM) is a method for accessing a secret-shared memory while hiding the accessed locations. DORAMs are the key tool for secure multiparty computation (MPC) for RAM programs that a...

    Atsunori Ichikawa, Ilan Komargodski, Koki Hamada, Ryo Kikuchi in Theory of Cryptography (2023)

  2. No Access

    Chapter and Conference Paper

    Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

    This paper studies the problem of constructing secure multiparty computation protocols whose outputs satisfy differential privacy. We first provide a general framework for multiparty protocols generating share...

    Reo Eriguchi, Atsunori Ichikawa in Financial Cryptography and Data Security (2021)

  3. No Access

    Chapter and Conference Paper

    Efficient Secure Multi-Party Protocols for Decision Tree Classification

    We propose novel secure multi-party protocols for decision-tree classification. Our protocols hide not only an input vector and an output class but also the structure of the tree, which incurs an exponential comm...

    Atsunori Ichikawa, Wakaha Ogata, Koki Hamada in Information Security and Privacy (2019)