Oblivious keyword search W Ogata, K Kurosawa Journal of complexity 20 (2-3), 356-371, 2004 | 212 | 2004 |
Fault tolerant anonymous channel W Ogata, K Kurosawa, K Sako, K Takatani Information and Communications Security: First International Conference …, 1997 | 169 | 1997 |
Nonperfect secret sharing schemes and matroids K Kurosawa, K Okada, K Sakano, W Ogata, S Tsujii Advances in Cryptology—EUROCRYPT’93: Workshop on the Theory and Application …, 1994 | 110 | 1994 |
New combinatorial designs and their applications to authentication codes and secret sharing schemes W Ogata, K Kurosawa, DR Stinson, H Saido Discrete Mathematics 279 (1-3), 383-405, 2004 | 106 | 2004 |
Optimum secret sharing scheme secure against cheating W Ogata, K Kurosawa, DR Stinson SIAM Journal on Discrete Mathematics 20 (1), 79-95, 2006 | 101 | 2006 |
Optimum secret sharing scheme secure against cheating W Ogata, K Kurosawa Advances in Cryptology—EUROCRYPT’96: International Conference on the Theory …, 1996 | 64 | 1996 |
Bit-slice auction circuit K Kurosawa, W Ogata Computer Security—ESORICS 2002: 7th European Symposium on Research in …, 2002 | 62 | 2002 |
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes K Kurosawa, S Obana, W Ogata Advances in Cryptology—CRYPT0’95: 15th Annual International Cryptology …, 1995 | 58 | 1995 |
The security of the FDH variant of Chaum’s undeniable signature scheme W Ogata, K Kurosawa, SH Heng Public Key Cryptography-PKC 2005: 8th International Workshop on Theory and …, 2005 | 56 | 2005 |
Some Basic Properties of General Nonperfect Secret Sharing Schemes. W Ogata, K Kurosawa J. Univers. Comput. Sci. 4 (8), 690-704, 1998 | 55 | 1998 |
Privacy-preserving similarity evaluation and application to remote biometrics authentication H Kikuchi, K Nagai, W Ogata, M Nishigaki Modeling Decisions for Artificial Intelligence: 5th International Conference …, 2008 | 46 | 2008 |
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing M Fujiwara, A Waseda, R Nojima, S Moriai, W Ogata, M Sasaki Scientific reports 6 (1), 28988, 2016 | 44 | 2016 |
Provably secure metering scheme W Ogata, K Kurosawa Advances in Cryptology—ASIACRYPT 2000: 6th International Conference on the …, 2000 | 43 | 2000 |
General public key residue cryptosystems and mental poker protocols K Kurosawa, Y Katayama, W Ogata, S Tsujii Advances in Cryptology—EUROCRYPT’90: Workshop on the Theory and Application …, 1991 | 43 | 1991 |
General conversion for obtaining strongly existentially unforgeable signatures I Teranishi, T Oyama, W Ogata Progress in Cryptology-INDOCRYPT 2006: 7th International Conference on …, 2006 | 38 | 2006 |
Nonperfect secret sharing schemes W Ogata, K Kurosawa, S Tsujii Advances in Cryptology—AUSCRYPT'92: Workshop on the Theory and Application …, 1993 | 37 | 1993 |
Toward practical searchable symmetric encryption W Ogata, K Koiwa, A Kanaoka, S Matsuo Advances in Information and Computer Security: 8th International Workshop on …, 2013 | 31 | 2013 |
The security of the FDH variant of Chaum's undeniable signature scheme W Ogata, K Kurosawa, SH Heng IEEE Transactions on Information Theory 52 (5), 2006 | 29 | 2006 |
Unrestricted and compact certificateless aggregate signature scheme K Hashimoto, W Ogata Information Sciences 487, 97-114, 2019 | 28 | 2019 |
Efficient Rabin-type digital signature scheme K Kurosawa, W Ogata Designs, Codes and Cryptography 16, 53-64, 1999 | 26 | 1999 |