Publication list of Ogata Lab.
(Revised: Oct. 2024)
- 2021--
- "Security Model for Authenticated Key Exchange, Reconsidered"
- Xichen Zhang, Keitaro Hashimoto, Wakaha Ogata
International Comference on Security and Cryptography for Networks (SCN) 2024, pp.251-271 (2024.9)
- "Towards a Tightly Secure Signature in Multi-User Setting with Corruptions Based on Search Assumptions"
- Hirofumi Yoshioka, Wakaha Ogata and Keitaro Hashimoto
CFail2024 (2024.8)
- "Chosen-ciphertext secure code-based threshold public key encryptions with short ciphertext"
- Kota Takahashi, Keitaro Hashimoto, Wakaha Ogata
Designs, Codes and Cryptography (2023.10)
- "Perfectly Secure Oblivious Priority Queue"
- Atsunori Ichikawa, Wakaha Ogata
IEICE Trans. on Fundamentals, Vol.E106-A, No.3, pp.272-280 (2023.3)
- "Boosting CPA to CCA2 for Leakage-Resilient Attribute-Based Encryption by Using New QA-NIZK"
- Toi Tomita, Wakaha Ogata, Kaoru Kurosawa
IEICE Trans. on Fundamentals, Vol.E105-A, No.3, pp.143-159 (2022.3)
- "Private Decision Tree Evaluation by a Single Untrusted Server for Machine Learnig as a Service"
- Yoshifumi Saito, Wakaha Ogata
IEICE Trans. on Fundamentals, Vol.E105-A, No.3, pp.203-213 (2022.3)
- 2016--2020
- "CCA-Secure Leakage-Resilient Identity-Based Encryption without q-type Assumptions"
- Toi Tomita, Wakaha Ogata, Kaoru Kurosawa, Ryo Kuwayama
IEICE Trans. on Fundamentals, Vol.E103-A, No.10, pp.1157-1166 (2020.10)
- "Security analysis of secure kNN and ranked keyword search over encrypted data"
- Wakaha Ogata, Takaaki Otemori
International Journal of Information Security, International Journal of Information Security, vol. 19, issue 4, pp.419-425 (2020.8). Online version was published 2019.8. -
- "Communication Protocol between Humans and Bank Server Secure against Man-in-the-Browser Attacks"
- Koki Mukaihira, Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki
Proc. of the 3rd International Conference on Intelligent Human Systems Integration (IHSI 2020)
- "Multi-Divisible On-Line/Off-Line Cryptography and Its Application to Signcryptions"
- Dan Yamamoto, Wakaha Ogata
Security and Communication Networks, Vol.2019, Article ID 1042649 (2019.10)
- "CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (not q-type) Assumptions" Best Student Paper Award
- Toi Tomita, Wakaha Ogata, and Kaoru Kurosawa
IWSEC2019 (2019.8)
- "Efficient Secure Multi-Party Protocols for Decision Tree Classification"
- Atsunori Ichikawa, Wakaha Ogata, Koki Hamada and Ryo Kikuchi
ACISP 2019: Information Security and Privacy, LNCS vol. 1547, pp. 362-380 (2019.7)
- "Unrestricted and Compact Certificateless Aggregate Signature Scheme"
- Keitaro Hashimoto, Wakaha Ogata
Information Sciences, Vol.487, pp.97-114 (2019.6)
- "No-Dictionary Searchable Symmetric Encryption"
- Wakaha Ogata, Kurosawa Kaoru
IEICE Trans. on Fundamentals, Vol. E102-A, pp.114-124 (2019.1)
- "A Study on Construction and Security of Computer-Aided Security Schemes"
- Yasuyoshi Jinno, Takashi Tsuchiya, Tetsushi Ohki, Kenta Takahashi, Wakaha Ogata, Masakatsu Nishigaki
Proceedings of 4th Annual Conference on Computational Science and Computational Intelligence (CSCI2017), pp.31-36 (2017.12)
- "Computational Secret Sharing and Conversion Protocols in Both Active and Passive Settings"
- Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata
IET Information Security, Vol.11, Issue 5 (2017.7), pp.287-293
- "Efficient No-dictionary Verifiable Searchable Symmetric Encryption"
- Wakaha Ogata, Kaoru Kurosawa
Finantial Cryptology, LNCS Vol. 10322, pp. 498-516 (2017.4)
- "Computationally Secure Verifiable Secret Sharing Scheme for Distributin Many Secrets"
- Wakaha Ogata, Toshinori Araki
IEICE Trans. on Fundamentals, E100-A, pp.103-114
- "Multi-Divisible On-LLine/Off-Line Encryptions"
- Dan Yamamoto, Wakaha Ogata
IEICE Trans. on Fundamentals, E100-A, pp.91-102
- "3-2 information theoretically secure distributed storage with QKD and password-authenticated secret sharing"
- Fujiwara, M., Waseda, A., Nojima, R., Moriai, S., Wakaha Ogata, Sasaki, M..
Journal of the National Institute of Information and Communications Technology, Vol. 64, No. 1, pp. 23-29 (2017.1)
- "Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing"
- Mikio Fujiwara, Atsushi Waseda, Ryo Nojima, Shiori Moriai, Wakaha Ogata, Masahide Sasaki
Scientific Reports 6, Article number: 28988
- 2011--2015
- "Improvement of UC Secure Searchable Symmetric Encryption Scheme"
- Shunsuke Taketani, Wakaha Ogata
Advances in Information and Computer Security, the 10th International Workshop on Security, IWSEC 2015, LNCS Vol.9241, pp.135-152 (2015.8)
- "Certificateless Aggregate Signature Schemes with Improved Security"
- Nguyen Quoc Viet, Wakaha Ogata
IEICE Trans. on Fundamentals, Vol. E98-A,pp. 92-99 (2015.1)
- "Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation"
- Ryo KIKUCHI, Koji CHIDA, Dai IKARASHI, Wakaha OGATA, Koki HAMADA, Katsumi TAKAHASHI
IEICE Trans. on Fundamentals, Vol. E98-A, pp.213-222 (2015.1)
- "Cheating Detectable Threshold Scheme against Most Powerful Cheaters for Long Secrets"
- Wakaha Ogata, Hiroshi Eguchi
Designs, Codes and Cryptography, Vol.71, No.3, pp.527-539 (published online: 2012.10)
- "Toward Practical Searchable Symmetric Encryption"
- Wakaha Ogata, Keita Koiwa, Akira KAnaoka, Shin'ichiro Matsuo
Advances in Information and Computer Security,
the 8th International Workshop on Security, IWSEC 2013, LNCS Vol.8231, pp.151-167 (2013.11)
- "Cheating Detectable Secret Sharing Schemes for Random Bit Strings"
- Wakaha Ogata, Toshinori Araki
IEICE Trans. on Fundamentals, Vol.E96-A, No.11, pp. 2230--2234 (2013.11)
- "Template-protecting Biometric Authentication Using Oblivious Evaluation of Feature Value Function with Fuzzy Polynomial"
- Masakatsu Nishigaki, Yoshimasa Watanabe, Masahiro Oda, Yuta Yoneyama, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi
IPSJ, Vol.53, No.9, pp.2254-2266 (2012.9)(in Japanese)
- "Undeniable and Unpretendable Signatures"
- Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
IEICE Trans. on Fundamentals, Vol. E95-A, No.1, pp.138-150 (2012.1)
- "A Simple and Efficient Secret Sharing Scheme Secure against Cheating"
- Toshinori Araki, Wakaha Ogata
IEICE Trans. on Fundamentals, Vol.E94-A, No.6 pp.1338--1345 (2011.6)
- "Provably Secure On-line Secret Sharing Scheme"
- Tatsumi Oba, Wakaha Ogata
IEICE Trans. on Fundamentals, Vol. E94-A, No.1, pp.139-149 (2011.1)
- 2006--2010
- "A Framework for Constructing Convertible Undeniable Signatures"
- Ryo Kikuchi, Le Trieu Phong, Wakaha Ogata
ProvSec 2010, LNCS Vol.6402, pp.70-86 (2010.10)
- "Provably Secure Convertible Undeniable Signatures with Unambiguity"
- Le Trieu Phong, Kaoru Kurosawa, Wakaha Ogata
Security and Cryptography for Networks, 7th International Conference (SCN 2010), LNCS Vol. 6280, pp. 291-308. (2010.9)
- "Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels"
- Toshinori Araki and Wakaha Ogata
IEICE Trans. on Fundamentals, Vol. E93-A, No.1, pp.126-135 (2010.1)
- "New RSA-Based (Selectively) Convertible Undeniable Signature Schemes"
- Le Trieu Phong, Kaoru Kurosawa, and Wakaha Ogata
IEICE Trans. on Fundamentals, Vol. E93-A, No.1, pp.63-75 (2010.1)
(Preliminary version: Progress in Cryptology -- AFRICACRYPT 2009, LNCS Vol.5580, pp.1116-134 (2009.6) )
- "A Proposal of Efficient Remote Biometric Authentication Protocol"
- Taiki Sakashita, Yoichi Shibata, Takumi Yamamoto, Kenta Takahashi, Wakaha Ogata, Hiroaki Kikuchi and Masakatsu Nishigaki
Advances in Information and Computer Security 4th International Workshop on Security, IWSEC 2009, LNCS Vol.5824, pp. 212-227 (2009.10)
- "New Identity-Based Blind Signature and Blind Decryption Scheme in the Standard Model"
- Le Trieu Phong and Wakaha Ogata
IEICE Trans. on Fundamentals, Vol. E92-A, No.8, pp.1822-1835 (2009.8)
- "Collision-based Power Attack for RSA with Small Public Exponent"
- Kouichi Itou, Dai Yamamoto, Jun Yajima, and Wakaha Ogata
IEICE Trans. on Information, Vol. E92-D, No.5, pp.897-908 (2009.5)
- "Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate"
- Kouichi Itou, Tetsuya Izu, Wakaha Ogata, Takeshi Shimoyama, and Masahiko Takenaka
IEICE Trans. on fundamentals, Vol. E92-A, No.1, pp.67-75 (2009.1)
- "Privacy-Preserving Similarity Evaluation and Application ot Remote Biometrics Authentication"
- Hiroaki Kikuchi, Kei Nagai, Wakaha Ogata, and Masakatsu Nishigaki
Modeling Decisions for Artifical Intellegence, Invited talk (2008.11).
- "Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption"
- Isamu Teranishi and Wakaha Ogata
Sixth Conference on Security and Cryptography for Networks (SCN'08), LNCS Vol.5229, pp.109-125 (2008.9)
- "Relationship between Two Approaches for Defining the Standard Model PA-ness"
- Isamu Teranishi and Wakaha Ogata
Proc. of The 13th Australasian Conference on Information Security and Privacy (ACISP'08), LNCS Vol.5107, pp.113-127 (2008.7)
- "Stateful Identity-Based Encryption Scheme: Faster Encryption and Decryption with Shorter Ciphertext"
- Le Trieu Phong, Hiroto Matsuoka, and Wakaha Ogata
ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) pp.381-388 (2008.3)
- "Application of Privacy Protection RFID Methods to Large-Scale Systems"
- Masaki Abe, Wakaha Ogata
Trans. of IEICE, Vol. J91-A, No.3, pp.399-410 (2008) (in Japanese)
- "General Conversion for Obtaining Strongly Existentially Unforgeable Signatures"
- I. Teranishi, T. Oyama, W. Ogata
IEICE Transaction, E91-A, No.1, pp.94-106 (2008)
(Preliminary version : Progress in Cryptology -- INDOCRYPT 2006, LNCS Vol.4329, pp.191-205 (2006))
- "Relationship between Standard Model Plaintext Awareness and Message Hiding"
- I. Teranishi, W. Ogata
IEICE Transaction, E91-A, No.1, pp.244--261 (2008)
(Preliminary version: Advances in Cryptology -- ASIACRYPT 2006, LNCS vol.4284, pp.226-240 (2006))
- "Comments on the Security Proofs of Some Signature Schemes Based on Factorization"
- Wakaha Ogata and Naoya Matsumoto
IEICE Transaction, E90-A, No.2, pp.526-530 (2007)
- "A General Model of Structured Multisignatures with Message Flexibility"
- Dan Yamamoto and Wakaha Ogata
IEICE Transaction, E90-A, No.1, pp.83-90 (2007)
- "On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme"
- Le Trieu Phong and Wakaha Ogata
IEICE Transaction, E90-A, No.1, pp.226-230 (2007)
- "Optimum Secret Sharing Scheme Secure against Cheating"
- Wakaha Ogata, Kaoru Kurosawa, Douglas R. Stinson
SIAM Journal on Discrete Mathematics, Vol.20, pp.79--95 (2006)
(Preliminary version : Proc. of Eurocrypt'96, LNCS Vol. 1070, pp.200-211)
- 2001--2005
- "The Security of the FDH Variant of Chaum's Undeniable Signature Scheme"
- W. Ogata, K. Kurosawa, and S.-H. Heng
IEEE Trans. on Information Theory, Vol. 52, No. 5, pp.2006-2017 (2006)
(Preliminary version : Proc. of PKC2005, LNCS Vol. 3386, pp.328-345 (2005))
- "Efficient Divisible Voting Scheme"
- N. Ishida, S. Mastuo, and W. Ogata
IEICE Trans., E88-A, pp.230-238 (2005)
- "Oblivious keyword search"
- W. Ogata and K. Kurosawa
Journal of Complexity, Vol. 20, pp.356-371 (2004)
- "New Combinatorial Designs and their Applications to Authentication Codes and Secret Sharing Schemes"
- W. Ogata, K. Kurosawa, D. R. Stinson, and H. Saido
Discrete Mathematics, Vol.279/1-3 pp.383-405 (2004)
- "k out of n Oblivious Transfer without Random Oracles"
- W. Ogata and R. Sasahara
IEICE Trans., E87-A, pp.147-151 (2004)
- "Divisible Voting Scheme"
- N. Ishida, S. Matsuo and W. Ogata
Proc. of 6th Information Security Conference, LNCS Vol. 2851, pp.137--150 (2003)
- "A Method for Exchanging Valuable Data : How to Realize Matching Oblivious Transfer"
- S.Matsuo and W.Ogata
Proc. of 22nd ACM symposium on Principles of Distributed Computing (PODC), p.201 (2003)
Full virsion is here
- "Electronic Ticket Scheme for ITS"
- S.Matsuo and W.Ogata
IEICE Trans., E86-A, pp.142-150 (2003)
- "Matching Oblivious Transfer: How to Exchange Valuable Data"
- S.Matsuo and W.Ogata
IEICE Transaction, E86-A, pp.189-193 (2003)
- "On the Bound for Anonymous Secret Sharing Schemes"
- W.Kishimoto, K.Okada, K.Kurosawa and W.Ogata
Discrete Applied Mathematics, Vol.121, Issues 1-3, pp.193-202 (2002)
- "Bit-Slice Auction Circuit"
- K.Kurosawa, W.Ogata
Proc. of ESORICS2003, LNCS Vol. 2502, pp.24-38 (2002)
- "Bounds for Robust Metering Schemes and Their Relationship with A2-code"
- W.Ogata and K.Kurosawa
Proc. of Asiacrypt 2002, LNCS Vol. 2501, pp.64--80 (2002)
- "IND-CCA Public Key Schemes Equivalent to Factoring n=pq"
- K.Kurosawa, W.Ogata, T.Matsuo, S.Makishima
PKC 2001, LNCS Vol. 1992, pp.36-47 (2001)
ps file, 411kbyte
- "On the Practical Secret Sharing Scheme"
- W.Ogata
IEICE Trans. E84-A, pp.256--261 (2001)
ps file, 369kbyte
- --2000
- "Provably Secure Metering Scheme"
- W.Ogata and K.Kurosawa
Asiacrypt 2000, LNCS Vol.1976, pp.388-398 (2000)
ps file, 380kbyte
- "On a Fallacious Bound for Authentication Codes"
- Carlo Blundo, Alfredo De Santis, Kaoru Kurosawa, Wakaha Ogata
Journal of Cryptology, Vol.12, No.3, pp.155-159 (1999)
ps file, 641kbyte
- "Some Basic Properties of General Nonperfect Secret Sharing Schemes"
- Wakaha Ogata, Kaoru Kurosawa
J.ucs, vol.4,No.8, pp.690-704 (1998)
ps file, 178kbyte
- "Multisymbol Majority Vote and Hard Core"
- Wakaha OGATA, Keiichi SAKANO and Kaoru KUROSAWA
Information processing letters, (1996)
ps file, 1328kbyte
- "Optimum Secret Sharing Scheme Secure against Cheating"
- Wakaha Ogata and Kaoru Kurosawa
Eurocrypto'96, LNCS Vol.1070(1996.5)
ps file, 1257kbyte
- "t-Cheater Identifiable (k,n) Threshold Secret Shargin Schemes"
- Kaoru Kurosawa, Satoshi Obana, Wakaha Ogata ,
CRYPTO '95,LNCS Vol.963(1995)
ps file, 418kbyte
- "On claw free families"
- Wakaha Ogata and Kaoru Kurosawa,
IEICE Trans. on Fundamentals of Electronics, communications and Computer Sciences, Vol. E77-A, pp.72-80 (1994)
(Preliminary version : Proc. of Asiacrypt'91, Lecture Notes in Computer Science 739, Springer Verlag, pp.111-123 (1991)
- "Nonperfect Secret Sharing Schemes"
- W.Ogata, K.Kurosawa and S.Tsujii,
Proc. of Auscrypt'92, Lecture Notes in Computer Science 718, Springer Verlag, pp.56-66 (1992)