scispace - formally typeset
K

Kazuo Ohta

Researcher at University of Electro-Communications

Publications -  260
Citations -  6621

Kazuo Ohta is an academic researcher from University of Electro-Communications. The author has contributed to research in topics: Random oracle & Hash function. The author has an hindex of 37, co-authored 253 publications receiving 6229 citations. Previous affiliations of Kazuo Ohta include Nippon Telegraph and Telephone & National Institute of Advanced Industrial Science and Technology.

Papers
More filters
Book ChapterDOI

A Practical Secret Voting Scheme for Large Scale Elections

TL;DR: This paper proposes a practical secret voting scheme for large scale elections that ensures the privacy of the voters even if both the administrator and the counter conspire, and realizes voting fairness, i.e., no one can know even intermediate result of the voting.
Book ChapterDOI

Attribute-based encryption with partially hidden encryptor-specified access structures

TL;DR: This work proposes attribute-based encryption schemes where encryptor-specified access structures (also called ciphertext policies) are hidden and proves security of the construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption.
Book ChapterDOI

Universal Electronic Cash

TL;DR: The main advantage of the new system is that the customer can subdivide his cash balance into many pieces in any way he pleases until the total value of all subdivided piece equals C.
Book ChapterDOI

Multiparty computation for interval, equality, and comparison without bit-decomposition protocol

TL;DR: This paper presents a simplified bit-decomposition protocol by analyzing the original protocol and constructs more efficient protocols for a comparison, interval test and equality test of shared secrets without relying on the bit- Decomposition Protocol.
Proceedings ArticleDOI

Accountable-subgroup multisignatures: extended abstract

TL;DR: The first formal model of security for multisignature schemes that explicitly includes key generation (without relying on trusted third parties) and a protocol, based on Schnorr's signature scheme, that is both provable and efficient are provided.