K
Kazuo Ohta
Researcher at University of Electro-Communications
Publications - 260
Citations - 6621
Kazuo Ohta is an academic researcher from University of Electro-Communications. The author has contributed to research in topics: Random oracle & Hash function. The author has an hindex of 37, co-authored 253 publications receiving 6229 citations. Previous affiliations of Kazuo Ohta include Nippon Telegraph and Telephone & National Institute of Advanced Industrial Science and Technology.
Papers
More filters
Book ChapterDOI
A Practical Secret Voting Scheme for Large Scale Elections
TL;DR: This paper proposes a practical secret voting scheme for large scale elections that ensures the privacy of the voters even if both the administrator and the counter conspire, and realizes voting fairness, i.e., no one can know even intermediate result of the voting.
Book ChapterDOI
Attribute-based encryption with partially hidden encryptor-specified access structures
TL;DR: This work proposes attribute-based encryption schemes where encryptor-specified access structures (also called ciphertext policies) are hidden and proves security of the construction based on the Decisional Bilinear Diffie-Hellman assumption and the Decision Linear assumption.
Book ChapterDOI
Universal Electronic Cash
Tatsuaki Okamoto,Kazuo Ohta +1 more
TL;DR: The main advantage of the new system is that the customer can subdivide his cash balance into many pieces in any way he pleases until the total value of all subdivided piece equals C.
Book ChapterDOI
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
Takashi Nishide,Kazuo Ohta +1 more
TL;DR: This paper presents a simplified bit-decomposition protocol by analyzing the original protocol and constructs more efficient protocols for a comparison, interval test and equality test of shared secrets without relying on the bit- Decomposition Protocol.
Proceedings ArticleDOI
Accountable-subgroup multisignatures: extended abstract
TL;DR: The first formal model of security for multisignature schemes that explicitly includes key generation (without relying on trusted third parties) and a protocol, based on Schnorr's signature scheme, that is both provable and efficient are provided.