Keyword : multiparty protocol


Multiparty Computation from El Gamal/Paillier Conversion
Koji CHIDA Hiroaki KIKUCHI Keiichi HIROTA Gembu MOROHASHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 137-146
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
encryption conversionmultiparty protocolhomomorphic encryptionprivacy-preserving statistical computation
 Summary | Full Text:PDF

Secure Multiparty Computation for Comparator Networks
Gembu MOROHASHI Koji CHIDA Keiichi HIROTA Hiroaki KIKUCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9 ; pp. 2349-2355
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
secure function evaluationcomparator networkmultiparty protocolstatistical analysis(M+1)-st price auction
 Summary | Full Text:PDF

Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications
Koji CHIDA Go YAMAMOTO Koutarou SUZUKI Shigenori UCHIYAMA Noburou TANIGUCHI Osamu SHIONOIRI Atsushi KANAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 128-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
secure circuit evaluationmultiparty protocolElGamal encryptionimplementation
 Summary | Full Text:PDF

Multiparty DSA Signature Generation without Simultaneous User Operations
Yoshiki SAMESHIMA Hideaki SAISHO Kazuko OYANAGI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8 ; pp. 2095-2105
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
threshold multisignatureDigital Signature Algorithmmultiparty protocolcryptographyinformation security
 Summary | Full Text:PDF

Matching Oblivious Transfer: How to Exchange Valuable Data
Shin'ichiro MATSUO Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 189-193
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
oblivious transfermultiparty protocolelectronic market and matching
 Summary | Full Text:PDF

Reshufflable and Laziness Tolerant Mental Card Game Protocol
Kaoru KUROSAWA Yutaka KATAYAMA Wakaha OGATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 72-78
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
mental pokerzero knowledgemultiparty protocolprobabilistic encryptionlaziness tolerant
 Summary | Full Text:PDF

Information Theoretic Approach to Privacy for Multi-Party Protocols
Takashi SATOH Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 79-84
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
multi-terminal information theoryprivacymultiparty protocol
 Summary | Full Text:PDF