default search action
Koji Chida
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Kabuto Okajima, Koji Chida:
A Study on Anonymization Through Participation in iPWS Cup 2023. IWSEC 2024: 297-306 - [c20]Koji Chida, Susumu Kakuta, Hiroyuki Itakura, Ichiro Ishihara, Kosuke Yoshioka, Hiroshi Takeuchi:
Experimental Evaluation for Risk Assessment of Privacy Preserving Synthetic Data. MDAI 2024: 224-236 - 2023
- [j15]Takayuki Miura, Toshiki Shibahara, Masanobu Kii, Atsunori Ichikawa, Juko Yamamoto, Koji Chida:
On Rényi Differential Privacy in Statistics-based Synthetic Data Generation. J. Inf. Process. 31: 812-820 (2023) - [j14]Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Daniel Genkin, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. J. Cryptol. 36(3): 15 (2023) - [j13]Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Koji Chida:
Efficient decision tree training with new data structure for secure multi-party computation. Proc. Priv. Enhancing Technol. 2023(1): 343-364 (2023) - [c19]Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida:
Communication-Efficient Inner Product Private Join and Compute with Cardinality. AsiaCCS 2023: 678-688 - [c18]Masaya Kobayashi, Atsushi Fujioka, Koji Chida:
Extended km-Anonymity for Randomization Applied to Binary Data. PST 2023: 1-7 - [i9]Takayuki Miura, Toshiki Shibahara, Masanobu Kii, Atsunori Ichikawa, Juko Yamamoto, Koji Chida:
On Rényi Differential Privacy in Statistics-Based Synthetic Data Generation. CoRR abs/2303.17849 (2023) - 2022
- [i8]Koji Chida, Koki Hamada, Atsunori Ichikawa, Masanobu Kii, Junichi Tomida:
Private Intersection-Weighted-Sum. IACR Cryptol. ePrint Arch. 2022: 338 (2022) - 2021
- [i7]Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Koji Chida:
Efficient decision tree training with new data structure for secure multi-party computation. CoRR abs/2112.12906 (2021)
2010 – 2019
- 2019
- [i6]Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Naoto Kiribuchi, Benny Pinkas:
An Efficient Secure Three-Party Sorting Protocol with an Honest Majority. IACR Cryptol. ePrint Arch. 2019: 695 (2019) - 2018
- [j12]Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada:
Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 51-63 (2018) - [c17]Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida:
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. ACISP 2018: 64-82 - [c16]Koji Chida, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Benny Pinkas:
High-Throughput Secure AES Computation. WAHC@CCS 2018: 13-24 - [c15]Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. CRYPTO (3) 2018: 34-64 - [i5]Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida:
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. IACR Cryptol. ePrint Arch. 2018: 387 (2018) - [i4]Koji Chida, Daniel Genkin, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Yehuda Lindell, Ariel Nof:
Fast Large-Scale Honest-Majority MPC for Malicious Adversaries. IACR Cryptol. ePrint Arch. 2018: 570 (2018) - 2017
- [j11]Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata:
Computational SS and conversion protocols in both active and passive settings. IET Inf. Secur. 11(5): 287-293 (2017) - [c14]Eizen Kimura, Satoshi Hasegawa, Koji Chida, Shoko Gamo, Satoshi Irino, Haku Ishida, Yukio Kurihara:
Evaluation of the Anonymity and Utility of De-Identified Clinical Data Based on Japanese Anonymization Criteria. MedInfo 2017: 1303 - [e1]Satoshi Obana, Koji Chida:
Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings. Lecture Notes in Computer Science 10418, Springer 2017, ISBN 978-3-319-64199-7 [contents] - 2016
- [c13]Eizen Kimura, Koki Hamada, Ryo Kikuchi, Koji Chida, Kazuya Okamoto, Shirou Manabe, Tomohiro Kuroda, Yasushi Matsumura, Toshihiro Takeda, Naoki Mihara:
Evaluation of Secure Computation in a Distributed Healthcare Setting. MIE 2016: 152-156 - 2015
- [j10]Ryo Kikuchi, Koji Chida, Dai Ikarashi, Wakaha Ogata, Koki Hamada, Katsumi Takahashi:
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 213-222 (2015) - [j9]Ryo Kikuchi, Dai Ikarashi, Koki Hamada, Koji Chida:
Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 223-231 (2015) - [c12]Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada:
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation. CANS 2015: 179-196 - [c11]Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi:
k-Anonymous Microdata Release via Post Randomisation Method. IWSEC 2015: 225-241 - [i3]Dai Ikarashi, Ryo Kikuchi, Koji Chida, Katsumi Takahashi:
k-anonymous Microdata Release via Post Randomisation Method. CoRR abs/1504.05353 (2015) - 2014
- [i2]Koki Hamada, Dai Ikarashi, Koji Chida, Katsumi Takahashi:
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation. IACR Cryptol. ePrint Arch. 2014: 121 (2014) - [i1]Dai Ikarashi, Ryo Kikuchi, Koki Hamada, Koji Chida:
Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead. IACR Cryptol. ePrint Arch. 2014: 304 (2014) - 2013
- [c10]Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi:
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. ACISP 2013: 419-434 - 2012
- [c9]Koki Hamada, Ryo Kikuchi, Dai Ikarashi, Koji Chida, Katsumi Takahashi:
Practically Efficient Multi-party Sorting Protocols from Comparison Sort Algorithms. ICISC 2012: 202-216 - 2010
- [c8]Koji Chida, Dai Ikarashi, Katsumi Takahashi:
Tag-Based Secure Set-Intersection Protocol and Its Application to Privacy-Enhancing Biometrics. NBiS 2010: 535-540
2000 – 2009
- 2009
- [j8]Koji Chida, Hiroaki Kikuchi, Keiichi Hirota, Gembu Morohashi:
Multiparty Computation from El Gamal/Paillier Conversion. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 137-146 (2009) - 2008
- [j7]Koji Chida, Go Yamamoto:
Batch Processing for Proofs of Partial Knowledge and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 150-159 (2008) - [j6]Gembu Morohashi, Koji Chida, Keiichi Hirota, Hiroaki Kikuchi:
Secure Multiparty Computation for Comparator Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2349-2355 (2008) - [c7]Koji Chida, Katsumi Takahashi:
Privacy Preserving Computations without Public Key Cryptographic Operation. IWSEC 2008: 184-200 - 2007
- [j5]Koji Chida, Go Yamamoto, Koutarou Suzuki, Shigenori Uchiyama, Noburou Taniguchi, Osamu Shionoiri, Atsushi Kanai:
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 128-138 (2007) - [c6]Koji Chida, Hiroaki Kikuchi, Gembu Morohashi, Keiichi Hirota:
Efficient Multiparty Computation for Comparator Networks. ARES 2007: 1183-1189 - [c5]Koji Chida, Go Yamamoto:
Batch Processing of Interactive Proofs. CT-RSA 2007: 196-207 - [c4]Koji Chida, Osamu Shionoiri, Atsushi Kanai:
Secure Anonymous Communications with Practical Anonymity Revocation Scheme. IWSEC 2007: 352-364 - 2006
- [j4]Koji Chida:
Conversion Schemes for Unlinkable Signatures That Include Revocable Unlinkability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 90-98 (2006) - 2005
- [j3]Koji Chida, Masayuki Abe:
Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 211-221 (2005) - [c3]Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai:
DECIDE: a scheme for decentralized identity escrow. Digital Identity Management 2005: 37-45 - [c2]Go Yamamoto, Koji Chida, Anderson C. A. Nascimento, Koutarou Suzuki, Shigenori Uchiyama:
Efficient, Non-optimistic Secure Circuit Evaluation Based on the ElGamal Encryption. WISA 2005: 328-342 - 2004
- [j2]Koji Chida, Kunio Kobayashi, Hikaru Morita:
An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 173-181 (2004) - 2002
- [j1]Koji Chida, Shigenori Uchiyama, Taiichi Saito:
A New Factoring Method of Integers N=pr ✕ q for Large r. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(5): 1050-1053 (2002) - 2001
- [c1]Koji Chida, Kunio Kobayashi, Hikaru Morita:
Efficient Sealed-Bid Auctions for Massive Numbers of Bidders with Lump Comparison. ISC 2001: 408-419
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint