His work on Linguistics as part of general Zero (linguistics) study is frequently connected to Zero-knowledge proof, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. Linguistics connects with themes related to Zero (linguistics) in his study. He regularly links together related areas like Key (lock) in his Computer security studies. As part of his studies on Key (lock), Kazuo Ohta often connects relevant subjects like Computer security. Borrowing concepts from Algorithm, Kazuo Ohta weaves in ideas under Theoretical computer science. He undertakes interdisciplinary study in the fields of Algorithm and Hash function through his research. With his scientific publications, his incorporates both Hash function and Cryptography. His research combines Group signature and Public-key cryptography. His Group signature study often links to related topics such as Public-key cryptography.
Kazuo Ohta regularly links together related areas like Collision in his Computer security studies. In most of his Collision studies, his work intersects topics such as Computer security. He connects Algorithm with Programming language in his research. In his papers, he integrates diverse fields, such as Programming language and Theoretical computer science. His multidisciplinary approach integrates Theoretical computer science and Cryptography in his work. His work blends Cryptography and Hash function studies together. He performs multidisciplinary study on Hash function and Double hashing in his works. His Collision attack research extends to the thematically linked field of Double hashing. He brings together Collision attack and Cryptographic hash function to produce work in his papers.
Alternative medicine connects with themes related to Pathology in his study. His work in Pathology is not limited to one particular discipline; it also encompasses Protocol (science). His Protocol (science) study frequently draws connections to other fields, such as Alternative medicine. His Key (lock) research extends to the thematically linked field of Computer security. Kazuo Ohta frequently studies issues relating to Computer security and Key (lock). His study deals with a combination of Law and Impossibility. His work often combines Impossibility and Law studies. In his works, he conducts interdisciplinary research on Theoretical computer science and Computation. Kazuo Ohta performs multidisciplinary study in the fields of Computation and Theoretical computer science via his papers.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
A Practical Secret Voting Scheme for Large Scale Elections
Atsushi Fujioka;Tatsuaki Okamoto;Kazuo Ohta.
theory and application of cryptographic techniques (1992)
Universal Electronic Cash
Tatsuaki Okamoto;Kazuo Ohta.
international cryptology conference (1991)
Attribute-based encryption with partially hidden encryptor-specified access structures
Takashi Nishide;Kazuki Yoneyama;Kazuo Ohta.
applied cryptography and network security (2008)
Accountable-Subgroup Multisignatures
Silvio Micali;Kazuo Ohta;Leonid Reyzin.
Proceedings of the 8th ACM Conference on Computer and Communication Security, ACM, 2001 (2001)
Method and apparatus for implementing electronic cash
Kazuo Ohta;Tatsuaki Okamoto.
(1990)
Multiparty computation for interval, equality, and comparison without bit-decomposition protocol
Takashi Nishide;Kazuo Ohta.
public key cryptography (2007)
Fault sensitivity analysis
Yang Li;Kazuo Sakiyama;Shigeto Gomisawa;Toshinori Fukunaga.
cryptographic hardware and embedded systems (2010)
Accountable-subgroup multisignatures: extended abstract
Silvio Micali;Kazuo Ohta;Leonid Reyzin.
computer and communications security (2001)
A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme
Kazuo Ohta;Tatsuaki Okamoto.
international cryptology conference (1991)
Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash
Tatsuaki Okamoto;Kazuo Ohta.
international cryptology conference (1989)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
NTT (Japan)
Shanghai Jiao Tong University
Tohoku University
KU Leuven
Ibaraki University
MIT
Boston University
DigiCash
Max Planck Institute for Security and Privacy
Radboud University Nijmegen
University of Paderborn
Steklov Mathematical Institute
Qatar University
University of Massachusetts Lowell
Tokyo Institute of Technology
Tohoku University
University of Copenhagen
Stony Brook University
University of Utah
University of Saskatchewan
Ghent University
The Ohio State University
Universitat Politècnica de València
University of Virginia
University of California, San Francisco
University of Pennsylvania