D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 31 Citations 7,234 249 World Ranking 9547 National Ranking 153

Overview

What is he best known for?

The fields of study Kazuo Ohta is best known for:

  • Cryptography
  • Public-key cryptography
  • Cancer

His work on Linguistics as part of general Zero (linguistics) study is frequently connected to Zero-knowledge proof, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. Linguistics connects with themes related to Zero (linguistics) in his study. He regularly links together related areas like Key (lock) in his Computer security studies. As part of his studies on Key (lock), Kazuo Ohta often connects relevant subjects like Computer security. Borrowing concepts from Algorithm, Kazuo Ohta weaves in ideas under Theoretical computer science. He undertakes interdisciplinary study in the fields of Algorithm and Hash function through his research. With his scientific publications, his incorporates both Hash function and Cryptography. His research combines Group signature and Public-key cryptography. His Group signature study often links to related topics such as Public-key cryptography.

His most cited work include:

  • A practical secret voting scheme for large scale elections (599 citations)
  • Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures (263 citations)
  • Universal Electronic Cash (249 citations)

What are the main themes of his work throughout his whole career to date

Kazuo Ohta regularly links together related areas like Collision in his Computer security studies. In most of his Collision studies, his work intersects topics such as Computer security. He connects Algorithm with Programming language in his research. In his papers, he integrates diverse fields, such as Programming language and Theoretical computer science. His multidisciplinary approach integrates Theoretical computer science and Cryptography in his work. His work blends Cryptography and Hash function studies together. He performs multidisciplinary study on Hash function and Double hashing in his works. His Collision attack research extends to the thematically linked field of Double hashing. He brings together Collision attack and Cryptographic hash function to produce work in his papers.

Kazuo Ohta most often published in these fields:

  • Computer security (60.00%)
  • Algorithm (37.78%)
  • Theoretical computer science (37.78%)

What were the highlights of his more recent work (between 2016-2022)?

  • Alternative medicine (80.00%)
  • Protocol (science) (80.00%)
  • Pathology (80.00%)

In recent works Kazuo Ohta was focusing on the following fields of study:

Alternative medicine connects with themes related to Pathology in his study. His work in Pathology is not limited to one particular discipline; it also encompasses Protocol (science). His Protocol (science) study frequently draws connections to other fields, such as Alternative medicine. His Key (lock) research extends to the thematically linked field of Computer security. Kazuo Ohta frequently studies issues relating to Computer security and Key (lock). His study deals with a combination of Law and Impossibility. His work often combines Impossibility and Law studies. In his works, he conducts interdisciplinary research on Theoretical computer science and Computation. Kazuo Ohta performs multidisciplinary study in the fields of Computation and Theoretical computer science via his papers.

Between 2016 and 2022, his most popular works were:

  • How to Solve Millionaires’ Problem with Two Kinds of Cards (21 citations)
  • Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations (20 citations)
  • Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography (16 citations)

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

A Practical Secret Voting Scheme for Large Scale Elections

Atsushi Fujioka;Tatsuaki Okamoto;Kazuo Ohta.
theory and application of cryptographic techniques (1992)

1335 Citations

Universal Electronic Cash

Tatsuaki Okamoto;Kazuo Ohta.
international cryptology conference (1991)

640 Citations

Attribute-based encryption with partially hidden encryptor-specified access structures

Takashi Nishide;Kazuki Yoneyama;Kazuo Ohta.
applied cryptography and network security (2008)

476 Citations

Accountable-Subgroup Multisignatures

Silvio Micali;Kazuo Ohta;Leonid Reyzin.
Proceedings of the 8th ACM Conference on Computer and Communication Security, ACM, 2001 (2001)

346 Citations

Method and apparatus for implementing electronic cash

Kazuo Ohta;Tatsuaki Okamoto.
(1990)

344 Citations

Multiparty computation for interval, equality, and comparison without bit-decomposition protocol

Takashi Nishide;Kazuo Ohta.
public key cryptography (2007)

277 Citations

Fault sensitivity analysis

Yang Li;Kazuo Sakiyama;Shigeto Gomisawa;Toshinori Fukunaga.
cryptographic hardware and embedded systems (2010)

248 Citations

Accountable-subgroup multisignatures: extended abstract

Silvio Micali;Kazuo Ohta;Leonid Reyzin.
computer and communications security (2001)

247 Citations

A Digital Multisignature Scheme Based on the Fiat-Shamir Scheme

Kazuo Ohta;Tatsuaki Okamoto.
international cryptology conference (1991)

200 Citations

Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash

Tatsuaki Okamoto;Kazuo Ohta.
international cryptology conference (1989)

187 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Kazuo Ohta

Yi Mu

Yi Mu

Fujian Normal University

Publications: 39

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 36

David Pointcheval

David Pointcheval

École Normale Supérieure

Publications: 28

Mihir Bellare

Mihir Bellare

University of California, San Diego

Publications: 26

Bart Preneel

Bart Preneel

KU Leuven

Publications: 26

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 25

Debdeep Mukhopadhyay

Debdeep Mukhopadhyay

Indian Institute of Technology Kharagpur

Publications: 24

Tatsuaki Okamoto

Tatsuaki Okamoto

NTT (Japan)

Publications: 24

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 23

Patrick Schaumont

Patrick Schaumont

Worcester Polytechnic Institute

Publications: 22

Kouichi Sakurai

Kouichi Sakurai

Kyushu University

Publications: 22

Moti Yung

Moti Yung

Columbia University

Publications: 21

Paul England

Paul England

Microsoft (United States)

Publications: 20

Christian Rechberger

Christian Rechberger

Graz University of Technology

Publications: 19

Jan Camenisch

Jan Camenisch

DFINITY

Publications: 18

Jin Li

Jin Li

Chinese Academy of Sciences

Publications: 17

Trending Scientists

Friedhelm Meyer auf der Heide

Friedhelm Meyer auf der Heide

University of Paderborn

Nikita Andreevich Slavnov

Nikita Andreevich Slavnov

Steklov Mathematical Institute

Majeda Khraisheh

Majeda Khraisheh

Qatar University

Olof Ramström

Olof Ramström

University of Massachusetts Lowell

Yasuyuki Tezuka

Yasuyuki Tezuka

Tokyo Institute of Technology

Fumihiro Matsukura

Fumihiro Matsukura

Tohoku University

Niels Morling

Niels Morling

University of Copenhagen

Patricia C. Wright

Patricia C. Wright

Stony Brook University

Diane W. Davidson

Diane W. Davidson

University of Utah

Peiqiang Yu

Peiqiang Yu

University of Saskatchewan

Christophe Ampe

Christophe Ampe

Ghent University

Matthew B. Sullivan

Matthew B. Sullivan

The Ohio State University

Vicente Pallás

Vicente Pallás

Universitat Politècnica de València

Thomas J. Braciale

Thomas J. Braciale

University of Virginia

Ann V. Schwartz

Ann V. Schwartz

University of California, San Francisco

Lawrence R. Wechsler

Lawrence R. Wechsler

University of Pennsylvania

Something went wrong. Please try again later.