The International Symposium on Information Theory and Its Applications

number title/author
We-AM-1-2.1On Hiding Access Timings in ORAM
Yuma Kanai, Kazuki Yoneyama,
We-AM-1-2.2Improved Verifiable Delegated Private Set Intersection
Shintaro Terada, Kazuki Yoneyama,
We-AM-1-2.3Tree-based Secure Comparison of Secret Shared Data
Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka,
We-AM-1-2.4Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests
Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai,
We-AM-1-2.5Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol
Satsuya Ohata, Hiraku Morita, Goichiro Hanaoka,