number | title/author |
---|---|
We-AM-1-2.1 | On Hiding Access Timings in ORAM Yuma Kanai, Kazuki Yoneyama, |
We-AM-1-2.2 | Improved Verifiable Delegated Private Set Intersection Shintaro Terada, Kazuki Yoneyama, |
We-AM-1-2.3 | Tree-based Secure Comparison of Secret Shared Data Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka, |
We-AM-1-2.4 | Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai, |
We-AM-1-2.5 | Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol Satsuya Ohata, Hiraku Morita, Goichiro Hanaoka, |