Dai Ikarashi

Learn More
BACKGROUND AND OBJECTIVE While the secondary use of medical data has gained attention, its adoption has been constrained due to protection of patient privacy. Making medical data secure by de-identification can be problematic, especially when the data concerns rare diseases. We require rigorous security management measures. MATERIALS AND METHODS Using(More)
Recently, several efforts to implement and use an unconditionally secure multi-party computation (MPC) scheme have been put into practice. These implementations are passively secure MPC schemes in which an adversary must follow the MPC schemes. Although passively secure MPC schemes are efficient, passive security has the strong restriction concerning the(More)
We propose a simple and efficient sorting algorithm for secure multi-party computation (MPC). The algorithm is designed to be efficient when the number of parties and the size of the underlying field are small. For a constant number of parties and a field with a constant size, the algorithm has O(n log n) communication complexity, which is asymptotically(More)
Building optimal virtual networks across multiple domains is an essential technology for offering flexible network services. However, existing research is founded on an unrealistic assumption: providers will share their private information including resource costs. Providers, as well known, never actually do that so as to remain competitive. Secure(More)
The secure set-intersection protocol is a cryptographic protocol that retrieves the intersection of two or more datasets without revealing any additional information apart from the intersection data. In this paper we formalize the secure matching tag, which is frequently used in the existing secure set-intersection protocols, and propose applying the tag to(More)