Zobrazeno 1 - 10
of 157
pro vyhledávání: '"Hideaki Sone"'
Publikováno v:
IEEE Transactions on Electromagnetic Compatibility. :1-9
Publikováno v:
Natural Computing. 20:639-645
In the research area of card-based cryptography, designing committed-format AND protocols that are efficient in terms of the number of required cards is a major topic. Such an AND protocol should receive two pairs of face-down (physical) cards repres
Publikováno v:
Natural Computing. 21:615-628
In 1989, den Boer presented the first card-based protocol, called the “five-card trick,” that securely computes the AND function using a deck of physical cards via a series of actions such as shuffling and turning over cards. This protocol enable
Publikováno v:
New Generation Computing. 39:97-114
In card-based cryptography, designing AND protocols in committed format is a major research topic. The state-of-the-art AND protocol proposed by Koch, Walzer, and Härtel in ASIACRYPT 2015 uses only four cards, which is the minimum permissible number
Autor:
Kazumasa Shinagawa, Yuta Abe, Ken Takashima, Takaaki Mizuki, Daiki Miyahara, Hideaki Sone, Tatsuya Sasaki
Publikováno v:
Theoretical Computer Science. 845:122-135
Consider a group of people who want to know the “rich list” among them, namely the ranking in terms of their total assets, without revealing any information about the actual value of their assets. This can be achieved by a “secure ranking compu
Autor:
Taiki Kitazawa, Yoshiki Kitamura, Yougwoo Kim, Daisuke Fujimoto, Hideaki Sone, Yuichi Hayashi
Publikováno v:
2022 3rd URSI Atlantic and Asia Pacific Radio Science Meeting (AT-AP-RASC).
Publikováno v:
2021 13th International Workshop on the Electromagnetic Compatibility of Integrated Circuits (EMC Compo).
Publikováno v:
International Journal of Information Security. 20:729-740
Card-based cryptography is an attractive and unconventional computation model; it provides secure computing methods using a deck of physical cards. It is noteworthy that a card-based protocol can be easily executed by non-experts such as high school
Publikováno v:
Theoretical Computer Science. 839:135-142
In 2009, Gradwohl, Naor, Pinkas, and Rothblum proposed physical zero-knowledge proof protocols for Sudoku. That is, for a puzzle instance of Sudoku, their excellent protocols allow a prover to convince a verifier that there is a solution to the Sudok
Publikováno v:
Theoretical Computer Science. 803:207-221
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the actual amounts of their properties. In this paper, we present simple and practical implementatio