Zobrazeno 1 - 10
of 141
pro vyhledávání: '"Takaaki Mizuki"'
Autor:
Yuichi Komano, Takaaki Mizuki
Publikováno v:
International Journal of Information Security. 21:833-846
In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, the coins themselves have never been in the spotlight. Therefore, we woul
Autor:
Yuichi Komano, Takaaki Mizuki
Publikováno v:
Innovative Security Solutions for Information Technology and Communications ISBN: 9783031326356
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::2c786c14cbd964c58d3ebe3eb27f8b78
https://doi.org/10.1007/978-3-031-32636-3_13
https://doi.org/10.1007/978-3-031-32636-3_13
Publikováno v:
Natural Computing. 20:639-645
In the research area of card-based cryptography, designing committed-format AND protocols that are efficient in terms of the number of required cards is a major topic. Such an AND protocol should receive two pairs of face-down (physical) cards repres
Publikováno v:
Natural Computing. 21:615-628
In 1989, den Boer presented the first card-based protocol, called the “five-card trick,” that securely computes the AND function using a deck of physical cards via a series of actions such as shuffling and turning over cards. This protocol enable
Publikováno v:
New Generation Computing. 39:97-114
In card-based cryptography, designing AND protocols in committed format is a major research topic. The state-of-the-art AND protocol proposed by Koch, Walzer, and Härtel in ASIACRYPT 2015 uses only four cards, which is the minimum permissible number
Autor:
Kazumasa Shinagawa, Yuta Abe, Ken Takashima, Takaaki Mizuki, Daiki Miyahara, Hideaki Sone, Tatsuya Sasaki
Publikováno v:
Theoretical Computer Science. 845:122-135
Consider a group of people who want to know the “rich list” among them, namely the ranking in terms of their total assets, without revealing any information about the actual value of their assets. This can be achieved by a “secure ranking compu
Publikováno v:
Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop.
Publikováno v:
International Journal of Information Security. 20:729-740
Card-based cryptography is an attractive and unconventional computation model; it provides secure computing methods using a deck of physical cards. It is noteworthy that a card-based protocol can be easily executed by non-experts such as high school
Publikováno v:
Theoretical Computer Science. 839:135-142
In 2009, Gradwohl, Naor, Pinkas, and Rothblum proposed physical zero-knowledge proof protocols for Sudoku. That is, for a puzzle instance of Sudoku, their excellent protocols allow a prover to convince a verifier that there is a solution to the Sudok
Publikováno v:
Theoretical Computer Science. 803:207-221
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the actual amounts of their properties. In this paper, we present simple and practical implementatio