Hideaki Sone

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Card-based protocol against actively revealing card attack2024-04-19Paper
Committed-format AND protocol using only random cuts
Natural Computing
2023-09-08Paper
Actively revealing card attack on card-based protocols
Natural Computing
2023-08-31Paper
Physical zero-knowledge proof for Makaro
Lecture Notes in Computer Science
2023-08-02Paper
Public-PEZ Cryptography2023-03-21Paper
Card-based ZKP protocols for Takuzu and Juosan2023-02-07Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation2022-08-30Paper
A secure three-input and protocol with a standard deck of minimal cards2022-03-21Paper
Efficient generation of a card-based uniformly distributed random derangement2021-10-04Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop'' condition
Theoretical Computer Science
2021-09-27Paper
Card-based protocols for secure ranking computations
Theoretical Computer Science
2020-10-22Paper
Efficient card-based zero-knowledge proof for Sudoku
Theoretical Computer Science
2020-09-03Paper
Card-based zero-knowledge proof for Sudoku2020-08-11Paper
Card-based secure ranking computations2020-05-13Paper
Interactive physical zero-knowledge proof for Norinori2020-02-24Paper
Practical card-based implementations of Yao's millionaire protocol
Theoretical Computer Science
2019-12-27Paper
Practical and easy-to-understand card-based implementation of Yao's millionaire protocol2019-10-11Paper
Card-based protocols using unequal division shuffles
Soft Computing
2018-10-22Paper
Analyzing execution time of card-based protocols2018-10-18Paper
Secret key amplification from uniformly leaked key exchange complete graph2018-06-15Paper
The minimum number of cards in practical card-based protocols2018-02-23Paper
Necessary and sufficient numbers of cards for securely computing two-bit output functions2017-10-23Paper
Card-based protocols for any Boolean function
Lecture Notes in Computer Science
2015-09-30Paper
Minimizing ESCT forms for two-variable multiple-valued input binary output functions
Discrete Applied Mathematics
2014-05-06Paper
Voting with a Logarithmic Number of Cards
Unconventional Computation and Natural Computation
2013-06-28Paper
The five-card trick can be done with four cards
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
An application of st-numbering to secret key agreement
International Journal of Foundations of Computer Science
2011-10-10Paper
A one-round secure message broadcasting protocol through a key sharing tree
Information Processing Letters
2010-08-20Paper
Six-Card Secure AND and Four-Card Secure XOR
Frontiers in Algorithmics
2009-07-14Paper
Secure Multiparty Computations Using the 15 Puzzle
Combinatorial Optimization and Applications
2009-03-03Paper
Secure Multiparty Computations Using a Dial Lock
Lecture Notes in Computer Science
2007-11-13Paper
Theory and Applications of Models of Computation
Lecture Notes in Computer Science
2007-04-30Paper
Securely computing XOR with 10 cards2006-12-05Paper


Research outcomes over time


This page was built for person: Hideaki Sone