Takaaki Mizuki

From MaRDI portal
(Redirected from Person:249090)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Efficient AND protocols resistant to maliciously revealing a single card2026-03-20Paper
How to play Old Maid with virtual players2025-04-29Paper
How to play Old Maid with virtual players
Theory of Computing Systems
2025-04-08Paper
Card-based cryptography meets 3D printer2025-03-12Paper
Upper bounds on the number of shuffles for two-helping-card multi-input AND protocols2024-06-05Paper
Two UNO decks efficiently perform zero-knowledge proof for Sudoku2024-05-29Paper
Card-based protocol against actively revealing card attack2024-04-19Paper
Single-shuffle card-based protocol with eight cards per gate
Unconventional Computation and Natural Computation
2024-01-12Paper
Multi-party computation based on physical coins
Theory and Practice of Natural Computing
2023-10-16Paper
Committed-format AND protocol using only random cuts
Natural Computing
2023-09-08Paper
Physical ZKP protocols for Nurimisaki and Kurodoko
Theoretical Computer Science
2023-09-07Paper
Actively revealing card attack on card-based protocols
Natural Computing
2023-08-31Paper
Physical zero-knowledge proof protocol for Topswops
Information Security Practice and Experience
2023-08-04Paper
Hide a liar: card-based ZKP protocol for Usowan
Lecture Notes in Computer Science
2023-08-04Paper
Secure computations through checking suits of playing cards
Frontiers of Algorithmic Wisdom
2023-08-03Paper
Physical zero-knowledge proof for Makaro
Lecture Notes in Computer Science
2023-08-02Paper
Card-minimal protocols for symmetric Boolean functions of more than seven inputs
Lecture Notes in Computer Science
2023-07-28Paper
Card-based ZKP protocol for Nurimisaki
Lecture Notes in Computer Science
2023-06-12Paper
Card-minimal protocols for three-input functions with standard playing cards
Progress in Cryptology - AFRICACRYPT 2022
2023-06-02Paper
Another use of the five-card trick: card-minimal secure three-input majority function evaluation
Lecture Notes in Computer Science
2023-05-12Paper
Card-based zero-knowledge proof protocols for graph problems and their computational model2023-04-13Paper
A card-minimal three-input and protocol using two shuffles2023-03-30Paper
Physical Zero-Knowledge Proof for Suguru Puzzle2023-03-21Paper
Public-PEZ Cryptography2023-03-21Paper
Card-based ZKP protocols for Takuzu and Juosan2023-02-07Paper
Card-Based Secure Sorting Protocol2023-01-18Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation2022-08-30Paper
Zero-knowledge proof protocol for cryptarithmetic using dihedral cards2022-07-06Paper
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle
Information and Computation
2022-06-08Paper
Information leakage due to operative errors in card-based protocols
Information and Computation
2022-06-08Paper
Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori2022-03-22Paper
A secure three-input and protocol with a standard deck of minimal cards2022-03-21Paper
Efficient generation of a card-based uniformly distributed random derangement2021-10-04Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop'' condition
Theoretical Computer Science
2021-09-27Paper
How to implement a non-uniform or non-closed shuffle2021-07-06Paper
Card-based protocols for secure ranking computations
Theoretical Computer Science
2020-10-22Paper
Efficient card-based zero-knowledge proof for Sudoku
Theoretical Computer Science
2020-09-03Paper
Card-based protocols using triangle cards2020-08-11Paper
Card-based zero-knowledge proof for Sudoku2020-08-11Paper
Card-based secure ranking computations2020-05-13Paper
Interactive physical zero-knowledge proof for Norinori2020-02-24Paper
Practical card-based implementations of Yao's millionaire protocol
Theoretical Computer Science
2019-12-27Paper
Secure computation of any Boolean function based on any deck of cards2019-10-11Paper
Practical and easy-to-understand card-based implementation of Yao's millionaire protocol2019-10-11Paper
The six-card trick: secure computation of three-input equality2019-03-29Paper
Efficient and secure multiparty computations using a standard deck of playing cards2018-10-26Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
Card-based protocols using unequal division shuffles
Soft Computing
2018-10-22Paper
Analyzing execution time of card-based protocols2018-10-18Paper
Analysis of information leakage due to operative errors in card-based protocols2018-09-06Paper
Secret key amplification from uniformly leaked key exchange complete graph2018-06-15Paper
The minimum number of cards in practical card-based protocols2018-02-23Paper
Necessary and sufficient numbers of cards for securely computing two-bit output functions2017-10-23Paper
Card-based protocols for securely computing the conjunction of multiple variables
Theoretical Computer Science
2016-02-26Paper
Multi-party computation with small shuffle complexity using regular polygon cards
Provable Security
2016-01-27Paper
Card-based protocols for any Boolean function
Lecture Notes in Computer Science
2015-09-30Paper
Efficient card-based protocols for generating a hidden random permutation without fixed points
Unconventional Computation and Natural Computation
2015-09-14Paper
Minimizing ESCT forms for two-variable multiple-valued input binary output functions
Discrete Applied Mathematics
2014-05-06Paper
Voting with a Logarithmic Number of Cards
Unconventional Computation and Natural Computation
2013-06-28Paper
The five-card trick can be done with four cards
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Absolutely secure message transmission using a key sharing graph
Discrete Mathematics, Algorithms and Applications
2013-01-24Paper
Minimizing AND-EXOR expressions for two-variable multiple-valued input binary output functions2012-04-26Paper
An application of st-numbering to secret key agreement
International Journal of Foundations of Computer Science
2011-10-10Paper
A one-round secure message broadcasting protocol through a key sharing tree
Information Processing Letters
2010-08-20Paper
Six-Card Secure AND and Four-Card Secure XOR
Frontiers in Algorithmics
2009-07-14Paper
Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions
Lecture Notes in Computer Science
2009-06-03Paper
Secure Multiparty Computations Using the 15 Puzzle
Combinatorial Optimization and Applications
2009-03-03Paper
A revised transformation protocol for unconditionally secure secret key exchange
Theory of Computing Systems
2008-04-03Paper
Secure Multiparty Computations Using a Dial Lock
Lecture Notes in Computer Science
2007-11-13Paper
Theory and Applications of Models of Computation
Lecture Notes in Computer Science
2007-04-30Paper
Securely computing XOR with 10 cards2006-12-05Paper
Computing and Combinatorics
Lecture Notes in Computer Science
2005-06-15Paper
scientific article; zbMATH DE number 2080991 (Why is no real title available?)2004-08-04Paper
Characterization of optimal key set protocols
Discrete Applied Mathematics
2003-09-25Paper
scientific article; zbMATH DE number 1759477 (Why is no real title available?)2002-11-25Paper
scientific article; zbMATH DE number 1788708 (Why is no real title available?)2002-08-26Paper
scientific article; zbMATH DE number 1925555 (Why is no real title available?)
International Journal of Information Security
2002-01-01Paper
scientific article; zbMATH DE number 1304085 (Why is no real title available?)2000-03-07Paper
scientific article; zbMATH DE number 1222849 (Why is no real title available?)1999-02-14Paper


Research outcomes over time


This page was built for person: Takaaki Mizuki