Hideaki Sone

From MaRDI portal
(Redirected from Person:820564)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Card-based protocol against actively revealing card attack2024-04-19Paper
Committed-format AND protocol using only random cuts
Natural Computing
2023-09-08Paper
Actively revealing card attack on card-based protocols
Natural Computing
2023-08-31Paper
Physical zero-knowledge proof for Makaro
Lecture Notes in Computer Science
2023-08-02Paper
Public-PEZ Cryptography2023-03-21Paper
Card-based ZKP protocols for Takuzu and Juosan2023-02-07Paper
A physical ZKP for Slitherlink: how to perform physical topology-preserving computation2022-08-30Paper
A secure three-input and protocol with a standard deck of minimal cards2022-03-21Paper
Efficient generation of a card-based uniformly distributed random derangement2021-10-04Paper
How to construct physical zero-knowledge proofs for puzzles with a ``single loop'' condition
Theoretical Computer Science
2021-09-27Paper
Card-based protocols for secure ranking computations
Theoretical Computer Science
2020-10-22Paper
Efficient card-based zero-knowledge proof for Sudoku
Theoretical Computer Science
2020-09-03Paper
Card-based zero-knowledge proof for Sudoku2020-08-11Paper
Card-based secure ranking computations2020-05-13Paper
Interactive physical zero-knowledge proof for Norinori2020-02-24Paper
Practical card-based implementations of Yao's millionaire protocol
Theoretical Computer Science
2019-12-27Paper
Practical and easy-to-understand card-based implementation of Yao's millionaire protocol2019-10-11Paper
Card-based protocols using unequal division shuffles
Soft Computing
2018-10-22Paper
Analyzing execution time of card-based protocols2018-10-18Paper
Secret key amplification from uniformly leaked key exchange complete graph2018-06-15Paper
The minimum number of cards in practical card-based protocols2018-02-23Paper
Necessary and sufficient numbers of cards for securely computing two-bit output functions2017-10-23Paper
Card-based protocols for any Boolean function
Lecture Notes in Computer Science
2015-09-30Paper
Minimizing ESCT forms for two-variable multiple-valued input binary output functions
Discrete Applied Mathematics
2014-05-06Paper
Voting with a Logarithmic Number of Cards
Unconventional Computation and Natural Computation
2013-06-28Paper
The five-card trick can be done with four cards
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
An application of st-numbering to secret key agreement
International Journal of Foundations of Computer Science
2011-10-10Paper
A one-round secure message broadcasting protocol through a key sharing tree
Information Processing Letters
2010-08-20Paper
Six-Card Secure AND and Four-Card Secure XOR
Frontiers in Algorithmics
2009-07-14Paper
Secure Multiparty Computations Using the 15 Puzzle
Combinatorial Optimization and Applications
2009-03-03Paper
Secure Multiparty Computations Using a Dial Lock
Lecture Notes in Computer Science
2007-11-13Paper
Theory and Applications of Models of Computation
Lecture Notes in Computer Science
2007-04-30Paper
Securely computing XOR with 10 cards2006-12-05Paper


Research outcomes over time


This page was built for person: Hideaki Sone