Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 51 | 2016 |
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations T Nakai, S Shirouchi, M Iwamoto, K Ohta Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017 | 33 | 2017 |
How to solve millionaires’ problem with two kinds of cards T Nakai, Y Misawa, Y Tokushige, M Iwamoto, K Ohta New Generation Computing 39, 73-96, 2021 | 31 | 2021 |
Secure computation for threshold functions with physical cards: power of private permutations T Nakai, S Shirouchi, Y Tokushige, M Iwamoto, K Ohta New Generation Computing 40 (1), 95-113, 2022 | 19 | 2022 |
Efficient card-based majority voting protocols Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga, Y Watanabe, M Iwamoto, ... New Generation Computing 40 (1), 173-198, 2022 | 14 | 2022 |
Efficient card-based cryptographic protocols for logic gates utilizing private permutations S Shirouchi, T Nakai, M Iwamoto, K Ohta Proc. of 2017 Symposium on Cryptography and Information Security (SCIS 2017 …, 2017 | 9 | 2017 |
How to make a secure index for searchable symmetric encryption, revisited Y Watanabe, T Nakai, K Ohara, T Nojima, Y Liu, M Iwamoto, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022 | 4 | 2022 |
Constant-round linear-broadcast secure computation with penalties T Nakai, K Shinagawa Theoretical Computer Science 959, 113874, 2023 | 2 | 2023 |
A computationally efficient card-based majority voting protocol with fewer cards in the private model Y Abe, T Nakai, Y Watanabe, M Iwamoto, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2023 | 2 | 2023 |
Secure computation with non-equivalent penalties in constant rounds T Nakai, K Shinagawa 3rd International Conference on Blockchain Economics, Security and Protocols …, 2022 | 2 | 2022 |
Secure multi-party computation with legally-enforceable fairness T Nakai, K Shinagawa International Journal of Information Security, 1-15, 2024 | 1 | 2024 |
Single-Shuffle Card-Based Protocols with Six Cards per Gate T Ono, K Shinagawa, T Nakai, Y Watanabe, M Iwamoto International Conference on Information Security and Cryptology, 157-169, 2023 | 1 | 2023 |
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners S Uchizono, T Nakai, Y Watanabe, M Iwamoto International Conference on Information Security and Cryptology, 133-156, 2023 | 1 | 2023 |
Card-Based Protocols for Private Set Intersection and Union A Doi, T Ono, Y Abe, T Nakai, K Shinagawa, Y Watanabe, K Nuida, ... New Generation Computing, 1-22, 2024 | | 2024 |
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model T Nakai, K Iwanari, T Ono, Y Abe, Y Watanabe, M Iwamoto New Generation Computing, 1-14, 2024 | | 2024 |
The Two Sheriffs Problem: Cryptographic Formalization and Generalization K Sugimoto, T Nakai, Y Watanabe, M Iwamoto International Conference on Combinatorial Optimization and Applications, 512-523, 2023 | | 2023 |
Threshold ring signature based on isogeny N Isogai, T Nakai, K Suzuki IEICE Technical Report; IEICE Tech. Rep. 123 (129), 72-79, 2023 | | 2023 |
Steganography for Graphs using Graph Spectrum K Kawaguchi, K Toyonaga, C Takahashi, T Nakai, K Suzuki IEICE Technical Report; IEICE Tech. Rep. 122 (428), 305-312, 2023 | | 2023 |
Private Permutations in Card-based Cryptography 中井雄士, ナカイタケシ | | 2021 |
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption T Nakai, T Nojima, M Iwamoto, K Ohta IEICE Technical Report; IEICE Tech. Rep. 116 (505), 187-193, 2017 | | 2017 |