Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2023-05-17 11:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Card-Based Single-Shuffle Protocols for Secure Multiple-Input AND and XOR Computations (from APKC 2022) Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda (Tohoku Univ), Daiki Miyahara (UEC), Takaaki Mizuki (Tohoku Univ) ISEC2023-6 |
In this invited talk, we introduce the paper ``Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR... [more] |
ISEC2023-6 p.34 |
QIT (2nd) |
2022-12-09 18:15 |
Kanagawa |
Keio Univ. (Primary: On-site, Secondary: Online) |
Secure multi-party quantum computation based on triorthogonal quantum error-correcting codes Petr Mishchenko, Keita Xagawa (NTT) |
Secure multi-party quantum computation (MPQC) protocol is a versatile tool that enables error-free distributed quantum c... [more] |
|
ISEC |
2022-05-18 15:10 |
Online |
Online |
[Invited Talk]
A Card-Minimal Three-Input AND Protocol Using Two Shuffles (from COCOON 2021) Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki (Tohoku Univ.), Daiki Miyahara (UEC/AIST), Takaaki Mizuki (Tohoku Univ./AIST) ISEC2022-4 |
In this invited talk, we introduce the paper ``A Card-Minimal Three-Input AND Protocol Using Two Shuffles'' by Raimu Isu... [more] |
ISEC2022-4 p.19 |
QIT (2nd) |
2021-11-30 17:00 |
Online |
Online |
Secure multi-party quantum computation based on triply-even quantum error-correcting codes Mishchenko Petr, Xagawa Keita (NTT) |
In this talk we suggest secure multi-party quantum computation based on triply-even Chalderbank-Shor-Steane (CSS) quantu... [more] |
|
ISEC |
2021-05-19 10:00 |
Online |
Online |
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations Yoshifumi Manabe, Hibiki Ono (Kogakuin Univ) ISEC2021-1 |
This paper shows card-based cryptographic protocols that use a standard deck of cards. They are multi-party secure comp... [more] |
ISEC2021-1 pp.1-8 |
ISEC |
2021-05-19 11:05 |
Online |
Online |
[Invited Talk]
Six-Card Finite-Runtime XOR Protocol with Only Random Cut (from APKC 2020) Kodai Toyoda (Tohoku Univ.), Daiki Miyahara (Tohoku Univ./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2021-3 |
In this invited talk, we introduce the paper ``Six-Card Finite-Runtime XOR Protocol with Only Random Cut'' by Kodai Toyo... [more] |
ISEC2021-3 p.17 |
WBS, IT, ISEC |
2021-03-05 11:20 |
Online |
Online |
Non-interactive multiparty computation adapt to dynamic participants Shota Mazawa, Junji Shikata (Yokohama National Univ.) IT2020-148 ISEC2020-78 WBS2020-67 |
Multi-party computation is a protocol that allows participants to communicate each other and know only the result of a c... [more] |
IT2020-148 ISEC2020-78 WBS2020-67 pp.219-224 |
IN, ICTSSL, NWS |
2020-10-22 15:25 |
Online |
Online |
[Invited Talk]
Secure Data Utilization using Multi-Party Computation Takao Takenouchi (Digital Garage) IN2020-32 |
It is becoming more and more important to distribute and utilize data between organizations to provide better services a... [more] |
IN2020-32 pp.12-17 |
ISEC |
2019-05-17 17:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles (from APKC 2018) Yuta Abe (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2019-11 |
In this invited talk, we introduce the paper ``Five-Card AND Protocol in Committed Format Using Only Practical Shuffles'... [more] |
ISEC2019-11 p.49 |
IT, ISEC, WBS |
2019-03-08 14:45 |
Tokyo |
University of Electro-Communications |
A Private PEZ Protocol of 4-Input Majority Vote with 29 PEZ Candies Yoshiki Abe, Shota Yamamoto, Mitsugu Iwamoto, Kazuo Ohta (UEC) IT2018-111 ISEC2018-117 WBS2018-112 |
Secure multi-party computation can be implemented by
using a (big) PEZ dispenser,
which is called as a ¥textit{priva... [more] |
IT2018-111 ISEC2018-117 WBS2018-112 pp.223-228 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 16:15 |
Hokkaido |
Sapporo Convention Center |
Secure Multiparty Computation of Ranking Using a Deck of Cards Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara (Tohoku Univ.), Kazumasa Shinagawa (Tokyo Inst. of Tech./AIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 |
(To be available after the conference date) [more] |
ISEC2018-30 SITE2018-22 HWS2018-27 ICSS2018-33 EMM2018-29 pp.163-169 |
WBS, IT, ISEC |
2018-03-08 13:00 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105 |
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations tha... [more] |
IT2017-124 ISEC2017-112 WBS2017-105 pp.121-128 |
WBS, IT, ISEC |
2018-03-08 13:25 |
Tokyo |
Katsusika Campas, Tokyo University of Science |
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) IT2017-125 ISEC2017-113 WBS2017-106 |
This paper considers malicious behaviors in card-based cryptographic protocols with private operations.
Most of card-ba... [more] |
IT2017-125 ISEC2017-113 WBS2017-106 pp.129-135 |
ISEC |
2017-09-04 11:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) ISEC2017-42 |
This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation... [more] |
ISEC2017-42 pp.7-14 |
ISEC |
2017-09-04 12:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Lower Bound on the Number of Shuffles for Commited-Format AND Protocols Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-43 |
(To be available after the conference date) [more] |
ISEC2017-43 pp.15-22 |
ISEC |
2017-05-12 10:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on the Numbers of Cards Required to Make Copied Commitments Daiki Miyahara (Tohoku Univ.), Yu-ichi Hayashi (NAIST), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2017-3 |
Card-based cryptography performs secure multi-party computation with black and red cards. Usually, a Boolean value is en... [more] |
ISEC2017-3 pp.15-22 |
ISEC |
2016-09-02 09:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Note on Secure Execution of Random Bisection Cut Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.) ISEC2016-38 |
Using a deck of cards, we can realize a secure computation. Especially, since a random bisection cut was devised in 2009... [more] |
ISEC2016-38 pp.1-7 |
ISEC |
2015-09-04 14:30 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Scalable Multiparty Private Set Intersection Shohei Nishida, Atsuko Miyaji (JAIST) ISEC2015-31 |
Both scalability and exibility become critical criteria for privacy preserving protocols in the age of Big Data. Private... [more] |
ISEC2015-31 pp.43-48 |
ISEC |
2014-12-19 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Round-Efficient Black-Box Construction of Composable Multi-Party Computation Susumu Kiyoshima (NTT) ISEC2014-74 |
We talk about our paper that appeared in CRYPTO 2014.In that paper, we present a round-efficient black-box construction ... [more] |
ISEC2014-74 p.23 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 11:30 |
Hokkaido |
San-Refure Hakodate |
Privacy Preserving Conditional Disclosure II Kohtaro Tadaki, Shigeo Tsujii (Chuo Univ.) ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 |
In SCIS2012, we proposed a privacy preserving and utilization scheme, called the privacy preserving conditional disclosu... [more] |
ISEC2014-13 SITE2014-8 ICSS2014-17 EMM2014-13 pp.25-30 |