Kazumasa Shinagawa

Orcid: 0000-0002-5219-1975

According to our database1, Kazumasa Shinagawa authored at least 47 papers between 2015 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Secure multi-party computation with legally-enforceable fairness.
Int. J. Inf. Sec., December, 2024

Extended Addition Protocol and Efficient Voting Protocols Using Regular Polygon Cards.
New Gener. Comput., September, 2024

Physical Zero-Knowledge Proof for Sukoro.
New Gener. Comput., September, 2024

Card-Based Protocols for Private Set Intersection and Union.
New Gener. Comput., September, 2024

Coin-Based Cryptographic Protocols without Hand Operations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening.
Proceedings of the Advances in Information and Computer Security, 2024

Card-Based Protocols with Single-Card Encoding.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2024, 2024

How to Covertly and Uniformly Scramble the 15 Puzzle and Rubik's Cube.
Proceedings of the 12th International Conference on Fun with Algorithms, 2024

Card-Based Cryptography Meets Differential Privacy.
Proceedings of the 12th International Conference on Fun with Algorithms, 2024

Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks.
Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop, 2024

Size-Hiding Computation in the Honest-But-Curious Model.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Private simultaneous messages based on quadratic residues.
Des. Codes Cryptogr., December, 2023

Constant-round linear-broadcast secure computation with penalties.
Theor. Comput. Sci., May, 2023

Automorphism Shuffles for Graphs and Hypergraphs and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions.
IACR Cryptol. ePrint Arch., 2023

Uniform Cyclic Group Factorizations of Finite Groups.
CoRR, 2023

Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.
Proceedings of the Information Security Practice and Experience, 2023

Single-Shuffle Card-Based Protocols with Six Cards per Gate.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Free-XOR in Card-Based Garbled Circuits.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Graph Automorphism Shuffles from Pile-Scramble Shuffles.
New Gener. Comput., 2022

Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols.
IACR Cryptol. ePrint Arch., 2022

Card-Based Secure Sorting Protocol.
Proceedings of the Advances in Information and Computer Security, 2022

Card-based Cryptographic Protocols for Private Set Intersection.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022

2021
Card-based Cryptography with Dihedral Symmetry.
New Gener. Comput., 2021

A single shuffle is enough for secure card-based computation of any Boolean circuit.
Discret. Appl. Math., 2021

Secure Computation with Non-Equivalent Penalties in Constant Rounds.
Proceedings of the 3rd International Conference on Blockchain Economics, 2021

Card-Based ZKP Protocols for Takuzu and Juosan.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

2020
Card-based protocols for secure ranking computations.
Theor. Comput. Sci., 2020

Card-Based Covert Lottery.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2019
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit.
IACR Cryptol. ePrint Arch., 2019

Card-Based Cryptography with Invisible Ink.
Proceedings of the Theory and Applications of Models of Computation, 2019

Light Cryptography.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Secure Computation of Any Boolean Function Based on Any Deck of Cards.
Proceedings of the Frontiers in Algorithmics - 13th International Workshop, 2019

Card-Based Secure Ranking Computations.
Proceedings of the Combinatorial Optimization and Applications, 2019

2018
Secure Grouping Protocol Using a Deck of Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Physical Zero-Knowledge Proof for Makaro.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

The Six-Card Trick: Secure Computation of Three-Input Equality.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Card-based Protocols Using Triangle Cards.
Proceedings of the 9th International Conference on Fun with Algorithms, 2018

2017
Card-Based Protocols Using Regular Polygon Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

One-time Programs with Cloud Storage and Its Application to Electronic Money.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

2016
Secure Computation Protocols Using Polarizing Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Committed AND protocol using three cards with more handy shuffle.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Size-Hiding Computation for Multiple Parties.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Proceedings of the Provable Security, 2015

Secure Multi-Party Computation Using Polarizing Cards.
Proceedings of the Advances in Information and Computer Security, 2015


  Loading...