Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016 | 54 | 2016 |
How to solve millionaires’ problem with two kinds of cards T Nakai, Y Misawa, Y Tokushige, M Iwamoto, K Ohta New Generation Computing 39, 73-96, 2021 | 34 | 2021 |
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations T Nakai, S Shirouchi, M Iwamoto, K Ohta Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017 | 33 | 2017 |
Secure computation for threshold functions with physical cards: power of private permutations T Nakai, S Shirouchi, Y Tokushige, M Iwamoto, K Ohta New Generation Computing 40 (1), 95-113, 2022 | 22 | 2022 |
Efficient card-based majority voting protocols Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga, Y Watanabe, M Iwamoto, ... New Generation Computing 40 (1), 173-198, 2022 | 17 | 2022 |
Efficient card-based cryptographic protocols for logic gates utilizing private permutations S Shirouchi, T Nakai, M Iwamoto, K Ohta Proc. of 2017 Symposium on Cryptography and Information Security (SCIS 2017 …, 2017 | 9 | 2017 |
Single-Shuffle Card-Based Protocols with Six Cards per Gate T Ono, K Shinagawa, T Nakai, Y Watanabe, M Iwamoto International Conference on Information Security and Cryptology, 157-169, 2023 | 5 | 2023 |
A computationally efficient card-based majority voting protocol with fewer cards in the private model Y Abe, T Nakai, Y Watanabe, M Iwamoto, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2023 | 5 | 2023 |
How to make a secure index for searchable symmetric encryption, revisited Y Watanabe, T Nakai, K Ohara, T Nojima, Y Liu, M Iwamoto, K Ohta IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022 | 5 | 2022 |
Card-based cryptographic protocols for private set intersection A Doi, T Ono, T Nakai, K Shinagawa, Y Watanabe, K Nuida, M Iwamoto 2022 International Symposium on Information Theory and Its Applications …, 2022 | 5 | 2022 |
Card-based protocols for private set intersection and union A Doi, T Ono, Y Abe, T Nakai, K Shinagawa, Y Watanabe, K Nuida, ... New Generation Computing 42 (3), 359-380, 2024 | 3 | 2024 |
Constant-round linear-broadcast secure computation with penalties T Nakai, K Shinagawa Theoretical Computer Science 959, 113874, 2023 | 3 | 2023 |
Secure computation with non-equivalent penalties in constant rounds T Nakai, K Shinagawa 3rd International Conference on Blockchain Economics, Security and Protocols …, 2022 | 3 | 2022 |
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners S Uchizono, T Nakai, Y Watanabe, M Iwamoto International Conference on Information Security and Cryptology, 133-156, 2023 | 2 | 2023 |
Secure multi-party computation with legally-enforceable fairness T Nakai, K Shinagawa International Conference on Information and Communications Security, 161-178, 2023 | 2 | 2023 |
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model T Nakai, K Iwanari, T Ono, Y Abe, Y Watanabe, M Iwamoto New Generation Computing, 1-14, 2024 | 1 | 2024 |
Card-based Secure Sorting Protocols based on the Sorting Networks K Kato, T Nakai, K Suzuki 2024 11th International Conference on Advanced Informatics: Concept, Theory …, 2024 | | 2024 |
Search Result Verifiability in Multi-User Dynamic Searchable Symmetric Encryption M Son, T Nakai, K Suzuki 2024 11th International Conference on Advanced Informatics: Concept, Theory …, 2024 | | 2024 |
The Two Sheriffs Problem: Cryptographic Formalization and Generalization K Sugimoto, T Nakai, Y Watanabe, M Iwamoto International Conference on Combinatorial Optimization and Applications, 512-523, 2023 | | 2023 |
Threshold ring signature based on isogeny N Isogai, T Nakai, K Suzuki IEICE Technical Report; IEICE Tech. Rep. 123 (129), 72-79, 2023 | | 2023 |