Follow
Takeshi Nakai
Title
Cited by
Cited by
Year
Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations
T Nakai, Y Tokushige, Y Misawa, M Iwamoto, K Ohta
Cryptology and Network Security: 15th International Conference, CANS 2016 …, 2016
542016
How to solve millionaires’ problem with two kinds of cards
T Nakai, Y Misawa, Y Tokushige, M Iwamoto, K Ohta
New Generation Computing 39, 73-96, 2021
342021
Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
T Nakai, S Shirouchi, M Iwamoto, K Ohta
Information Theoretic Security: 10th International Conference, ICITS 2017 …, 2017
332017
Secure computation for threshold functions with physical cards: power of private permutations
T Nakai, S Shirouchi, Y Tokushige, M Iwamoto, K Ohta
New Generation Computing 40 (1), 95-113, 2022
222022
Efficient card-based majority voting protocols
Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga, Y Watanabe, M Iwamoto, ...
New Generation Computing 40 (1), 173-198, 2022
172022
Efficient card-based cryptographic protocols for logic gates utilizing private permutations
S Shirouchi, T Nakai, M Iwamoto, K Ohta
Proc. of 2017 Symposium on Cryptography and Information Security (SCIS 2017 …, 2017
92017
Single-Shuffle Card-Based Protocols with Six Cards per Gate
T Ono, K Shinagawa, T Nakai, Y Watanabe, M Iwamoto
International Conference on Information Security and Cryptology, 157-169, 2023
52023
A computationally efficient card-based majority voting protocol with fewer cards in the private model
Y Abe, T Nakai, Y Watanabe, M Iwamoto, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2023
52023
How to make a secure index for searchable symmetric encryption, revisited
Y Watanabe, T Nakai, K Ohara, T Nojima, Y Liu, M Iwamoto, K Ohta
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022
52022
Card-based cryptographic protocols for private set intersection
A Doi, T Ono, T Nakai, K Shinagawa, Y Watanabe, K Nuida, M Iwamoto
2022 International Symposium on Information Theory and Its Applications …, 2022
52022
Card-based protocols for private set intersection and union
A Doi, T Ono, Y Abe, T Nakai, K Shinagawa, Y Watanabe, K Nuida, ...
New Generation Computing 42 (3), 359-380, 2024
32024
Constant-round linear-broadcast secure computation with penalties
T Nakai, K Shinagawa
Theoretical Computer Science 959, 113874, 2023
32023
Secure computation with non-equivalent penalties in constant rounds
T Nakai, K Shinagawa
3rd International Conference on Blockchain Economics, Security and Protocols …, 2022
32022
Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners
S Uchizono, T Nakai, Y Watanabe, M Iwamoto
International Conference on Information Security and Cryptology, 133-156, 2023
22023
Secure multi-party computation with legally-enforceable fairness
T Nakai, K Shinagawa
International Conference on Information and Communications Security, 161-178, 2023
22023
Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
T Nakai, K Iwanari, T Ono, Y Abe, Y Watanabe, M Iwamoto
New Generation Computing, 1-14, 2024
12024
Card-based Secure Sorting Protocols based on the Sorting Networks
K Kato, T Nakai, K Suzuki
2024 11th International Conference on Advanced Informatics: Concept, Theory …, 2024
2024
Search Result Verifiability in Multi-User Dynamic Searchable Symmetric Encryption
M Son, T Nakai, K Suzuki
2024 11th International Conference on Advanced Informatics: Concept, Theory …, 2024
2024
The Two Sheriffs Problem: Cryptographic Formalization and Generalization
K Sugimoto, T Nakai, Y Watanabe, M Iwamoto
International Conference on Combinatorial Optimization and Applications, 512-523, 2023
2023
Threshold ring signature based on isogeny
N Isogai, T Nakai, K Suzuki
IEICE Technical Report; IEICE Tech. Rep. 123 (129), 72-79, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20