品川 和雅(Kazumasa Shinagawa)のホームページ

English

所属


略歴


研究室歴


受賞歴


論文

[dblp] [research map]

論文誌

  1. A single shuffle is enough for secure card-based computation of any Boolean circuit.
    Kazumasa Shinagawa, Koji Nuida
    Discrete Applied Mathematics, Volume 289, Pages 248-261, 31 January 2021.
    [DOI]
  2. Card-based protocols for secure ranking computations.
    Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone
    Theoretical Computer Science, Volume 845, Pages 122-135, 12 December 2020.
    [DOI]
  3. Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
    Yuji Hashimoto, Koji Nuida, Kazumasa Shinagawa, Masaki Inamura, Goichiro Hanaoka
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E101.A, Issue 9, Pages 1503-1511, 2018.
    [DOI]
  4. Secure Grouping Protocol Using a Deck of Cards.
    Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E101.A, Issue 9, Pages 1512-1524, 2018.
    [DOI]
  5. Card-Based Protocols Using Regular Polygon Cards.
    Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E100.A, Issue 9, Pages 1900-1909, 2017.
    [DOI]
  6. Secure Computation Protocols Using Polarizing Cards.
    Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume E99.A, Issue 6, Pages 1122-1131, 2016.
    [DOI]

国際会議

  1. Card-Based ZKP Protocols for Takuzu and Juosan.
    Daiki Miyahara, Léo Robert, Pascal Lafourcade, So Takeshige, Takaaki Mizuki, Kazumasa Shinagawa, Atsuki Nagao, Hideaki Sone
    FUN 2021
  2. Card-Based Secure Ranking Computations.
    Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone
    COCOA 2019
  3. Light Cryptography.
    Pascal Lafourcade, Takaaki Mizuki, Atsuki Nagao, Kazumasa Shinagawa
    World Conference on Information Security Education 2019
  4. Secure Computation of Any Boolean Function Based on Any Deck of Cards.
    Kazumasa Shinagawa, Takaaki Mizuki
    FAW 2019
  5. Card-Based Cryptography with Invisible Ink.
    Kazumasa Shinagawa
    TAMC 2019
  6. The Six-Card Trick: Secure Computation of Three-Input Equality.
    Kazumasa Shinagawa, Takaaki Mizuki
    ICISC 2018
  7. Physical Zero-Knowledge Proof for Makaro.
    Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, Hideaki Sone
    SSS 2018
  8. Card-based Protocols Using Triangle Cards.
    Kazumasa Shinagawa, Takaaki Mizuki
    FUN 2018
  9. Secure Grouping Protocol Using a Deck of Cards.
    Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka
    ICITS 2017 [arXiv]
  10. One-time Programs with Cloud Storage and Its Application to Electronic Money.
    Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide, Eiji Okamoto
    APKC@AsiaCCS 2017
  11. On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
    Jacob C. N. Schuldt, Kazumasa Shinagawa
    AsiaCCS 2017
  12. Size-Hiding Computation for Multiple Parties.
    Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    ASIACRYPT 2016
  13. Committed AND protocol using three cards with more handy shuffle.
    Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    ISITA 2016
  14. Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
    Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    ProvSec 2015
  15. Secure Multi-Party Computation Using Polarizing Cards.
    Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto
    IWSEC 2015

学位論文


Copyright by Kazumasa Shinagawa
Since 07, Jul, 2020.