• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Applications of Tensor Decompositions to Secure Multiparty Computations

Research Project

Project/Area Number 23700007
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Fundamental theory of informatics
Research InstitutionTohoku University

Principal Investigator

MIZUKI Takaaki  東北大学, サイバーサイエンスセンター, 准教授 (90323089)

Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥4,160,000 (Direct Cost: ¥3,200,000、Indirect Cost: ¥960,000)
Fiscal Year 2013: ¥1,560,000 (Direct Cost: ¥1,200,000、Indirect Cost: ¥360,000)
Fiscal Year 2012: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2011: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Keywordsアルゴリズム理論 / アルゴリズム / 暗号・認証等 / ネットワーク
Research Abstract

Assume that there are players holding private inputs, and that they want to learn the output of a desired function without revealing their inputs: this is called a secure multiparty computation. It is known that tensor decompositions such as XOR expansions can be utilized for secure multiparty computations. One of the main results was to improve the efficiency of secure multiparty computations by using such XOR expansions and other representations.

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (15 results)

All 2014 2013 2012 Other

All Journal Article (8 results) (of which Peer Reviewed: 8 results) Presentation (7 results) (of which Invited: 3 results)

  • [Journal Article] Practical Card-based Cryptography, Fun with Algorithms 20142014

    • Author(s)
      Takaaki Mizuki and Hiroki Shizuya
    • Journal Title

      Lecture Notes in Computer Scienc, Springer-Verlag

      Volume: vol.8496 (掲載決定) Pages: 318-329

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Minimizing ESCT Forms for Two-Variable Multiple-Valued Input Binary Output Functions2014

    • Author(s)
      Takaaki Mizuki, Daizo Mikami, and Hideaki Sone
    • Journal Title

      Discrete Applied Mathematics

      Volume: vol.169 Pages: 186-194

    • DOI

      10.1016/j.dam.2013.12.023

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] A Formalization of Card-Based Cryptographic Protocols via Abstract Machine2014

    • Author(s)
      Takaaki Mizuki and Hiroki Shizuya
    • Journal Title

      International Journal of Information Security

      Volume: vol.13 Issue: 1 Pages: 15-23

    • DOI

      10.1007/s10207-013-0219-4

    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Practical Card-based Cryptography2014

    • Author(s)
      Takaaki Mizuki and Hiroki Shizuya
    • Journal Title

      FUN 2014, Lecture Notes in Computer Science

      Volume: 8496

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Securely Computing the Three-Input Majority Function with Eight Cards2013

    • Author(s)
      Takuya Nishida, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      TPNC 2013, Lecture Notes in Computer Science

      Volume: 8273 Pages: 193-204

    • DOI

      10.1007/978-3-642-45008-2_16

    • ISBN
      9783642450075, 9783642450082
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Voting with a Logarithmic Number of Cards2013

    • Author(s)
      Takaaki Mizuki, Isaac Kobina Asiedu, and Hideaki Sone
    • Journal Title

      UCNC 2013, Lecture Notes in Computer Science

      Volume: 7956 Pages: 162-173

    • DOI

      10.1007/978-3-642-39074-6_16

    • ISBN
      9783642390739, 9783642390746
    • Related Report
      2013 Annual Research Report 2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] The Five-Card Trick Can Be Done with Four Cards2012

    • Author(s)
      Takaaki Mizuki, Michihito Kumamoto, and Hideaki Sone
    • Journal Title

      ASIACRYPT 2012, Lecture Notes in Computer Science

      Volume: 7658 Pages: 598-606

    • DOI

      10.1007/978-3-642-34961-4_36

    • ISBN
      9783642349607, 9783642349614
    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Absolutely secure messsage transmission using a key sharing graph2012

    • Author(s)
      T. Nishizeki, Y. Indo
    • Journal Title

      Discrete Math., Algorithms and Appl.

      Volume: 4 Issue: 04 Pages: 1250053-1250053

    • DOI

      10.1142/s179383091250053x

    • Related Report
      2013 Final Research Report 2012 Research-status Report
    • Peer Reviewed
  • [Presentation] カード組を用いた秘匿計算プロトコルについて2014

    • Author(s)
      水木敬明
    • Organizer
      第7回公開鍵暗号の安全な構成とその応用ワークショップ
    • Place of Presentation
      産業技術総合研究所臨海副都心センター別館
    • Year and Date
      2014-03-20
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
    • Invited
  • [Presentation] カードベース暗号プロトコルに対する攻撃に関する考察2013

    • Author(s)
      水木敬明, 静谷啓樹
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      東北大学
    • Year and Date
      2013-11-28
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
  • [Presentation] カードを用いた安全な三入力多数決の計算について2013

    • Author(s)
      西田拓也, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      コンピュータセキュリティシンポジウム2013
    • Place of Presentation
      かがわ国際会議場・サンポートホール高松
    • Year and Date
      2013-10-22
    • Related Report
      2013 Annual Research Report 2013 Final Research Report
  • [Presentation] The Five-Card Trick Can Be Done with Four Cards(ASIACRYPT 2012より)2013

    • Author(s)
      水木敬明
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館
    • Year and Date
      2013-05-23
    • Related Report
      2013 Final Research Report
    • Invited
  • [Presentation] 部分的漏えい鍵共有グラフにおける鍵選択に関する一考察2012

    • Author(s)
      松田重裕, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      2012年電子情報通信学会総合大会
    • Place of Presentation
      岡山大学
    • Year and Date
      2012-03-20
    • Related Report
      2013 Final Research Report
  • [Presentation] 部分的漏えい鍵共有グラフにおける鍵選択に関する一考察2012

    • Author(s)
      松田重裕, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      2012年電子情報通信学会総合大会
    • Place of Presentation
      岡山大学(岡山市)
    • Related Report
      2011 Research-status Report
  • [Presentation] The Five-Card Trick Can Be Done with Four Cards (ASIACRYPT 2012より)

    • Author(s)
      水木敬明
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館
    • Related Report
      2013 Annual Research Report
    • Invited

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi