• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to project page

2013 Fiscal Year Final Research Report

Applications of Tensor Decompositions to Secure Multiparty Computations

Research Project

  • PDF
Project/Area Number 23700007
Research Category

Grant-in-Aid for Young Scientists (B)

Allocation TypeMulti-year Fund
Research Field Fundamental theory of informatics
Research InstitutionTohoku University

Principal Investigator

MIZUKI Takaaki  東北大学, サイバーサイエンスセンター, 准教授 (90323089)

Project Period (FY) 2011 – 2013
Keywordsアルゴリズム理論
Research Abstract

Assume that there are players holding private inputs, and that they want to learn the output of a desired function without revealing their inputs: this is called a secure multiparty computation. It is known that tensor decompositions such as XOR expansions can be utilized for secure multiparty computations. One of the main results was to improve the efficiency of secure multiparty computations by using such XOR expansions and other representations.

  • Research Products

    (12 results)

All 2014 2013 2012

All Journal Article (7 results) (of which Peer Reviewed: 7 results) Presentation (5 results) (of which Invited: 2 results)

  • [Journal Article] Practical Card-based Cryptography, Fun with Algorithms 20142014

    • Author(s)
      Takaaki Mizuki and Hiroki Shizuya
    • Journal Title

      Lecture Notes in Computer Scienc, Springer-Verlag

      Volume: vol.8496 (掲載決定) Pages: 318-329

    • Peer Reviewed
  • [Journal Article] Minimizing ESCT Forms for Two-Variable Multiple-Valued Input Binary Output Functions2014

    • Author(s)
      Takaaki Mizuki, Daizo Mikami, and Hideaki Sone
    • Journal Title

      Discrete Applied Mathematics

      Volume: vol.169 Pages: 186-194

    • DOI

      10.1016/j.dam.2013.12.023

    • Peer Reviewed
  • [Journal Article] A Formalization of Card-Based Cryptographic Protocols via Abstract Machine2014

    • Author(s)
      Takaaki Mizuki and Hiroki Shizuya
    • Journal Title

      International Journal of Information Security

      Volume: vol.13 Pages: 15-23

    • DOI

      10.1007/s10207-013-0219-4

    • Peer Reviewed
  • [Journal Article] Securely Computing the Three-Input Majority Function with Eight Cards, Theory and Practice of Natural Computing 20132013

    • Author(s)
      Takuya Nishida, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: vol.8273 Pages: 193-204

    • DOI

      10.1007/978-3-642-45008-2_16

    • Peer Reviewed
  • [Journal Article] Voting with a Logarithmic Number of Cards, Unconventional Computation and Natural Computation 20132013

    • Author(s)
      Takaaki Mizuki, Isaac Kobina Asiedu, and Hideaki Sone
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: vol.7956 Pages: 162-173

    • DOI

      10.1007/978-3-642-39074-6_16

    • Peer Reviewed
  • [Journal Article] The Five-Card Trick Can Be Done with Four Cards, Advances in Cryptology -- ASIACRYPT 20122012

    • Author(s)
      Takaaki Mizuki, Michihito Kumamoto, and Hideaki Sone
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag

      Volume: vol.7658 Pages: 598-606

    • DOI

      10.1007/978-3-642-34961-4_36

    • Peer Reviewed
  • [Journal Article] Absolutely Secure Message Transmission Using a Key Sharing Graph, Discrete Mathematics2012

    • Author(s)
      Yoshihiro Indo, Takaaki Mizuki, and Takao Nishizeki
    • Journal Title

      Algorithms and Applications

      Volume: vol.4 Pages: 1250053 (15)

    • DOI

      10.1142/S179383091250053X

    • Peer Reviewed
  • [Presentation] カード組を用いた秘匿計算プロトコルについて2014

    • Author(s)
      水木敬明
    • Organizer
      第7回公開鍵暗号の安全な構成とその応用ワークショップ
    • Place of Presentation
      産業技術総合研究所臨海副都心センター別館
    • Year and Date
      2014-03-20
    • Invited
  • [Presentation] カードベース暗号プロトコルに対する攻撃に関する考察2013

    • Author(s)
      水木敬明, 静谷啓樹
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      東北大学
    • Year and Date
      2013-11-28
  • [Presentation] カードを用いた安全な三入力多数決の計算について2013

    • Author(s)
      西田拓也, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      コンピュータセキュリティシンポジウム2013
    • Place of Presentation
      かがわ国際会議場・サンポートホール高松
    • Year and Date
      2013-10-22
  • [Presentation] The Five-Card Trick Can Be Done with Four Cards(ASIACRYPT 2012より)2013

    • Author(s)
      水木敬明
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館
    • Year and Date
      2013-05-23
    • Invited
  • [Presentation] 部分的漏えい鍵共有グラフにおける鍵選択に関する一考察2012

    • Author(s)
      松田重裕, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      2012年電子情報通信学会総合大会
    • Place of Presentation
      岡山大学
    • Year and Date
      2012-03-20

URL: 

Published: 2015-06-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi