• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Development of Card-based Cryptography

Research Project

Project/Area Number 26330001
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Theory of informatics
Research InstitutionTohoku University

Principal Investigator

Mizuki Takaaki  東北大学, サイバーサイエンスセンター, 准教授 (90323089)

Project Period (FY) 2014-04-01 – 2017-03-31
Project Status Completed (Fiscal Year 2016)
Budget Amount *help
¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2016: ¥1,820,000 (Direct Cost: ¥1,400,000、Indirect Cost: ¥420,000)
Fiscal Year 2015: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2014: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Keywordsカードベース暗号 / 暗号系
Outline of Final Research Achievements

Using a deck of physical cards (like playing cards), card-based cryptography performs cryptographic tasks such as secure multiparty computation. The principal investigator constructed many efficient card-based cryptographic protocols, provided lower bounds on the number of required cards, proposed implementations of shuffles, applied card-based cryptography to education, and so on. Consequently, this research project has contributed to the development of card-based cryptography.

Report

(4 results)
  • 2016 Annual Research Report   Final Research Report ( PDF )
  • 2015 Research-status Report
  • 2014 Research-status Report
  • Research Products

    (22 results)

All 2017 2016 2015 2014

All Journal Article (13 results) (of which Int'l Joint Research: 1 results,  Peer Reviewed: 12 results,  Open Access: 7 results,  Acknowledgement Compliant: 13 results) Presentation (9 results) (of which Int'l Joint Research: 1 results)

  • [Journal Article] Computational Model of Card-Based Cryptographic Protocols and Its Applications2017

    • Author(s)
      Takaaki Mizuki and Hiroki Shizuya
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E100.A Issue: 1 Pages: 3-11

    • DOI

      10.1587/transfun.E100.A.3

    • NAID

      130005180847

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions2017

    • Author(s)
      Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      Mycrypt 2016, Lecture Notes in Computer Science

      Volume: 印刷中

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables2016

    • Author(s)
      Takaaki Mizuki
    • Journal Title

      Theoretical Computer Science

      Volume: 622 Pages: 34-44

    • DOI

      10.1016/j.tcs.2016.01.039

    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Secure Computation Protocols Using Polarizing Cards2016

    • Author(s)
      Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E99.A Issue: 6 Pages: 1122-1131

    • DOI

      10.1587/transfun.E99.A.1122

    • NAID

      130005154234

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards2016

    • Author(s)
      Takaaki Mizuki
    • Journal Title

      CANS 2016, Lecture Notes in Computer Science

      Volume: 10052 Pages: 484-499

    • DOI

      10.1007/978-3-319-48965-0_29

    • ISBN
      9783319489643, 9783319489650
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] How to Implement a Random Bisection Cut2016

    • Author(s)
      Itaru Ueda, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      TPNC 2016, Lecture Notes in Computer Science

      Volume: 10071 Pages: 58-69

    • DOI

      10.1007/978-3-319-49001-4_5

    • ISBN
      9783319490007, 9783319490014
    • Related Report
      2016 Annual Research Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Secure Multi-Party Computations Using a Deck of Cards2016

    • Author(s)
      水木敬明
    • Journal Title

      IEICE ESS Fundamentals Review

      Volume: 9 Issue: 3 Pages: 179-187

    • DOI

      10.1587/essfr.9.3_179

    • NAID

      130005117712

    • ISSN
      1882-0875
    • Related Report
      2015 Research-status Report
    • Acknowledgement Compliant
  • [Journal Article] Securely Computing Three-Input Functions with Eight Cards2015

    • Author(s)
      Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

      Volume: E98.A Issue: 6 Pages: 1145-1152

    • DOI

      10.1587/transfun.E98.A.1145

    • NAID

      130005071832

    • ISSN
      0916-8508, 1745-1337
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Secure Multi-Party Computation Using Polarizing Cards2015

    • Author(s)
      Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    • Journal Title

      IWSEC 2015, Lecture Notes in Computer Science

      Volume: 9241 Pages: 281-297

    • DOI

      10.1007/978-3-319-22425-1_17

    • ISBN
      9783319224244, 9783319224251
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Int'l Joint Research / Acknowledgement Compliant
  • [Journal Article] Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points2015

    • Author(s)
      Rie Ishikawa, Eikoh Chida, and Takaaki Mizuki
    • Journal Title

      UCNC 2015, Lecture Notes in Computer Science

      Volume: 9252 Pages: 215-226

    • DOI

      10.1007/978-3-319-21819-9_16

    • ISBN
      9783319218182, 9783319218199
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards2015

    • Author(s)
      Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
    • Journal Title

      ProvSec 2015, Lecture Notes in Computer Science

      Volume: 9451 Pages: 127-146

    • DOI

      10.1007/978-3-319-26059-4_7

    • ISBN
      9783319260587, 9783319260594
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Acknowledgement Compliant
  • [Journal Article] Five-Card Secure Computations Using Unequal Division Shuffle2015

    • Author(s)
      Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, Hideaki Sone
    • Journal Title

      TPNC 2015, Lecture Notes in Computer Science

      Volume: 9477 Pages: 109-120

    • DOI

      10.1007/978-3-319-26841-5_9

    • ISBN
      9783319268408, 9783319268415
    • Related Report
      2015 Research-status Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Journal Article] Card-Based Protocols for Any Boolean Function2015

    • Author(s)
      Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    • Journal Title

      TAMC 2015, Lecture Notes in Computer Science

      Volume: 9076 Pages: 110-121

    • DOI

      10.1007/978-3-319-17142-5_11

    • ISBN
      9783319171418, 9783319171425
    • Related Report
      2014 Research-status Report
    • Peer Reviewed / Open Access / Acknowledgement Compliant
  • [Presentation] Pile-Shifting Scrambleで実現可能な二状態不均一シャッフルに関する考察2017

    • Author(s)
      西村明紘, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      2017年暗号と情報セキュリティシンポジウム(SCIS2017)
    • Place of Presentation
      ロワジールホテル那覇(沖縄県那覇市)
    • Year and Date
      2017-01-24
    • Related Report
      2016 Annual Research Report
  • [Presentation] カードベース暗号の教育への応用2016

    • Author(s)
      水木敬明
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      福井市地域交流プラザAOSSA(福井県福井市)
    • Year and Date
      2016-11-07
    • Related Report
      2016 Annual Research Report
  • [Presentation] ランダム二等分割カットの安全な実行に関する考察2016

    • Author(s)
      上田格, 西村明紘, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      機械振興会館(東京都港区)
    • Year and Date
      2016-09-02
    • Related Report
      2016 Annual Research Report
  • [Presentation] An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation2016

    • Author(s)
      Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    • Organizer
      3rd ACM International Workshop on ASIA Public-Key Cryptography (AsiaPKC '16)
    • Place of Presentation
      Xi'an International Conference Center, Xi'an, China
    • Year and Date
      2016-05-30
    • Related Report
      2016 Annual Research Report
    • Int'l Joint Research
  • [Presentation] 不均一な確率分布のシャッフル操作の実現に関する一考察2016

    • Author(s)
      西村明紘, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      2016年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      ANAクラウンプラザホテル熊本ニュースカイ(熊本県・熊本市)
    • Year and Date
      2016-01-22
    • Related Report
      2015 Research-status Report
  • [Presentation] 変則的シャッフルを用いたカードベース暗号プロトコル2015

    • Author(s)
      西村明紘, 西田拓也, 林優一, 水木敬明, 曽根秀昭
    • Organizer
      2015年電子情報通信学会ソサイエティ大会
    • Place of Presentation
      東北大学川内北キャンパス(宮城県・仙台市)
    • Year and Date
      2015-09-10
    • Related Report
      2015 Research-status Report
  • [Presentation] 市販トランプカードを用いた安全な計算について2015

    • Author(s)
      水木敬明
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      北九州市立大学
    • Year and Date
      2015-03-03
    • Related Report
      2014 Research-status Report
  • [Presentation] 正多角形カードを用いた秘密計算プロトコル2015

    • Author(s)
      品川和雅, 水木敬明, 縫田光司, 金山直樹, 西出隆志, 岡本栄司
    • Organizer
      2015年暗号と情報セキュリティシンポジウム
    • Place of Presentation
      リーガロイヤルホテル小倉
    • Year and Date
      2015-01-20
    • Related Report
      2014 Research-status Report
  • [Presentation] カード組を用いた不動点のない置換のランダム生成2014

    • Author(s)
      石川理恵, 千田栄幸, 水木敬明
    • Organizer
      電子情報通信学会情報セキュリティ研究会
    • Place of Presentation
      兵庫県立大学
    • Year and Date
      2014-11-21
    • Related Report
      2014 Research-status Report

URL: 

Published: 2014-04-04   Modified: 2018-03-22  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi