Takaaki Mizuki
- Kazunari Tozawa, Hiraku Morita, and Takaaki Mizuki
Single-shuffle Card-based Protocol with Eight Cards per Gate and Its Extensions
Natural Computing, Springer, vol.24, no.1, pp.131-147, 2025.
[DOI] (Open access)
- Kazumasa Shinagawa, Daiki Miyahara, and Takaaki Mizuki
How to Play Old Maid with Virtual Players
Theory of Computing Systems, Springer, vol.69, 13, 2025.
[DOI] (Open access)
- Yuichi Komano and Takaaki Mizuki
Physical Zero-Knowledge Proof Protocols for Topswops and Botdrops
New Generation Computing, Springer, vol.42, no.3, pp.399-428, 2024.
[DOI] (Open access)
- Daiki Miyahara, L{\'e}o Robert, Pascal Lafourcade, and Takaaki Mizuki
ZKP Protocols for Usowan, Herugolf, and Five Cells
Tsinghua Science and Technology, vol.29, No.6, pp.1651-1666, 2024
[DOI] (Open access)
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
Physical ZKP protocols for Nurimisaki and Kurodoko
Theoretical Computer Science, Elsevier, vol.972, 114071, 2023.
[DOI]
[PDF] (This is an accepted manuscript.)
- Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
Actively Revealing Card Attack on Card-based Protocols
Natural Computing,
Springer, vol.21, no.4, pp.615-628, 2022.
[DOI] (Open access)
- Yuichi Komano and Takaaki Mizuki
Coin-based Secure Computations
International Journal of Information Security,
Springer, vol.21, no.4, pp.833-846, 2022.
[DOI] (Open access)
- Takaaki Mizuki and Yuichi Komano
Information Leakage Due to Operative Errors in Card-based Protocols
Information and Computation, Elsevier, vol.285, 104910, 2022.
[DOI] (Open access)
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, Luc Libralesso, and Takaaki Mizuki
Physical Zero-knowledge Proof and NP-completeness Proof of Suguru Puzzle
Information and Computation, Elsevier, vol.285, 104858, 2022.
[DOI] (Open access)
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake
New Generation Computing,
Springer, vol.40, no.1, pp.149-171, 2022.
[DOI] (Open access)
- Yuta Abe, Takaaki Mizuki, and Hideaki Sone
Committed-format AND Protocol Using Only Random Cuts
Natural Computing,
Springer, vol.20, no.4, pp.639-645, 2021.
[DOI]
[PDF] (This is an Author's Accepted Manuscript (AAM).)
- Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, L{\'e}o Robert, Tatsuya Sasaki, and Hideaki Sone
How to Construct Physical Zero-Knowledge Proofs for Puzzles with a "Single Loop" Condition
Theoretical Computer Science, Elsevier, vol.888, pp.41-55, 2021.
[DOI] (Open access)
- Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Evaluating Card-based Protocols in Terms of Execution Time
International Journal of Information Security,
Springer, vol.20, no.5, pp.729-740, 2021.
[DOI] (Open access)
- Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles
New Generation Computing,
Springer, vol.39, no.1, pp.97-114, 2021.
[DOI] (Open access)
- Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
Card-based Protocols for Secure Ranking Computations
Theoretical Computer Science, Elsevier, vol.845, pp.122-135, 2020.
[DOI] (Open access)
- Tatsuya Sasaki, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
Efficient Card-based Zero-knowledge Proof for Sudoku
Theoretical Computer Science, Elsevier, vol.839, pp.135-142, 2020.
[DOI] (Open access)
- Itaru Ueda, Daiki Miyahara, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Secure Implementations of a Random Bisection Cut
International Journal of Information Security,
Springer, vol.19, no.4, pp.445-452, 2020.
[DOI]
[PDF] (This is an Author's Accepted Manuscript (AAM).)
- Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Practical Card-Based Implementations of Yao's Millionaire Protocol
Theoretical Computer Science, Elsevier, vol.803, pp.207-221, 2020.
[DOI]
[PDF] (This is an accepted manuscript.)
- Daiki Miyahara, Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
Card-based Physical Zero-knowledge Proof for Kakuro
IEICE Trans. Fundamentals, vol.102-A, no.9, pp.1072-1078, 2019.
[DOI]
[TOUR]
[PDF]
Copyright © 2019, IEICE.
- Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Pile-Shifting Scramble for Card-Based Protocols
IEICE Trans. Fundamentals, vol.E101-A, no.9, pp.1494-1502, 2018.
[DOI]
[TOUR]
- Ko Nakamura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Information Leakage Threats for Cryptographic Devices Using IEMI and EM Emission
IEEE Transactions on Electromagnetic Compatibility,vol.60, no.5, pp.1340-1347, 2018.
[DOI]
- Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Card-Based Protocols Using Unequal Division Shuffles
Soft Computing, Springer, vol.22, no.2, pp.361-371, 2018.
[DOI]
[ePrint]
- Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
Card-Based Protocols Using Regular Polygon Cards
IEICE Trans. Fundamentals, vol.E100-A, no.9, pp.1900-1909, 2017.
[DOI]
- [Invited Paper] Takaaki Mizuki and Hiroki Shizuya
Computational Model of Card-Based Cryptographic Protocols and Its Applications
IEICE Trans. Fundamentals, vol.E100-A, no.1, pp.3-11, 2017.
[DOI]
[PDF]
Copyright © 2017, IEICE.
- Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
Secure Computation Protocols Using Polarizing Cards
IEICE Trans. Fundamentals, vol.E99-A, no.6, pp.1122-1131, 2016.
[DOI]
- Takaaki Mizuki
Card-Based Protocols for Securely Computing the Conjunction of Multiple Variables
Theoretical Computer Science, Elsevier, vol.622, pp.34-44, 2016.
[DOI]
[PDF] (This is an accepted manuscript.)
- Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Securely Computing Three-input Functions with Eight Cards
IEICE Trans. Fundamentals, vol.E98-A, no.6, pp.1145-1152, 2015.
[DOI]
- Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Investigation of Noise Interference due to Connector Contact Failure in a Coaxial Cable
IEICE Trans. Electronics,
vol.E97-C, no.9, pp.900-903, 2014.
[DOI]
- Takaaki Mizuki, Daizo Mikami, and Hideaki Sone
Minimizing ESCT Forms for Two-Variable Multiple-Valued Input Binary Output Functions
Discrete Applied Mathematics,
Elsevier, vol.169, pp.186-194, 2014.
[DOI]
[PDF] (This is an Accepted Author Manuscript.)
- Takaaki Mizuki and Hiroki Shizuya
A Formalization of Card-Based Cryptographic Protocols via Abstract Machine
International Journal of Information Security,
Springer-Verlag, vol.13, no.1, pp.15-23, 2014.
[DOI]
[PDF] (The final publication is available at link.springer.com.)
- Masahiro Kinugawa, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard
IEICE Trans. Communications, vol.E96-B, no.10, pp.2633-2638, 2013.
[DOI]
- Kazuya Uehara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Evaluation of Resistance and Inductance of Loose Connector Contact
IEICE Trans. Electronics,
vol.E96-C, no.9, pp.1148-1150, 2013.
[DOI]
- Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Haruki Shimada, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger
Efficient Evaluation of EM Radiation Associated with Information Leakage from Cryptographic Devices
IEEE Transactions on Electromagnetic Compatibility, vol.55, no.3, pp.555-563, 2013.
[DOI]
- Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger
Analysis of Electromagnetic Information Leakage from Cryptographic Devices with Different Physical Structures
IEEE Transactions on Electromagnetic Compatibility, vol.55, no.3, pp.571-580, 2013.
[DOI]
- Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
Transient IEMI Threats for Cryptographic Devices
IEEE Transactions on Electromagnetic Compatibility, vol.55, no.1, pp.140-148, 2013.
[DOI]
- Yoshihiro Indo, Takaaki Mizuki, and Takao Nishizeki
Absolutely Secure Message Transmission Using a Key Sharing Graph
Discrete Mathematics, Algorithms and Applications, World Scientific,
vol.4, no.4, 1250053 (15 pages), 2012.
[DOI]
- Kazuki Matsuda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Mechanism of Increase in Inductance at Loosened Connector Contact Boundary
IEICE Trans. Electronics,
vol.E95-C, no.9, pp.1502-1507, 2012.
[DOI]
- Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takeshi Sugawara, Yoshiki Kayano, Takafumi Aoki, Shigeki Minegishi, Akashi Satoh, Hideaki Sone, and Hiroshi Inoue
Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current
IEICE Trans. Electronics,
vol.95-C, no.6, pp.1089-1097, 2012.
[DOI]
- Yu-ichi Hayashi, Yoshiki Kayano, Takaaki Mizuki, Hideaki Sone, and Hiroshi Inoue
Contact Conditions in Connectors that Cause Common Mode Radiation
IEICE Trans. Electronics,
vol.E94-C, no.9, pp.1369-1374, 2011.
[DOI]
- Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Analysis of Electromagnetic Radiation from Transmission Line with Loose Contact of Connector
IEICE Trans. Electronics,
vol.E94-C, no.9, pp.1427-1430, 2011.
[DOI]
- Takaaki Mizuki, Satoru Nakayama, and Hideaki Sone
An Application of st-Numbering to Secret Key Agreement
International Journal of Foundations of Computer Science, World Scientific,
vol.22, no.5, pp.1211-1227, 2011.
[DOI]
[MR2826231]
- Takaaki Mizuki, Hitoshi Tsubata, and Takao Nishizeki
Minimizing AND-EXOR Expressions for Two-Variable Multiple-Valued Input Binary Output Functions
Journal of Multiple-Valued Logic and Soft Computing, Old City Publishing,
vol.16, pp.197-208, 2010.
- Takaaki Mizuki, Takuya Sato, and Hideaki Sone
A One-Round Secure Message Broadcasting Protocol through a Key Sharing Tree
Information Processing Letters, Elsevier,
vol.109, no.15, pp.842-845, 2009.
[DOI]
- Koichi Koizumi, Takaaki Mizuki, and Takao Nishizeki
A Revised Transformation Protocol
for Unconditionally Secure Secret Key Exchange
Theory of Computing Systems, Springer,
vol.42, no.2, pp.187-221, 2008.
[DOI]
- Takaaki Mizuki, Taro Otagiri, and Hideaki Sone
An Application of ESOP Expressions to Secure Computations
Journal of Circuits, Systems, and Computers, World Scientific,
vol.16, no.2, pp.191-198, 2007.
[DOI]
- Takaaki Mizuki, Fumishige Uchiike, and Hideaki Sone
Securely Computing XOR with 10 Cards
Australasian Journal of Combinatorics, vol.36, pp.279-293, 2006.
[MR2262626]
[PDF]
(Acknowledgement: the file has been supplied by
the Australasian Journal of Combinatorics.)
- Kozo Banno, Shingo Orihara, Takaaki Mizuki, and Takao Nishizeki
Best Security Index for Digital Fingerprinting
IEICE Trans. Fundamentals, vol.E89-A, no.1, pp.169-177, 2006.
- Shingo Orihara, Takaaki Mizuki, and Takao Nishizeki
New Security Index for Digital Fingerprinting and Its Bounds
IEICE Trans. Fundamentals, vol.E86-A, no.5, pp.1156-1163, 2003.
- Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
Characterization of Optimal Key Set Protocols
Discrete Applied Mathematics,
Elsevier, vol.131, no.1, pp.213-236, 2003.
[DOI]
[MR2018210]
- Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
A Complete Characterization of a Family of Key Exchange Protocols
International Journal of Information Security,
Springer-Verlag, vol.1, no.2, pp.131-142, 2002.
[DOI]
- Takaaki Mizuki and Takao Nishizeki
Necessary and Sufficient Numbers of Cards for Sharing Secret Keys
on Hierarchical Groups
IEICE Trans. Inf. & Syst., vol.E85-D, no.2, pp.333-345, 2002.
- Takaaki Mizuki, Zhi-Bo Sui, Hiroki Shizuya,
and Takao Nishizeki
On the Average Length of Secret Key Exchange Eulerian Circuits
IEICE Trans. Fundamentals, vol.E83-A, no.4, pp.662-670, 2000.
- Kodai Tanaka, Shun Sasaki, Kazumasa Shinagawa, and Takaaki Mizuki
Only Two Shuffles Perform Card-Based Zero-Knowledge Proof for Sudoku of Any Size
Symposium on Simplicity in Algorithms (SOSA 2025), SIAM Proceedings Series, pp.94-107, 2025.
[DOI] (Free Access)
- Kazumasa Shinagawa, Daiki Miyahara, and Takaaki Mizuki
How to Play Old Maid with Virtual Players
Frontiers of Algorithmics (IJTCS-FAW 2024),
Lecture Notes in Computer Science, Springer, vol.14752, pp.53-65, 2024.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Yuma Tamura, Akira Suzuki, and Takaaki Mizuki
Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem
Proceedings of the 11th ACM International Workshop on ASIA Public-Key Cryptography (APKC '24), pp.11-22, 2024.
[DOI] (Open access)
- Yoshihiro Takahashi, Kazumasa Shinagawa, Hayato Shikata, and Takaaki Mizuki
Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks
Proceedings of the 11th ACM International Workshop on ASIA Public-Key Cryptography (APKC '24), pp.1-10, 2024.
[DOI] (Open access)
- Yuki Ito, Hayato Shikata, Takuo Suganuma, and Takaaki Mizuki
Card-Based Cryptography Meets 3D Printer
Unconventional Computation and Natural Computation (UCNC 2024),
Lecture Notes in Computer Science, Springer, vol.14776, pp.74-88, 2024.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Takuto Yoshida, Kodai Tanaka, Keisuke Nakabayashi, Eikoh Chida, and Takaaki Mizuki
Upper Bounds on the Number of Shuffles for Two-Helping-Card Multi-input AND Protocols
Cryptology and Network Security (CANS 2023), Lecture Notes in Computer Science, Springer, vol.14342, pp.211-231, 2023.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Kodai Tanaka and Takaaki Mizuki
Two UNO Decks Efficiently Perform Zero-Knowledge Proof for Sudoku
Fundamentals of Computation Theory (FCT 2023), Lecture Notes in Computer Science, Springer, vol.14292, pp.406-420, 2023.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Hayato Shikata, Daiki Miyahara, and Takaaki Mizuki
Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
Proceedings of the 10th ACM International Workshop on ASIA Public-Key Cryptography (APKC '23), pp.33-41, 2023.
[DOI] (Open access)
[PDF]
- Kazunari Tozawa, Hiraku Morita, and Takaaki Mizuki
Single-Shuffle Card-based Protocol with Eight Cards per Gate
Unconventional Computation and Natural Computation (UCNC 2023),
Lecture Notes in Computer Science, Springer, vol.14003, pp.171-185, 2023.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Yuichi Komano and Takaaki Mizuki
Card-Based Zero-Knowledge Proof Protocol for Pancake Sorting
Innovative Security Solutions for Information Technology and Communications (SecITC 2022),
Lecture Notes in Computer Science, Springer, vol.13809, pp.222-239, 2023.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
Hide a liar: Card-Based ZKP Protocol for Usowan
Theory and Applications of Models of Computation (TAMC 2022), Lecture Notes in Computer Science, Springer, vol.13571, pp.201-217, 2023.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Daiki Miyahara and Takaaki Mizuki
Secure Computations through Checking Suits of Playing Cards
Frontiers of Algorithmic Wisdom (FAW 2022), Lecture Notes in Computer Science, Springer, vol.13461, pp.110-128, 2023.
[DOI] (Open access)
- Yuichi Komano and Takaaki Mizuki
Physical Zero-Knowledge Proof Protocol for Topswops
Information Security Practice and Experience (ISPEC 2022),
Lecture Notes in Computer Science, Springer, vol.13620, pp.537-553, 2022.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
Card-Based ZKP Protocol for Nurimisaki
Stabilization, Safety, and Security of Distributed Systems (SSS 2022), Lecture Notes in Computer Science, Springer, vol.13751, pp.285-298, 2022.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Rikuo Haga, Yuichi Hayashi, Daiki Miyahara, and Takaaki Mizuki
Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards
Progress in Cryptology -- AFRICACRYPT 2022, Lecture Notes in Computer Science,
Springer, vol.13503, pp.448-468, 2022.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Hayato Shikata, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
Card-Minimal Protocols for Symmetric Boolean Functions of More than Seven Inputs
Theoretical Aspects of Computing (ICTAC 2022),
Lecture Notes in Computer Science, Springer, vol.13572, pp.388-406, 2022.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yuichi Hayashi, and Takaaki Mizuki
Card-Based Secure Sorting Protocol
Advances in Information and Computer Security (IWSEC 2022),
Lecture Notes in Computer Science, Springer, vol.13504, pp.224-240, 2022.
[DOI]
[PDF] (This is an Accepted Manuscript.)
- Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations
Proceedings of the 9th ACM International Workshop on ASIA Public-Key Cryptography (APKC '22), pp.51-58, 2022.
[DOI]
[PDF]
- Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
Another Use of the Five-Card Trick: Card-Minimal Secure Three-Input Majority Function Evaluation
Progress in Cryptology -- INDOCRYPT 2021,
Lecture Notes in Computer Science, Springer,
vol.13143, pp.536-555, 2021.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-92518-5_24.)
- Daiki Miyahara, Hiromichi Haneda, and Takaaki Mizuki
Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model
Provable and Practical Security (ProvSec 2021),
Lecture Notes in Computer Science, Springer,
vol.13059, pp.136-152, 2021.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-90402-9_8.)
- Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki, Daiki Miyahara, and Takaaki Mizuki
A Card-Minimal Three-Input AND Protocol Using Two Shuffles
Computing and Combinatorics (COCOON 2021),
Lecture Notes in Computer Science, Springer,
vol.13025, pp.668-679, 2021.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-89543-3_55.)
- Raimu Isuzugawa, Daiki Miyahara, and Takaaki Mizuki
Zero-Knowledge Proof Protocol for Cryptarithmetic Using Dihedral Cards
Unconventional Computation and Natural Computation (UCNC 2021),
Lecture Notes in Computer Science, Springer,
vol.12984, pp.51-67, 2021.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-87993-8_4.)
- Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, and Hideaki Sone
Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags
IEEE Computer Security Foundations Symposium (CSF 2021), pp.1-16, 2021.
[DOI]
[PDF]
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori
Beyond the Horizon of Computability (CiE 2021),
Lecture Notes in Computer Science, Springer,
vol.12813, pp.373-384, 2021.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-80049-9_37.)
- Hiroto Koyama, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
A Secure Three-Input AND Protocol with a Standard Deck of Minimal Cards
Computer Science -- Theory and Applications (CSR 2021),
Lecture Notes in Computer Science, Springer,
vol.12730, pp.242-256, 2021.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-79416-3_14.)
- Hiroto Koyama, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
New Card-based Copy Protocols Using Only Random Cuts
Proceedings of the 8th ACM International Workshop on ASIA Public-Key Cryptography (APKC '21), pp.13-22, 2021.
[DOI]
[PDF]
- Soma Murata, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
Efficient Generation of a Card-Based Uniformly Distributed Random Derangement
Algorithms and Computation (WALCOM 2021),
Lecture Notes in Computer Science, Springer,
vol.12635, pp.78-89, 2021.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-68211-8_7.)
- Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
Card-Based Covert Lottery
Innovative Security Solutions for Information Technology and Communications (SecITC 2020),
Lecture Notes in Computer Science, Springer,
vol.12596, pp.257-270, 2021.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-69255-1_17.)
- Takahiro Saito, Daiki Miyahara, Yuta Abe, Takaaki Mizuki, and Hiroki Shizuya
How to Implement a Non-uniform or Non-closed Shuffle
Theory and Practice of Natural Computing (TPNC 2020),
Lecture Notes in Computer Science, Springer,
vol.12494, pp.107-118, 2020.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-63000-3_9.)
- Soma Murata, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
Public-PEZ Cryptography
Information Security (ISC 2020), Lecture Notes in Computer Science, Springer, vol.12472, pp.59-74, 2020.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-62974-8_4.)
- L{\'e}o Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
Physical Zero-Knowledge Proof for Suguru Puzzle
Stabilization, Safety, and Security of Distributed Systems (SSS 2020), Lecture Notes in Computer Science, Springer, vol.12514, pp.235-247, 2020.
[DOI]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-64348-5_19.)
- Kodai Toyoda, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
Six-Card Finite-Runtime XOR Protocol with Only Random Cut
Proceedings of the 7th ACM International Workshop on ASIA Public-Key Cryptography (APKC '20), pp.2-8, 2020.
[DOI]
[PDF]
- Daiki Miyahara, L{\'e}o Robert, Pascal Lafourcade, So Takeshige, Takaaki Mizuki, Kazumasa Shinagawa, Atsuki Nagao, and Hideaki Sone
Card-Based ZKP Protocols for Takuzu and Juosan
Fun with Algorithms (FUN 2021), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,
vol.157, pp.20:1-20:21, 2020.
[DOI]
- Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
Card-Based Secure Ranking Computations
Combinatorial Optimization and Applications (COCOA 2019),
Lecture Notes in Computer Science, Springer,
vol.11949, pp.461-472, 2019.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-36412-0_37.)
- Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
Card-Based Protocol Against Actively Revealing Card Attack
Theory and Practice of Natural Computing (TPNC 2019),
Lecture Notes in Computer Science, Springer,
vol.11934, pp.95-106, 2019.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-34500-6_6.)
- Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation
Information Security Practice and Experience (ISPEC 2019),
Lecture Notes in Computer Science, Springer,
vol.11879, pp.135-151, 2019.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-34339-2_8.)
- Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
Interactive Physical Zero-Knowledge Proof for Norinori
Computing and Combinatorics (COCOON 2019),
Lecture Notes in Computer Science, Springer,
vol.11653, pp.166-177, 2019.
[DOI]
[HAL]
[PDF] (The final authenticated version is available online at http://dx.doi.org/10.1007/978-3-030-26176-4_14.)
- Pascal Lafourcade, Takaaki Mizuki, Atsuki Nagao, and Kazumasa Shinagawa
Light Cryptography
Information Security Education (WISE 2019), IFIP Advances in Information and Communication Technology, Springer,
vol.557, pp.89-101, 2019.
[DOI]
[HAL]
- Kazumasa Shinagawa and Takaaki Mizuki
Secure Computation of Any Boolean Function Based on Any Deck of Cards
Frontiers in Algorithmics (FAW 2019),
Lecture Notes in Computer Science, Springer,
vol.11458, pp.63-75, 2019.
[DOI]
[PDF] (The final authenticated version is available online at https://doi.org/10.1007/978-3-030-18126-0_6.)
- Kazumasa Shinagawa and Takaaki Mizuki
The Six-Card Trick: Secure Computation of Three-Input Equality
Information Security and Cryptology (ICISC 2018),
Lecture Notes in Computer Science, Springer,
vol.11396, pp.123-131, 2019.
[DOI]
- Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol
Combinatorial Optimization and Applications (COCOA 2018),
Lecture Notes in Computer Science, Springer,
vol.11346, pp.246-261, 2018.
[DOI]
- Yuichi Komano and Takaaki Mizuki
Multi-party Computation Based on Physical Coins
Theory and Practice of Natural Computing (TPNC 2018),
Lecture Notes in Computer Science, Springer,
vol.11324, pp.87-98, 2018.
[DOI]
- Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa, and Hideaki Sone
Physical Zero-Knowledge Proof for Makaro
Stabilization, Safety, and Security of Distributed Systems (SSS 2018), Lecture Notes in Computer Science, Springer,
vol.11201, pp.111-125, 2018.
[DOI]
[HAL]
- Takaaki Mizuki and Yuichi Komano
Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols
Combinatorial Algorithms (IWOCA 2018), Lecture Notes in Computer Science, Springer,
vol.10979, pp.250-262, 2018.
[DOI]
- Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Analyzing Execution Time of Card-Based Protocols
Unconventional Computation and Natural Computation (UCNC 2018), Lecture Notes in Computer Science, Springer,
vol.10867, pp.145-158, 2018.
[DOI]
[PDF] (The final publication is
available at Springer via http://dx.doi.org/10.1007/978-3-319-92435-9_11.)
- Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
Card-Based Zero-Knowledge Proof for Sudoku
Fun with Algorithms (FUN 2018), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,
vol.100, pp.29:1-29:10, 2018.
[DOI]
- Kazumasa Shinagawa and Takaaki Mizuki
Card-based Protocols Using Triangle Cards
Fun with Algorithms (FUN 2018), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik,
vol.100, pp.31:1-31:13, 2018.
[DOI]
- Yuta Abe, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Five-Card AND Protocol in Committed Format Using Only Practical Shuffles
Proceedings of the 5th ACM International Workshop on ASIA Public-Key Cryptography (APKC '18), pp.3-8, 2018.
[DOI]
[PDF]
- Tatsuya Sasaki, Bateh Mathias Agbor, Shingo Masuda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Secret Key Amplification from Uniformly Leaked Key Exchange Complete Graph
Algorithms and Computation (WALCOM 2018),
Lecture Notes in Computer Science, Springer,
vol.10755, pp.20-31, 2018.
[DOI]
- Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
The Minimum Number of Cards in Practical Card-Based Protocols
Advances in Cryptology -- ASIACRYPT 2017, Part III,
Lecture Notes in Computer Science, Springer,
vol.10626, pp.126-155, 2017.
[DOI]
[ePrint]
- Danny Francis, Syarifah Ruqayyah Aljunid, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions
Paradigms in Cryptology (Mycrypt 2016),
Lecture Notes in Computer Science, Springer-Verlag,
vol.10311, pp.193-211, 2017.
[DOI]
- Itaru Ueda, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
How to Implement a Random Bisection Cut
Theory and Practice of Natural Computing (TPNC 2016),
Lecture Notes in Computer Science, Springer-Verlag,
vol.10071, pp.58-69, 2016.
[DOI]
[PDF] (The final publication is
available at Springer via http://dx.doi.org/10.1007/978-3-319-49001-4_5.)
- Takaaki Mizuki
Efficient and Secure Multiparty Computations Using a Standard Deck of Playing Cards
Cryptology and Network Security (CANS 2016),
Lecture Notes in Computer Science, Springer-Verlag,
vol.10052, pp.484-499, 2016.
[DOI]
[slide]
[PDF] (The final publication is available at link.springer.com.)
- Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography (APKC '16),
pp.49-55, 2016.
[DOI]
[PDF]
- Akihiro Nishimura, Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Five-Card Secure Computations Using Unequal Division Shuffle
Theory and Practice of Natural Computing (TPNC 2015),
Lecture Notes in Computer Science, Springer-Verlag,
vol.9477, pp.109-120, 2015.
[DOI]
[PDF] (The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-26841-5_9.)
- Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards
International Conference on Provable Security (ProvSec 2015),
Lecture Notes in Computer Science, Springer-Verlag,
vol.9451, pp.127-146, 2015.
[DOI]
- Rie Ishikawa, Eikoh Chida, and Takaaki Mizuki
Efficient Card-based Protocols for Generating a Hidden Random Permutation without Fixed Points
Unconventional Computation and Natural Computation (UCNC 2015),
Lecture Notes in Computer Science, Springer-Verlag,
vol.9252, pp.215-226, 2015.
[DOI]
[PDF] (The final publication is available at link.springer.com.)
- Kazumasa Shinagawa, Takaaki Mizuki, Jacob Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto
Secure Multi-Party Computation Using Polarizing Cards
Advances in Information and Computer Security (IWSEC 2015),
Lecture Notes in Computer Science, Springer-Verlag,
vol.9241, pp.281-297, 2015.
[DOI]
- Ko Nakamura, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
Method for Estimating Fault Injection Time on Cryptographic Devices from EM Leakage
IEEE International Symposium on Electromagnetic Compatibility (EMC 2015),
pp.235-240, 2015.
[DOI]
- Takuya Nishida, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Card-Based Protocols for Any Boolean Function
Theory and Applications of Models of Computation (TAMC 2015),
Lecture Notes in Computer Science, Springer-Verlag,
vol.9076, pp.110-121, 2015.
[DOI]
[slide]
[PDF] (The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-319-17142-5_11.)
- Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
Precisely Timed IEMI Fault Injection Synchronized with EM Information Leakage
IEEE International Symposium on Electromagnetic Compatibility (EMC 2014),
pp.738-742, 2014.
[DOI]
- Takaaki Mizuki and Hiroki Shizuya
Practical Card-Based Cryptography
Fun with Algorithms (FUN 2014),
Lecture Notes in Computer Science, Springer-Verlag,
vol.8496, pp.313-324, 2014.
[DOI]
[slide]
[PDF] (The final publication is available at link.springer.com.)
- Takuya Nishida, Takaaki Mizuki, and Hideaki Sone
Securely Computing the Three-Input Majority Function with Eight Cards
Theory and Practice of Natural Computing (TPNC 2013),
Lecture Notes in Computer Science, Springer-Verlag,
vol.8273, pp.193-204, 2013.
[DOI]
[slide]
[PDF] (The original publication is available at www.springerlink.com.)
- Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
Map-Based Analysis of IEMI Fault Injection into Cryptographic Devices
IEEE International Symposium on Electromagnetic Compatibility (EMC 2013),
pp.829-833, 2013.
[DOI]
- Takaaki Mizuki, Isaac Kobina Asiedu, and Hideaki Sone
Voting with a Logarithmic Number of Cards
Unconventional Computation and Natural Computation (UCNC 2013),
Lecture Notes in Computer Science, Springer-Verlag,
vol.7956, pp.162-173, 2013.
[DOI]
[slide]
- Takaaki Mizuki, Michihito Kumamoto, and Hideaki Sone
The Five-Card Trick Can Be Done with Four Cards
Advances in Cryptology -- ASIACRYPT 2012,
Lecture Notes in Computer Science, Springer-Verlag,
vol.7658, pp.598-606, 2012.
[DOI]
[slide]
[PDF]
Copyright © 2012, IACR.
- Haruki Shimada, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, Laurent Sauvage, and Jean-Luc Danger
Efficient Mapping of EM Radiation Associated with Information Leakage for Cryptographic Devices
IEEE International Symposium on Electromagnetic Compatibility (EMC 2012),
pp.794-799, 2012.
[DOI]
- Yu-ichi Hayashi, Naofumi Homma, Taishi Ikematsu, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Jean-Luc Danger
An Efficient Method for Estimating the Area of Information Propagation through Electromagnetic Radiation
IEEE International Symposium on Electromagnetic Compatibility (EMC 2012),
pp.800-805, 2012.
[DOI]
- Yu-ichi Hayashi, Naofumi Homma, Takeshi Sugawara, Takaaki Mizuki, Takafumi Aoki, and Hideaki Sone
Non-Invasive EMI-Based Fault Injection Attack against Cryptographic Modules
IEEE International Symposium on Electromagnetic Compatibility (EMC 2011),
pp.763-767, 2011.
[DOI]
- Taishi Ikematsu, Yu-ichi Hayashi, Takaaki Mizuki, Naofumi Homma, Takafumi Aoki, and Hideaki Sone
Suppression of Information Leakage from Electronic Devices Based on SNR
IEEE International Symposium on Electromagnetic Compatibility (EMC 2011),
pp.920-924, 2011.
[DOI]
- Yu-ichi Hayashi, Takeshi Sugawara, Yoshiki Kayano, Naofumi Homma, Takaaki Mizuki, Akashi Satoh, Takafumi Aoki, Shigeki Minegishi, Hideaki Sone, and Hiroshi Inoue
Information Leakage from Cryptographic Hardware via Common-Mode Current
IEEE International Symposium on Electromagnetic Compatibility (EMC 2010),
pp.109-114, 2010.
[DOI]
- Yu-ichi Hayashi, Songping Wu, Jun Fan, Takaaki Mizuki, and Hideaki Sone
Modeling Connector Contact Condition Using a Contact Failure Model with Equivalent Inductance
IEEE International Symposium on Electromagnetic Compatibility (EMC 2010),
pp.743-747, 2010.
[DOI]
- Takeshi Sugawara, Yu-ichi Hayashi, Naofumi Homma, Takaaki Mizuki, Takafumi Aoki, Hideaki Sone, and Akashi Satoh
Mechanism behind Information Leakage in Electromagnetic Analysis of Cryptographic Modules
Information Security Applications (WISA 2009),
Lecture Notes in Computer Science, Springer-Verlag,
vol.5932, pp.66-78, 2009.
[DOI]
- Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
Relationship between Connector Contact Points and Common-Mode Current on a Coaxial Transmission Line
IEEE International Symposium on Electromagnetic Compatibility (EMC 2009),
pp.209-212, 2009.
[DOI]
- Takaaki Mizuki and Hideaki Sone
Six-Card Secure AND and Four-Card Secure XOR
Frontiers in Algorithmics (FAW 2009),
Lecture Notes in Computer Science, Springer-Verlag,
vol.5598, pp.358-369, 2009.
[DOI]
- Takaaki Mizuki, Hitoshi Tsubata, and Takao Nishizeki
Minimizing AND-EXOR Expressions for Multiple-Valued Two-Input Logic Functions (Extended Abstract)
Theory and Applications of Models of Computation (TAMC 2009),
Lecture Notes in Computer Science, Springer-Verlag,
vol.5532, pp.301-310, 2009.
[DOI]
- Yu-ichi Hayashi, Yoshiki Kayano, Takaaki Mizuki, Hideaki Sone, and Hiroshi Inoue
On Contact Conditions in Connectors to Cause Common Mode Radiation
IEEE International Symposium on Electromagnetic Compatibility (EMC 2008),
pp.1-4, 2008.
[DOI]
- Takaaki Mizuki, Yoshinori Kugimoto, and Hideaki Sone
Secure Multiparty Computations Using the 15 Puzzle (Extended Abstract)
Combinatorial Optimization and Applications (COCOA 2007),
Lecture Notes in Computer Science, Springer-Verlag,
vol.4616, pp.255-266, 2007.
[DOI]
- Takaaki Mizuki, Yoshinori Kugimoto, and Hideaki Sone
Secure Multiparty Computations Using a Dial Lock (Extended Abstract)
Theory and Applications of Models of Computation (TAMC 2007),
Lecture Notes in Computer Science, Springer-Verlag,
vol.4484, pp.499-510, 2007.
[DOI]
- Takaaki Mizuki, Taro Otagiri, and Hideaki Sone
Secure Computations in a Minimal Model
Using Multiple-Valued ESOP Expressions
Theory and Applications of Models of Computation (TAMC 2006),
Lecture Notes in Computer Science, Springer-Verlag,
vol.3959, pp.547-554, 2006.
[DOI]
- Takaaki Mizuki, Satoshi Nounin, Hideaki Sone, and Yousuke Toyota
Worst-Case Optimal Fingerprinting Codes for Non-Threshold Collusion
Digital Rights Management: Technology, Issues, Challenges and Systems
(DRMTICS 2005),
Lecture Notes in Computer Science, Springer-Verlag,
vol.3919, pp.203-216, 2006.
[DOI]
- Kozo Banno, Shingo Orihara, Takaaki Mizuki, and Takao Nishizeki
Best Security Index for Digital Fingerprinting (Extended Abstract)
Information Hiding Workshop (IH 2005),
Lecture Notes in Computer Science, Springer-Verlag,
vol.3727, pp.398-412, 2005.
[DOI]
- Koichi Koizumi, Takaaki Mizuki, and Takao Nishizeki
Necessary and Sufficient Numbers of Cards
for the Transformation Protocol (Extended Abstract)
Computing and Combinatorics (COCOON 2004),
Lecture Notes in Computer Science, Springer-Verlag,
vol.3106, pp.92-101, 2004.
[DOI]
[MR2162024]
- Takaaki Mizuki and Takao Nishizeki
Necessary and Sufficient Numbers of Cards for Sharing Secret Keys
on Hierarchical Groups (Extended Abstract)
Algorithms and Computation (ISAAC 2001),
Lecture Notes in Computer Science,
Springer-Verlag, vol.2223, pp.196-207, 2001.
[DOI]
- Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
Characterization of Optimal Key Set Protocols (Extended Abstract)
Theoretical Computer Science:
Exploring New Frontiers of Theoretical Informatics (IFIP TCS 2000),
pLecture Notes in Computer Science, Springer-Verlag,
vol.1872, pp.273-285, 2000.
[DOI]
- Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
Dealing Necessary and Sufficient Numbers of Cards
for Sharing a One-Bit Secret Key (Extended Abstract)
Advances in Cryptology -- Eurocrypt '99,
Lecture Notes in Computer Science, Springer-Verlag,
vol.1592, pp.389-401, 1999.
[DOI]
- Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki
Eulerian Secret Key Exchange (Extended Abstract)
Computing and Combinatorics (COCOON '98),
Lecture Notes in Computer Science, Springer-Verlag,
vol.1449, pp.349-360, 1998.
[DOI]