|
[1] Yoshiki Abe, Takeshi Nakai, Yoshihisa Kuroki, Shinnosuke Suzuki, Yuta Koga, Yohei Watanabe, Mitsugu Iwamoto, and Kazuo Ohta. Efficient Card- Based Majority Voting Protocols. New Generation Computing, 40(1):173–198, 2022. [2] Bert den Boer. More Efficient Match-Making and Satisfiability: The Five Card Trick. In Proceedings of Advances in Cryptology (EUROCRYPT), pages 208–217, 1989. [3] Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shi- nagawa, Yuichi Hayashi, and Takaaki Mizuki. Card-Based Secure Sorting Protocol. In Proceedings of Advances in Information and Computer Security, pages 224–240, 2022. [4] Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. Prac- tical Card-Based Implementations of Yao’s Millionaire Protocol. Theoretical Computer Science (TCS), 803(11):207–221, 2019. [5] Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. Analyzing Execution Time of Card-Based Protocols. In Proceedings of Unconventional Computation and Natural Computation (UCNC), pages 145– 158, 2018. 26 [6] Takaaki Mizuki, Isaac Kobina Asiedu, and Hideaki Sone. Voting with a Log- arithmic Number of Cards. In Proceedings of Unconventional Computation and Natural Computation (UCNC), pages 162–173, 2013. [7] Takaaki Mizuki and Hideaki Sone. Six-Card Secure AND and Four-Card Secure XOR. In Proceedings of Frontiers in Algorithmics (FAW), pages 358– 369, 2009. [8] Takuya Nishida, Takaaki Mizuki, and Hideaki Sone. Securely Computing the Three-Input Majority Function with Eight Cards. In Proceedings of Theory and Practice of Natural Computing, pages 193–204, 2013. [9] Tatsuya Sasaki, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone. Efficient Card-Based Zero-Knowledge Proof for Sudoku. Theoretical Computer Science (TCS), 839(5):135–142, 2020. [10] Kazumasa Shinagawa and Takaaki Mizuki. Secure Computation of Any Boolean Function based on Any Deck of Cards. In Proceedings of Frontiers in Algorithmics (FAW), pages 63–75, 2019. [11] Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shi- nagawa, Takaaki Mizuki, and Hideaki Sone. Card-Based Secure Ranking Computations. In Proceedings of Combinatorial Optimization and Applica- tions (COCOA), pages 461–472, 2019. [12] Itaru Ueda, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. How to Implement a Random Bisection Cut. In Proceedings of Theory and Practice of Natural Computing, pages 58–69, 2016. |