Kazumasa Shinagawa

Orcid: 0000-0002-5219-1975

According to our database1, Kazumasa Shinagawa authored at least 58 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Impossibility Results of Card-Based Protocols via Mathematical Optimization.
CoRR, September, 2025

A Note on Single-Cut Full-Open Protocols.
CoRR, July, 2025

Correction to: How to Play Old Maid with Virtual Players.
Theory Comput. Syst., March, 2025

Simulating Virtual Players for UNO without Computers.
CoRR, February, 2025

Visualizing differentially private mechanisms with physical cards.
Theor. Comput. Sci., 2025

Card-Based Protocols Imply PSM Protocols.
Proceedings of the 42nd International Symposium on Theoretical Aspects of Computer Science, 2025

Only Two Shuffles Perform Card-Based Zero-Knowledge Proof for Sudoku of Any Size.
Proceedings of the 2025 Symposium on Simplicity in Algorithms, 2025

Cyclic Equalizability of Words and Its Application to Card-Based Cryptography.
Proceedings of the Fundamentals of Computation Theory - 25th International Symposium, 2025

Efficient Multiparty Private Simultaneous Messages for Symmetric Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Formal Verification and Proof of Impossibility for Four-Card XOR Protocols Using Only Random Cuts.
Proceedings of the 12th ACM ASIA Public-Key Cryptography Workshop, 2025

2024
Extended Addition Protocol and Efficient Voting Protocols Using Regular Polygon Cards.
New Gener. Comput., September, 2024

Physical Zero-Knowledge Proof for Sukoro.
New Gener. Comput., September, 2024

Card-Based Protocols for Private Set Intersection and Union.
New Gener. Comput., September, 2024

Coin-Based Cryptographic Protocols without Hand Operations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening.
Proceedings of the Advances in Information and Computer Security, 2024

Card-Based Protocols with Single-Card Encoding.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2024, 2024

How to Covertly and Uniformly Scramble the 15 Puzzle and Rubik's Cube.
Proceedings of the 12th International Conference on Fun with Algorithms, 2024

Card-Based Cryptography Meets Differential Privacy.
Proceedings of the 12th International Conference on Fun with Algorithms, 2024

How to Play Old Maid with Virtual Players.
Proceedings of the Frontiers of Algorithmics - 18th International Joint Conference, 2024

Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks.
Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop, 2024

Size-Hiding Computation in the Honest-But-Curious Model.
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024

2023
Private simultaneous messages based on quadratic residues.
Des. Codes Cryptogr., December, 2023

Constant-round linear-broadcast secure computation with penalties.
Theor. Comput. Sci., May, 2023

Automorphism Shuffles for Graphs and Hypergraphs and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Uniform Cyclic Group Factorizations of Finite Groups.
CoRR, 2023

Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations.
Proceedings of the Information Security Practice and Experience, 2023

Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

Single-Shuffle Card-Based Protocols with Six Cards per Gate.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Secure Multi-party Computation with Legally-Enforceable Fairness.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Free-XOR in Card-Based Garbled Circuits.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2022
Graph Automorphism Shuffles from Pile-Scramble Shuffles.
New Gener. Comput., 2022

Single-shuffle Full-open Card-based Protocols Imply Private Simultaneous Messages Protocols.
IACR Cryptol. ePrint Arch., 2022

Card-Based Secure Sorting Protocol.
Proceedings of the Advances in Information and Computer Security, 2022

Card-based Cryptographic Protocols for Private Set Intersection.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022

2021
Card-based Cryptography with Dihedral Symmetry.
New Gener. Comput., 2021

A single shuffle is enough for secure card-based computation of any Boolean circuit.
Discret. Appl. Math., 2021

Secure Computation with Non-Equivalent Penalties in Constant Rounds.
Proceedings of the 3rd International Conference on Blockchain Economics, 2021

Card-Based ZKP Protocols for Takuzu and Juosan.
Proceedings of the 10th International Conference on Fun with Algorithms, 2021

2020
Card-based protocols for secure ranking computations.
Theor. Comput. Sci., 2020

Card-Based Covert Lottery.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2020

2019
A Single Shuffle Is Enough for Secure Card-Based Computation of Any Circuit.
IACR Cryptol. ePrint Arch., 2019

Card-Based Cryptography with Invisible Ink.
Proceedings of the Theory and Applications of Models of Computation, 2019

Light Cryptography.
Proceedings of the Information Security Education. Education in Proactive Information Security, 2019

Secure Computation of Any Boolean Function Based on Any Deck of Cards.
Proceedings of the Frontiers in Algorithmics - 13th International Workshop, 2019

Card-Based Secure Ranking Computations.
Proceedings of the Combinatorial Optimization and Applications, 2019

2018
Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Physical Zero-Knowledge Proof for Makaro.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2018

The Six-Card Trick: Secure Computation of Three-Input Equality.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Card-based Protocols Using Triangle Cards.
Proceedings of the 9th International Conference on Fun with Algorithms, 2018

2017
Card-Based Protocols Using Regular Polygon Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Secure Grouping Protocol Using a Deck of Cards.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

On the Robustness of RSA-OAEP Encryption and RSA-PSS Signatures Against (Malicious) Randomness Failures.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

One-time Programs with Cloud Storage and Its Application to Electronic Money.
Proceedings of the 4th ACM International Workshop on ASIA Public-Key Cryptography, 2017

2016
Secure Computation Protocols Using Polarizing Cards.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Committed AND protocol using three cards with more handy shuffle.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Size-Hiding Computation for Multiple Parties.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Proceedings of the Provable Security, 2015

Secure Multi-Party Computation Using Polarizing Cards.
Proceedings of the Advances in Information and Computer Security, 2015


  Loading...