Takeshi Nakai

Orcid: 0000-0002-8181-8968

According to our database1, Takeshi Nakai authored at least 13 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Constant-round linear-broadcast secure computation with penalties.
Theor. Comput. Sci., May, 2023

A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Constant-Deposit Multiparty Lotteries on Bitcoin for Arbitrary Number of Players and Winners.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Single-Shuffle Card-Based Protocols with Six Cards per Gate.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Secure Multi-party Computation with Legally-Enforceable Fairness.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

The Two Sheriffs Problem: Cryptographic Formalization and Generalization.
Proceedings of the Combinatorial Optimization and Applications, 2023

2022
How to Make a Secure Index for Searchable Symmetric Encryption, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., December, 2022

Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations.
New Gener. Comput., 2022

Efficient Card-Based Majority Voting Protocols.
New Gener. Comput., 2022

2021
How to Solve Millionaires' Problem with Two Kinds of Cards.
New Gener. Comput., 2021

Secure Computation with Non-Equivalent Penalties in Constant Rounds.
Proceedings of the 3rd International Conference on Blockchain Economics, 2021

2017
Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations.
Proceedings of the Information Theoretic Security - 10th International Conference, 2017

2016
Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016


  Loading...