IEICE Technical Committee Submission System
Conference Paper's Information
Online Proceedings
[Sign in]
... (for ESS/CS/ES/ISS)
Tech. Rep. Archives
... (for ES/CS)
 Go Top Page Go Previous   [Japanese] / [English] 

Paper Abstract and Keywords
Presentation 2016-09-02 09:45
A Note on Secure Execution of Random Bisection Cut
Itaru Ueda, Akihiro Nishimura (Tohoku Univ.), Yu-ichi Hayashi (Tohoku Gakuin Univ.), Takaaki Mizuki, Hideaki Sone (Tohoku Univ.)
Abstract (in Japanese) (See Japanese page) 
(in English) Using a deck of cards, we can realize a secure computation. Especially, since a random bisection cut was devised in 2009, many effective protocols have been designed. The cut works as follows. A deck of cards is bisected and the two parts of the deck are swapped randomly. Therefore, the cut results in two cases, depending on whether the two parts of the deck are swapped or not. As we have only two states when we execute the cut, it has been indicated that it could sometimes leak information on the result of the shuffle visually. Thus, in this paper, we propose some methods to realize the random bisection cut without leaking such information.
Keyword (in Japanese) (See Japanese page) 
(in English) Card-Based Cryptography / Secure Multi-Party Computation / Deck of Cards / Card Games / / / /  
Reference Info. IEICE Tech. Rep., vol. 116, no. 207, ISEC2016-38, pp. 1-7, Sept. 2016.
Paper # ISEC2016-38 
Date of Issue 2016-08-26 (ISEC) 
ISSN Print edition: ISSN 0913-5685  Online edition: ISSN 2432-6380

Conference Information
Committee ISEC  
Conference Date 2016-09-02 - 2016-09-02 
Place (in Japanese) (See Japanese page) 
Place (in English) Kikai-Shinko-Kaikan Bldg. 
Topics (in Japanese) (See Japanese page) 
Topics (in English)  
Paper Information
Registration To ISEC 
Conference Code 2016-09-ISEC 
Language Japanese 
Title (in Japanese) (See Japanese page) 
Sub Title (in Japanese) (See Japanese page) 
Title (in English) A Note on Secure Execution of Random Bisection Cut 
Sub Title (in English)  
Keyword(1) Card-Based Cryptography  
Keyword(2) Secure Multi-Party Computation  
Keyword(3) Deck of Cards  
Keyword(4) Card Games  
1st Author's Name Itaru Ueda  
1st Author's Affiliation Tohoku University (Tohoku Univ.)
2nd Author's Name Akihiro Nishimura  
2nd Author's Affiliation Tohoku University (Tohoku Univ.)
3rd Author's Name Yu-ichi Hayashi  
3rd Author's Affiliation Tohoku Gakuin University (Tohoku Gakuin Univ.)
4th Author's Name Takaaki Mizuki  
4th Author's Affiliation Tohoku University (Tohoku Univ.)
5th Author's Name Hideaki Sone  
5th Author's Affiliation Tohoku University (Tohoku Univ.)
6th Author's Name  
6th Author's Affiliation ()
7th Author's Name  
7th Author's Affiliation ()
8th Author's Name  
8th Author's Affiliation ()
9th Author's Name  
9th Author's Affiliation ()
10th Author's Name  
10th Author's Affiliation ()
11th Author's Name  
11th Author's Affiliation ()
12th Author's Name  
12th Author's Affiliation ()
13th Author's Name  
13th Author's Affiliation ()
14th Author's Name  
14th Author's Affiliation ()
15th Author's Name  
15th Author's Affiliation ()
16th Author's Name  
16th Author's Affiliation ()
17th Author's Name  
17th Author's Affiliation ()
18th Author's Name  
18th Author's Affiliation ()
19th Author's Name  
19th Author's Affiliation ()
20th Author's Name  
20th Author's Affiliation ()
Date Time 2016-09-02 09:45:00 
Presentation Time 25 
Registration for ISEC 
Paper # IEICE-ISEC2016-38 
Volume (vol) IEICE-116 
Number (no) no.207 
Page pp.1-7 
#Pages IEICE-7 
Date of Issue IEICE-ISEC-2016-08-26 

[Return to Top Page]

[Return to IEICE Web Page]

The Institute of Electronics, Information and Communication Engineers (IEICE), Japan