Skip to main content

Showing 1–6 of 6 results for author: Shinagawa, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.02831  [pdf, ps, other

    math.GR cs.CR

    Uniform Cyclic Group Factorizations of Finite Groups

    Authors: Kazuki Kanai, Kengo Miyamoto, Koji Nuida, Kazumasa Shinagawa

    Abstract: In this paper, we introduce a kind of decomposition of a finite group called a uniform group factorization, as a generalization of exact factorizations of a finite group. A group $G$ is said to admit a uniform group factorization if there exist subgroups $H_1, H_2, \ldots, H_k$ such that $G = H_1 H_2 \cdots H_k$ and the number of ways to represent any element $g \in G$ as $g = h_1 h_2 \cdots h_k$… ▽ More

    Submitted 15 November, 2023; v1 submitted 6 February, 2023; originally announced February 2023.

    Comments: 10 pages. To appear in Communications in Algebra

    MSC Class: 20D06; 20D08; 20D10; 20D20; 20D40; 94A60

  2. Private Simultaneous Messages Based on Quadratic Residues

    Authors: Kazumasa Shinagawa, Reo Eriguchi, Shohei Satake, Koji Nuida

    Abstract: Private Simultaneous Messages (PSM) model is a minimal model for secure multiparty computation. Feige, Kilian, and Naor (STOC 1994) and Ishai (Cryptology and Information Security Series 2013) constructed PSM protocols based on quadratic residues. In this paper, we define QR-PSM protocols as a generalization of these protocols. A QR-PSM protocol is a PSM protocol whose decoding function outputs the… ▽ More

    Submitted 13 September, 2022; v1 submitted 5 September, 2022; originally announced September 2022.

    MSC Class: 94A60; 11T71; 14G50; 05C90

    Journal ref: Designs, Codes and Cryptography (2023)

  3. arXiv:2206.06010  [pdf, other

    cs.CR

    Constant-Round Linear-Broadcast Secure Computation with Penalties

    Authors: Takeshi Nakai, Kazumasa Shinagawa

    Abstract: It is known that Bitcoin enables achieving fairness in secure computation by imposing monetary penalties on adversarial parties. This functionality is called secure computation with penalties. Bentov and Kumaresan (Crypto 2014) introduced the claim-or-refund functionality that can be implemented via Bitcoin. They achieved secure computation with penalties with $O(n)$ rounds and $O(n)$ broadcasts f… ▽ More

    Submitted 24 June, 2022; v1 submitted 13 June, 2022; originally announced June 2022.

    Comments: 32 pages

  4. Automorphism Shuffles for Graphs and Hypergraphs and Its Applications

    Authors: Kazumasa Shinagawa, Kengo Miyamoto

    Abstract: In card-based cryptography, a deck of physical cards is used to achieve secure computation. A shuffle, which randomly permutes a card-sequence along with some probability distribution, ensures the security of a card-based protocol. The authors proposed a new class of shuffles called graph shuffles, which randomly permutes a card-sequence by an automorphism of a directed graph (New Generation Compu… ▽ More

    Submitted 2 June, 2022; v1 submitted 10 May, 2022; originally announced May 2022.

    Comments: 12 pages

    MSC Class: 94A60; 05C20; 05C65

  5. arXiv:2109.00397  [pdf, ps, other

    cs.CR math.CO

    Graph Automorphism Shuffles from Pile-Scramble Shuffles

    Authors: Kengo Miyamoto, Kazumasa Shinagawa

    Abstract: A pile-scramble shuffle is one of the most effective shuffles in card-based cryptography. Indeed, many card-based protocols are constructed from pile-scramble shuffles. This article aims to study the power of pile-scramble shuffles. In particular, for any directed graph $G$, we introduce a new protocol called "a graph shuffle protocol for $G$", and show that it can be implemented by using pile-scr… ▽ More

    Submitted 16 December, 2021; v1 submitted 1 September, 2021; originally announced September 2021.

    Comments: 16 pages. We have corrected some typos and added Subsections 1.3, 3.6, Section 5, and proofs of correctness and security of protocols in Subsections 4.1. 4.2

    MSC Class: 94A60; 05C20

  6. Secure Grou** Protocol Using a Deck of Cards

    Authors: Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka

    Abstract: We consider a problem, which we call secure grou**, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined constraints, such as the number of parties in each group). In this paper, we constr… ▽ More

    Submitted 22 September, 2017; originally announced September 2017.

    MSC Class: 94A60