{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:12:51Z","timestamp":1750306371447,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,30]],"date-time":"2016-05-30T00:00:00Z","timestamp":1464566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Japan Society for the Promotion of Science","award":["26330001"],"award-info":[{"award-number":["26330001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,30]]},"DOI":"10.1145\/2898420.2898425","type":"proceedings-article","created":{"date-parts":[[2016,5,24]],"date-time":"2016-05-24T22:58:31Z","timestamp":1464130711000},"page":"49-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["An Implementation of Non-Uniform Shuffle for Secure Multi-Party Computation"],"prefix":"10.1145","author":[{"given":"Akihiro","family":"Nishimura","sequence":"first","affiliation":[{"name":"Tohoku University, Sendai, Miyagi, Japan"}]},{"given":"Yu-ichi","family":"Hayashi","sequence":"additional","affiliation":[{"name":"Tohoku Gakuin University, Tagajo, Miyagi, Japan"}]},{"given":"Takaaki","family":"Mizuki","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Miyagi, Japan"}]},{"given":"Hideaki","family":"Sone","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai, Miyagi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2016,5,30]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"C.\n      Cr\u00e9peau\n     and \n      J.\n      Kilian\n  . \n  Discreet solitary games\n  . In D. R. Stinson editor advances in Cryptology -- CRYPTO '93 volume \n  773\n   of \n  Lecture Notes in Computer Science pages \n  319\n  --\n  330\n  . \n  Springer Berlin Heidelberg 1994\n  .   C. Cr\u00e9peau and J. Kilian. Discreet solitary games. In D. R. Stinson editor advances in Cryptology -- CRYPTO '93 volume 773 of Lecture Notes in Computer Science pages 319--330. Springer Berlin Heidelberg 1994.","DOI":"10.1007\/3-540-48329-2_27"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1007\/3-540-46885-4_23","volume-title":"J.-J","author":"den Boer B.","year":"1990","unstructured":"B. den Boer . More efficient match-making and satisfiability: the five card trick . In J.-J . Quisquater and J. Vandewalle, editors, Advances in Cryptology -- EUROCRYPT '89, volume 434 of Lecture Notes in Computer Science , pages 208 -- 217 . Springer Berlin Heidelberg , 1990 . B. den Boer. More efficient match-making and satisfiability: the five card trick. In J.-J. Quisquater and J. Vandewalle, editors, Advances in Cryptology -- EUROCRYPT '89, volume 434 of Lecture Notes in Computer Science, pages 208--217. Springer Berlin Heidelberg, 1990."},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1007\/978-3-662-48797-6_32","volume-title":"Advances in Cryptology -- ASIACRYPT","author":"Koch A.","year":"2015","unstructured":"A. Koch , S. Walzer , and K. H\u00e4rtel . Card-based cryptographic protocols using a minimal number of cards . In T. Iwata and J. Cheon, editors, Advances in Cryptology -- ASIACRYPT 2015 , volume 9452 of Lecture Notes in Computer Science , pages 783 -- 807 . Springer Berlin Heidelberg , 2015. A. Koch, S. Walzer, and K. H\u00e4rtel. Card-based cryptographic protocols using a minimal number of cards. In T. Iwata and J. Cheon, editors, Advances in Cryptology -- ASIACRYPT 2015, volume 9452 of Lecture Notes in Computer Science, pages 783--807. Springer Berlin Heidelberg, 2015."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34961-4_36"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0219-4"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02270-8_36"},{"key":"e_1_3_2_1_7_1","first-page":"279","article-title":"Securely computing XOR with 10 cards","volume":"36","author":"Mizuki T.","year":"2006","unstructured":"T. Mizuki , F. Uchiike , and H. Sone . Securely computing XOR with 10 cards . The Australasian Journal of Combinatorics , 36 : 279 -- 293 , 2006 . T. Mizuki, F. Uchiike, and H. Sone. Securely computing XOR with 10 cards. The Australasian Journal of Combinatorics, 36:279--293, 2006.","journal-title":"The Australasian Journal of Combinatorics"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00107-2"},{"key":"e_1_3_2_1_9_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"110","DOI":"10.1007\/978-3-319-17142-5_11","volume-title":"Theory and Applications of Models of Computation","author":"Nishida T.","year":"2015","unstructured":"T. Nishida , Y. Hayashi , T. Mizuki , and H. Sone . Card-based protocols for any boolean function . In R. Jain, S. Jain, and F. Stephan, editors, Theory and Applications of Models of Computation , volume 9076 of Lecture Notes in Computer Science , pages 110 -- 121 . Springer International Publishing , 2015 . T. Nishida, Y. Hayashi, T. Mizuki, and H. Sone. Card-based protocols for any boolean function. In R. Jain, S. Jain, and F. Stephan, editors, Theory and Applications of Models of Computation, volume 9076 of Lecture Notes in Computer Science, pages 110--121. Springer International Publishing, 2015."},{"key":"e_1_3_2_1_10_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/978-3-319-26841-5_9","volume-title":"A.-H","author":"Nishimura A.","year":"2015","unstructured":"A. Nishimura , T. Nishida , Y. Hayashi , T. Mizuki , and H. Sone . Five-card secure computations using unequal division shuffle . In A.-H . Dediu, L. Magdalena, and C. Mart\u00edn-Vide, editors, Theory and Practice of Natural Computing, volume 9477 of Lecture Notes in Computer Science , pages 109 -- 120 . Springer International Publishing , 2015 . A. Nishimura, T. Nishida, Y. Hayashi, T. Mizuki, and H. Sone. Five-card secure computations using unequal division shuffle. In A.-H. Dediu, L. Magdalena, and C. Mart\u00edn-Vide, editors, Theory and Practice of Natural Computing, volume 9477 of Lecture Notes in Computer Science, pages 109--120. Springer International Publishing, 2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26059-4_7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00409-6"}],"event":{"name":"ASIA CCS '16: ACM Asia Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Xi'an China","acronym":"ASIA CCS '16"},"container-title":["Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898420.2898425","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2898420.2898425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:56:30Z","timestamp":1750222590000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2898420.2898425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,30]]},"references-count":12,"alternative-id":["10.1145\/2898420.2898425","10.1145\/2898420"],"URL":"https:\/\/doi.org\/10.1145\/2898420.2898425","relation":{},"subject":[],"published":{"date-parts":[[2016,5,30]]},"assertion":[{"value":"2016-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}