{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T02:36:18Z","timestamp":1769913378742,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,23]],"date-time":"2018-05-23T00:00:00Z","timestamp":1527033600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JP17K00001"],"award-info":[{"award-number":["JP17K00001"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,23]]},"DOI":"10.1145\/3197507.3197510","type":"proceedings-article","created":{"date-parts":[[2018,5,25]],"date-time":"2018-05-25T12:39:28Z","timestamp":1527251968000},"page":"3-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Five-Card AND Protocol in Committed Format Using Only Practical Shuffles"],"prefix":"10.1145","author":[{"given":"Yuta","family":"Abe","sequence":"first","affiliation":[{"name":"Tohoku University, Sendai-shi, Japan"}]},{"given":"Yu-ichi","family":"Hayashi","sequence":"additional","affiliation":[{"name":"Nara Institute of Science and Technology, Nara-shi, Japan"}]},{"given":"Takaaki","family":"Mizuki","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai-shi, Japan"}]},{"given":"Hideaki","family":"Sone","sequence":"additional","affiliation":[{"name":"Tohoku University, Sendai-shi, Japan"}]}],"member":"320","published-online":{"date-parts":[[2018,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Discreet Solitary Games. In Advances in Cryptology - CRYPTO '93","volume":"773","author":"Cr\u00e9peau Claude","year":"1994","unstructured":"Claude Cr\u00e9peau and Joe Kilian . 1994 . Discreet Solitary Games. In Advances in Cryptology - CRYPTO '93 , Douglas R. Stinson (Ed.). Lecture Notes in Computer Science , Vol. 773 . Springer Berlin Heidelberg, 319--330. Claude Cr\u00e9peau and Joe Kilian. 1994. Discreet Solitary Games. In Advances in Cryptology - CRYPTO '93, Douglas R. Stinson (Ed.). Lecture Notes in Computer Science, Vol. 773. Springer Berlin Heidelberg, 319--330."},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology - EUROCRYPT '89, JeanJacques Quisquater and Joos Vandewalle (Eds.)","author":"den Boer Bert","unstructured":"Bert den Boer . 1990. More Efficient Match-Making and Satisfiability: the Five Card Trick . In Advances in Cryptology - EUROCRYPT '89, JeanJacques Quisquater and Joos Vandewalle (Eds.) . Lecture Notes in Computer Science , Vol. 434 . Springer Berlin Heidelberg , 208--217. Bert den Boer. 1990. More Efficient Match-Making and Satisfiability: the Five Card Trick. In Advances in Cryptology - EUROCRYPT '89, JeanJacques Quisquater and Joos Vandewalle (Eds.). Lecture Notes in Computer Science, Vol. 434. Springer Berlin Heidelberg, 208--217."},{"key":"e_1_3_2_1_3_1","volume-title":"Advances in Cryptology - ASIACRYPT","author":"Kastner Julia","year":"2017","unstructured":"Julia Kastner , Alexander Koch , Stefan Walzer , Daiki Miyahara , Yu-ichi Hayashi, Takaaki Mizuki , and Hideaki Sone . 2017. The Minimum Number of Cards in Practical Card-based Protocols . In Advances in Cryptology - ASIACRYPT 2017 , Tsuyoshi Takagi and Thomas Peyrin (Eds.). Lecture Notes in Computer Science, Vol. 10626 . Springer , Cham, 126--155. Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. 2017. The Minimum Number of Cards in Practical Card-based Protocols. In Advances in Cryptology - ASIACRYPT 2017, Tsuyoshi Takagi and Thomas Peyrin (Eds.). Lecture Notes in Computer Science, Vol. 10626. Springer, Cham, 126--155."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48797-6_32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-013-0219-4"},{"key":"e_1_3_2_1_8_1","volume-title":"IEICE TRANSACTIONS on Fundamentals of Electronics, Communicat ions and Computer Sciences.","author":"Mizuki Takaaki","unstructured":"Takaaki Mizuki and Hiroki Shizuya . 2017. Computational Model of Card-Based Cryptographic Protocols and Its Applications . In IEICE TRANSACTIONS on Fundamentals of Electronics, Communicat ions and Computer Sciences. Vol. E100-A. The Institute of Electronics, Information and Communication Engineers, 3-- 11 . Takaaki Mizuki and Hiroki Shizuya. 2017. Computational Model of Card-Based Cryptographic Protocols and Its Applications. In IEICE TRANSACTIONS on Fundamentals of Electronics, Communicat ions and Computer Sciences. Vol. E100-A. The Institute of Electronics, Information and Communication Engineers, 3--11."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02270-8_36"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72089-0_9"},{"key":"e_1_3_2_1_11_1","volume-title":"CANS","volume":"10052","author":"Nakai Takeshi","year":"2016","unstructured":"Takeshi Nakai , Yuuki Tokushige , Yuto Misawa , Mitsugu Iwamoto , and Kazuo Ohta . 2016 . Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. In Cryptology and Network Security , CANS 2016, Sara Foresti and Giuseppe Persiano (Eds.). Lecture Notes in Computer Science , Vol. 10052 . Springer, Cham, 500--517. Takeshi Nakai, Yuuki Tokushige, Yuto Misawa, Mitsugu Iwamoto, and Kazuo Ohta. 2016. Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations. In Cryptology and Network Security, CANS 2016, Sara Foresti and Giuseppe Persiano (Eds.). Lecture Notes in Computer Science, Vol. 10052. Springer, Cham, 500--517."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(97)00107-2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/2780702.2781125"},{"key":"e_1_3_2_1_14_1","volume-title":"Theory and Practice of Natural Computing, Carlos Mart\u00edn-Vide, Takaaki Mizuki, and Miguel A","author":"Ueda Itaru","unstructured":"Itaru Ueda , Akihiro Nishimura , Yu-ichi Hayashi, Takaaki Mizuki , and Hideaki Sone . 2016. How to Implement a Random Bisection Cut . In Theory and Practice of Natural Computing, Carlos Mart\u00edn-Vide, Takaaki Mizuki, and Miguel A . VegaRodr\u00edguez (Eds.). Vol. 10071 . Springer International Publishing , Cham , 58--69. Itaru Ueda, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone. 2016. How to Implement a Random Bisection Cut. In Theory and Practice of Natural Computing, Carlos Mart\u00edn-Vide, Takaaki Mizuki, and Miguel A. VegaRodr\u00edguez (Eds.). Vol. 10071. Springer International Publishing, Cham, 58--69."}],"event":{"name":"ASIA CCS '18: ACM Asia Conference on Computer and Communications Security","location":"Incheon Republic of Korea","acronym":"ASIA CCS '18","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197507.3197510","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3197507.3197510","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:39:22Z","timestamp":1750210762000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3197507.3197510"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,23]]},"references-count":12,"alternative-id":["10.1145\/3197507.3197510","10.1145\/3197507"],"URL":"https:\/\/doi.org\/10.1145\/3197507.3197510","relation":{},"subject":[],"published":{"date-parts":[[2018,5,23]]},"assertion":[{"value":"2018-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}