Daiki Miyahara

Assistant professor at Sakiyama–Li–Miyahara lab., The University of Electro-Communications

See my [DBLP] [Google Scholar]


Publications

Books

  1. Keisuke Hara and Daiki Miyahara
    APKC'24: Proceedings of the 11th ACM Asia Public-Key Cryptography Workshop
    ACM, 2024
    [DOI]

Journal Papers (refereed)

  1. Kazumasa Shinagawa, Daiki Miyahara, and Takaaki Mizuki
    How to Play Old Maid with Virtual Players
    Theory of Computing Systems, Springer, vol.69, pp.449–477, 2025
    [DOI] (Open Access)

  2. Maki Tsukahara, Yusaku Harada, Haruka Hirata, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, and Kazuo Sakiyama
    Practical Randomness Effects on Physical Security in Second-Order Threshold Implementation of AES
    IEICE Trans. Fundamentals, vol.?, no.?, pp.?–?, 2024
    [DOI] (Open Access)

  3. Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, and Léo Robert
    Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun
    New Generation Computing, Springer, vol.42, pp.449–477, 2024
    [DOI] (Open Access)

  4. Daiki Miyahara, Léo Robert, Pascal Lafourcade, and Takaaki Mizuki
    ZKP Protocols for Usowan, Herugolf, and Five Cells
    Tsinghua Science and Technology, vol.29(6), pp.1651–1666, 2024
    [DOI] (Open Access)

  5. Yuichiro Shimano, Daiki Miyahara, and Kazuo Sakiyama
    Fundamental Study for Acquiring Side-Channel Information Using Rolling Shutter Effect (In Japanese)
    IEEJ Transactions on Electronics, Information and Systems, vol.143(12), pp.1180–1186, 2023
    [DOI]

  6. Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Physical ZKP Protocols for Nurimisaki and Kurodoko
    Theoretical Computer Science, Elsevier, vol.972, 114071, 2023
    [DOI]

  7. Ryota Hira, Tomoaki Kitahara, Daiki Miyahara, Yuko Hara-Azumi, Yang Li, and Kazuo Sakiyama
    Software Evaluation for Second Round Candidates in NIST Lightweight Cryptography
    Journal of Information Processing, vol.31, pp.205–219, 2023
    [DOI] (Open Access)

  8. Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Card-Based ZKP for Connectivity: Applications to Nurikabe, Hitori, and Heyawake
    New Generation Computing, Springer, vol.40, pp.149–171, 2022
    [DOI] (Open Access)

  9. Léo Robert, Daiki Miyahara, Pascal Lafourcade, Luc Libralesso, and Takaaki Mizuki
    Physical Zero-Knowledge Proof and NP-completeness Proof of Suguru Puzzle
    Information and Computation, Elsevier, vol.285(B), 104858, 2022
    [DOI] (Open Access)

  10. Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Actively Revealing Card Attack on Card-based Protocols
    Natural Computing, Springer, vol.21, pp.615–628, 2022
    [DOI] (Open Access)

  11. Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Léo Robert, Tatsuya Sasaki, and Hideaki Sone
    How to Construct Physical Zero-Knowledge Proofs for Puzzles with a “Single Loop” Condition
    Theoretical Computer Science, Elsevier, vol.888, pp.41–55, 2021
    [DOI] (Open Access)

  12. Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Evaluating Card-Based Protocols in Terms of Execution Time
    International Journal of Information Security, Springer, vol.20, pp.729–740, 2021
    [DOI] (Open Access)

  13. Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
    Card-based Protocols for Secure Ranking Computations
    Theoretical Computer Science, Elsevier, vol.845, pp.122–135, 2020
    [DOI] (Open Access)

  14. Tatsuya Sasaki, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Efficient Card-Based Zero-Knowledge Proof for Sudoku
    Theoretical Computer Science, Elsevier, vol.839, pp.135–142, 2020
    [DOI] (Open Access)

  15. Itaru Ueda, Daiki Miyahara, Akihiro Nishimura, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Secure Implementations of a Random Bisection Cut
    International Journal of Information Security, Springer, vol.19, pp.445–452, 2020
    [DOI]

  16. Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Practical Card-Based Implementations of Yao's Millionaire Protocol
    Theoretical Computer Science, Elsevier, vol.803, pp.207–221, 2020
    [DOI]

  17. Daiki Miyahara, Tatsuya Sasaki, Takaaki Mizuki, and Hideaki Sone
    Card-based Physical Zero-knowledge Proof for Kakuro
    IEICE Trans. Fundamentals, vol.E102-A, no.9, pp.1072–1078, 2019
    [DOI]

International Conferences (refereed)

  1. Shohei Kaneko, Pascal Lafourcade, Lola Mallordy, Daiki Miyahara, Maxime Puys, and Kazuo Sakiyama
    Secure Voting Protocol Using Balance Scale
    17th International Symposium on Foundations & Practice of Security (FPS), Lecture Notes in Computer Science, Springer, vol.?, pp.?–?, 2024
    [DOI]

  2. Shohei Kaneko, Pascal Lafourcade, Lola Mallordy, Daiki Miyahara, Maxime Puys, and Kazuo Sakiyama
    Balance-Based ZKP Protocols for Pencil-and-Paper Puzzles
    27th Information Security Conference (ISC), Lecture Notes in Computer Science, Springer, vol.15257, pp.211–231, 2024
    [DOI]

  3. Kazumasa Shinagawa, Daiki Miyahara, and Takaaki Mizuki
    How to Play Old Maid with Virtual Players
    18th Conference on Frontiers of Algorithmic Wisdom (IJTCS-FAW 2024), Lecture Notes in Computer Science, Springer, vol.14752, pp.53–65, 2024
    [DOI]

  4. Haruka Hirata, Daiki Miyahara, Victor Arribas, Yang Li, Noriyuki Miura, Svetla Nikova, and Kazuo Sakiyama
    All You Need Is Fault: Zero-Value Attacks on AES and a New λ-Detection M&M
    IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES 2024), vol.2024, no.1, pp.133–156, 2024
    [DOI]

  5. Yuki Matsukawa, Daiki Miyahara, Takeshi Sugawara, Kazuo Sakiyama, and Yang Li
    Exploring Leakage Characteristics and Attacks Through Profiles of Screaming Channels
    7th International Conference on Mobile Internet Security (MobiSec 2023), Communications in Computer and Information Science, Springer, vol.2095, pp.152–166, 2024
    [DOI]

  6. Maki Tsukahara, Haruka Hirata, Mingyu Yang, Daiki Miyahara, Yang Li, Yuko Hara-Azumi, and Kazuo Sakiyama
    On the Practical Dependency of Fresh Randomness in AES S-box with Second-Order TI
    11th International Symposium on Computing and Networking, CANDAR Workshops (CANDARW 2023), IEEE, pp.286–291, 2023
    [DOI]

  7. Samuel Hand, Alexander Koch, Pascal Lafourcade, Daiki Miyahara, and Léo Robert
    Check Alternating Patterns: A Physical Zero-Knowledge Proof for Moon-or-Sun
    17th International Workshop on Security (IWSEC 2023), Lecture Notes in Computer Science, Springer, vol.14128, pp.255–272, 2023
    [DOI]

  8. Hayato Shikata, Daiki Miyahara, and Takaaki Mizuki
    Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
    10th ACM International Workshop on ASIA Public-Key Cryptography (APKC 2023), ACM, pp.33–41, 2023
    [DOI] [Best paper award]

  9. Masahisa Shimano, Kazuo Sakiyama, and Daiki Miyahara
    Towards Verifying Physical Assumption in Card-Based Cryptography
    15th International Conference on Security for Information Technology and Communications (SECITC 2022), Lecture Notes in Computer Science, Springer, vol.13809, pp.289–305, 2023
    [DOI]

  10. Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Hide a liar: Card-Based ZKP Protocol for Usowan
    17th Annual Conference on Theory and Applications of Models of Computation (TAMC 2022), Lecture Notes in Computer Science, Springer, vol.13571, pp.201–217, 2023
    [DOI]

  11. Daiki Miyahara and Takaaki Mizuki
    Secure Computations through Checking Suits of Playing Cards
    16th Conference on Frontiers of Algorithmic Wisdom (IJTCS-FAW 2022), Lecture Notes in Computer Science, Springer, vol.13461, pp.110–128, 2023
    [DOI]

  12. Tomoaki Kitahara, Ryota Hira, Yuko Hara-Azumi, Daiki Miyahara, Yang Li, and Kazuo Sakiyama
    Optimized Software Implementations of Ascon, Grain-128AEAD, and TinyJambu on ARM Cortex-M
    10th International Symposium on Computing and Networking Workshops (CANDARW 2022), IEEE, pp.316–322, 2022
    [DOI]

  13. Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Card-Based ZKP Protocol for Nurimisaki
    24th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2022), Lecture Notes in Computer Science, Springer, vol.13751, pp.285–298, 2022
    [DOI]

  14. Hayato Shikata, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    Card-minimal Protocols for Symmetric Boolean Functions of More Than Seven Inputs
    19th International Colloquium on Theoretical Aspects of Computing (ICTAC 2022), Lecture Notes in Computer Science, Springer, vol.13572, pp.388–406, 2022
    [DOI]

  15. Rikuo Haga, Kodai Toyoda, Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Yuichi Hayashi, and Takaaki Mizuki
    Card-Based Secure Sorting Protocol
    17th International Workshop on Security (IWSEC 2022), Lecture Notes in Computer Science, Springer, vol.13504, pp.224–240, 2022
    [DOI]

  16. Rikuo Haga, Yuichi Hayashi, Daiki Miyahara, and Takaaki Mizuki
    Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards
    13th International Conference on Cryptology in Africa (AFRICACRYPT 2022), Lecture Notes in Computer Science, Springer, vol.13503, pp.448–468, 2022
    [DOI]

  17. Tomoki Kuzuma, Raimu Isuzugawa, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations
    9th ACM International Workshop on ASIA Public-Key Cryptography (APKC 2022), ACM, pp.51–58, 2022
    [DOI]

  18. Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    Another Use of the Five-Card Trick Card-Minimal Secure Three-Input
    22nd International Conference on Cryptology in India (Indocrypt 2021), Lecture Notes in Computer Science, Springer, vol.13143, pp.536–555, 2021
    [DOI]

  19. Daiki Miyahara, Hiromichi Haneda, and Takaaki Mizuki
    Card-based Zero-knowledge Proof Protocols for Graph Problems and Their Computational Model
    15th International Conference on Provable and Practical Security (ProvSec 2021), Lecture Notes in Computer Science, Springer, vol.13059, pp.136–152, 2021
    [DOI]

  20. Raimu Isuzugawa, Kodai Toyoda, Yu Sasaki, Daiki Miyahara, and Takaaki Mizuki
    A Card-minimal Three-Input AND Protocol Using Two Shuffles
    27th International Computing and Combinatorics Conference (COCOON 2021), Lecture Notes in Computer Science, Springer, vol.13025, pp.668–679, 2021
    [DOI]

  21. Raimu Isuzugawa, Daiki Miyahara, and Takaaki Mizuki
    Zero-knowledge Proof Protocol for Cryptarithmetic Using Dihedral Cards
    19th International Conference on Unconventional Computation and Natural Computation (UCNC 2021), Lecture Notes in Computer Science, Springer, vol.12984, pp.51–67, 2021
    [DOI]

  22. Daiki Miyahara, Yuichi Komano, Takaaki Mizuki, and Hideaki Sone
    Cooking Cryptographers: Secure Multiparty Computation Based on Balls and Bags
    34th IEEE Computer Security Foundations Symposium (CSF 2021), IEEE, pp.389–404, 2021
    [DOI] [slides]

  23. Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Interactive Physical ZKP for Connectivity: Applications to Nurikabe and Hitori
    17th Conference on Computability in Europe (CiE 2021), Lecture Notes in Computer Science, Springer, vol.12813, pp.373–384, 2021
    [DOI]

  24. Hiroto Koyama, Kodai Toyoda, Daiki Miyahara, and Takaaki Mizuki
    New Card-based Copy Protocols Using Only Random Cuts
    8th ACM International Workshop on ASIA Public-Key Cryptography (APKC 2021), ACM, pp.13–22, 2021
    [DOI] [APKC 2021 Best Paper Awards]

  25. Hiroto Koyama, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    A Secure Three-input AND Protocol with a Standard Deck of Minimal Cards
    16th International Computer Science Symposium in Russia (CSR 2021), Lecture Notes in Computer Science, Springer, vol.12730, pp.242–256, 2021
    [DOI]

  26. Soma Murata, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Efficient Generation of a Card-based Uniformly Distributed Random Derangement
    15th International Conference and Workshop on Algorithms and Computation (WALCOM 2021), Lecture Notes in Computer Science, Springer, vol.12635, pp.78–89, 2021
    [DOI]

  27. Yuto Shinoda, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
    Card-based Covert Lottery
    13th International Conference on Security for Information Technology and Communications (SECITC 2020), Lecture Notes in Computer Science, Springer, vol.12596, pp.257–270, 2020
    [DOI]

  28. Léo Robert, Daiki Miyahara, Pascal Lafourcade, and Takaaki Mizuki
    Physical Zero-Knowledge Proof for Suguru Puzzle
    22nd International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2020), Lecture Notes in Computer Science, Springer, vol.12514, pp.235–247, 2020
    [DOI]

  29. Takahiro Saito, Daiki Miyahara, Takaaki Mizuki, and Hiroki Shizuya
    How to Implement a Non-uniform or Non-closed Shuffle
    9th International Conference on the Theory and Practice of Natural Computing (TPNC 2020), Lecture Notes in Computer Science, Springer, vol.12494, pp.107–118, 2020
    [DOI]

  30. Soma Murata, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Public-PEZ Cryptography
    23rd Information Security Conference (ISC 2020), Lecture Notes in Computer Science, Springer, vol.12472, pp.59–74, 2020
    [DOI]

  31. Daiki Miyahara, Léo Robert, Pascal Lafourcade, So Takeshige, Takaaki Mizuki, Kazumasa Shinagawa, Atsuki Nagao, and Hideaki Sone
    Card-Based ZKP Protocols for Takuzu and Juosan
    10th International Conference on FUN with Algorithms (FUN 2021), Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, vol.157, pp.20:1–20:21, 2020
    [DOI]

  32. Kodai Toyoda, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Six-Card Finite-Runtime XOR Protocol with Only Random Cut
    7th ACM International Workshop on ASIA Public-Key Cryptography (APKC 2020), ACM, pp.2–8, 2020
    [DOI]

  33. Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, and Hideaki Sone
    Card-based Secure Ranking Computations
    13th Annual International Conference on Combinatorial Optimization and Applications (COCOA 2019), Lecture Notes in Computer Science, Springer, vol.11949, pp.461–472, 2019
    [DOI]

  34. Ken Takashima, Daiki Miyahara, Takaaki Mizuki, and Hideaki Sone
    Card-based Protocol against Actively Revealing Cards Attack
    8th International Conference on the Theory and Practice of Natural Computing (TPNC 2019), Lecture Notes in Computer Science, Springer, vol.11934, pp.95–106, 2019
    [DOI]

  35. Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
    A Physical ZKP for Slitherlink: How to Perform Physical Topology-Preserving Computation
    15th International Conference on Information Security Practice and Experience (ISPEC 2019), Lecture Notes in Computer Science, Springer, vol.11879, pp.135–151, 2019
    [DOI]

  36. Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Tatsuya Sasaki, and Hideaki Sone
    Interactive Physical Zero-Knowledge Proof for Norinori
    25th International Computing and Combinatorics Conference (COCOON 2019), Lecture Notes in Computer Science, Springer, vol.11653, pp.166–177, 2019
    [DOI] [slides]

  37. Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol
    12th Annual International Conference on Combinatorial Optimization and Applications (COCOA 2018), Lecture Notes in Computer Science, Springer, vol.11346, pp.246–261, 2018
    [DOI]

  38. Xavier Bultel, Jannik Dreier, Jean-Guillaume Dumas, Pascal Lafourcade, Daiki Miyahara, Takaaki Mizuki, Atsuki Nagao, Tatsuya Sasaki, Kazumasa Shinagawa and Hideaki Sone
    Physical Zero-Knowledge Proof for Makaro
    20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS 2018), Lecture Notes in Computer Science, Springer, vol.11201, pp.111–125, 2018
    [DOI]

  39. Daiki Miyahara, Itaru Ueda, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    Analyzing Execution Time of Card-Based Protocols
    17th International Conference on Unconventional Computation and Natural Computation (UCNC 2018), Lecture Notes in Computer Science, Springer, vol.10867, pp.145–158, 2018
    [DOI]

  40. Julia Kastner, Alexander Koch, Stefan Walzer, Daiki Miyahara, Yu-ichi Hayashi, Takaaki Mizuki, and Hideaki Sone
    The Minimum Number of Cards in Practical Card-Based Protocols
    Advances in Cryptology – ASIACRYPT 2017, Part III, Lecture Notes in Computer Science, Springer, vol.10626, pp.126–155, 2017
    [DOI]

Japanese Conferences/Symposiums [Link]


Invited Talks

Japanese Talks [Link]


PC Member


Experience