Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle
Suguru is a paper and pencil puzzle invented by Naoki Inaba. The goal of the game is to fill
a grid with numbers between 1 and 5 while respecting three simple constraints. We first …
a grid with numbers between 1 and 5 while respecting three simple constraints. We first …
Card-based cryptographic logical computations using private operations
H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …
with the minimum number of cards using private operations under the semi-honest model …
[HTML][HTML] Practical card-based implementations of Yao's millionaire protocol
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than
Alice by using a public-key cryptosystem without revealing the actual amounts of their …
Alice by using a public-key cryptosystem without revealing the actual amounts of their …
How to solve millionaires' problem with two kinds of cards
Card-based cryptography, introduced by den Boer aims to realize multiparty computation
(MPC) by using physical cards. We propose several efficient card-based protocols for the …
(MPC) by using physical cards. We propose several efficient card-based protocols for the …
Card-based cryptographic protocols with malicious players using private operations
Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …
secure against malicious players. Physical cards are used in card-based cryptographic …
Secure computation for threshold functions with physical cards: power of private permutations
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …
playing cards. There are two models on card-based cryptography, called public and private …
New card-based copy protocols using only random cuts
In card-based cryptography, a commitment to a Boolean value is usually represented by two
face-down cards of different colors or numbers, whose order specifies the one-bit value …
face-down cards of different colors or numbers, whose order specifies the one-bit value …
[HTML][HTML] Card-based protocols for secure ranking computations
K Takashima, Y Abe, T Sasaki, D Miyahara… - Theoretical Computer …, 2020 - Elsevier
Consider a group of people who want to know the “rich list” among them, namely the ranking
in terms of their total assets, without revealing any information about the actual value of their …
in terms of their total assets, without revealing any information about the actual value of their …
Efficient card-based protocols for symmetric functions using four-colored decks
Y Takahashi, K Shinagawa, H Shikata… - Proceedings of the 11th …, 2024 - dl.acm.org
Card-based cryptography is an area involving cryptographic techniques that use a deck of
physical cards to implement secure computation. In this paper, we study card-based …
physical cards to implement secure computation. In this paper, we study card-based …
A card-minimal three-input AND protocol using two shuffles
Card-based cryptography typically uses a physical deck comprising black and red cards to
perform secure computations, where a one-bit value is encoded using a pair of cards with …
perform secure computations, where a one-bit value is encoded using a pair of cards with …