Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle

L Robert, D Miyahara, P Lafourcade… - Information and …, 2022 - Elsevier
Suguru is a paper and pencil puzzle invented by Naoki Inaba. The goal of the game is to fill
a grid with numbers between 1 and 5 while respecting three simple constraints. We first …

Card-based cryptographic logical computations using private operations

H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …

[HTML][HTML] Practical card-based implementations of Yao's millionaire protocol

D Miyahara, Y Hayashi, T Mizuki, H Sone - Theoretical computer science, 2020 - Elsevier
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than
Alice by using a public-key cryptosystem without revealing the actual amounts of their …

How to solve millionaires' problem with two kinds of cards

T Nakai, Y Misawa, Y Tokushige, M Iwamoto… - New Generation …, 2021 - Springer
Card-based cryptography, introduced by den Boer aims to realize multiparty computation
(MPC) by using physical cards. We propose several efficient card-based protocols for the …

Card-based cryptographic protocols with malicious players using private operations

Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …

Secure computation for threshold functions with physical cards: power of private permutations

T Nakai, S Shirouchi, Y Tokushige, M Iwamoto… - New Generation …, 2022 - Springer
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …

New card-based copy protocols using only random cuts

H Koyama, K Toyoda, D Miyahara… - … of the 8th ACM on ASIA …, 2021 - dl.acm.org
In card-based cryptography, a commitment to a Boolean value is usually represented by two
face-down cards of different colors or numbers, whose order specifies the one-bit value …

[HTML][HTML] Card-based protocols for secure ranking computations

K Takashima, Y Abe, T Sasaki, D Miyahara… - Theoretical Computer …, 2020 - Elsevier
Consider a group of people who want to know the “rich list” among them, namely the ranking
in terms of their total assets, without revealing any information about the actual value of their …

Efficient card-based protocols for symmetric functions using four-colored decks

Y Takahashi, K Shinagawa, H Shikata… - Proceedings of the 11th …, 2024 - dl.acm.org
Card-based cryptography is an area involving cryptographic techniques that use a deck of
physical cards to implement secure computation. In this paper, we study card-based …

A card-minimal three-input AND protocol using two shuffles

R Isuzugawa, K Toyoda, Y Sasaki, D Miyahara… - International Computing …, 2021 - Springer
Card-based cryptography typically uses a physical deck comprising black and red cards to
perform secure computations, where a one-bit value is encoded using a pair of cards with …