Card-based ZKP for connectivity: applications to Nurikabe, Hitori, and Heyawake

L Robert, D Miyahara, P Lafourcade… - New Generation …, 2022 - Springer
During the last years, several card-based Zero-Knowledge Proof (ZKP) protocols for Nikoli's
puzzles have been designed. Although there are relatively simple card-based ZKP protocols …

Card-based cryptographic logical computations using private operations

H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …

[HTML][HTML] Practical card-based implementations of Yao's millionaire protocol

D Miyahara, Y Hayashi, T Mizuki, H Sone - Theoretical computer science, 2020 - Elsevier
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than
Alice by using a public-key cryptosystem without revealing the actual amounts of their …

Foundations for actively secure card-based cryptography

A Koch, S Walzer - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …

Card-based cryptographic protocols with malicious players using private operations

Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …

Secure computation for threshold functions with physical cards: power of private permutations

T Nakai, S Shirouchi, Y Tokushige, M Iwamoto… - New Generation …, 2022 - Springer
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …

Five-card AND computations in committed format using only uniform cyclic shuffles

Y Abe, Y Hayashi, T Mizuki, H Sone - New Generation Computing, 2021 - Springer
In card-based cryptography, designing AND protocols in committed format is a major
research topic. The state-of-the-art AND protocol proposed by Koch, Walzer, and Härtel in …

Another use of the five-card trick: card-minimal secure three-input majority function evaluation

K Toyoda, D Miyahara, T Mizuki - … on Cryptology in India, Jaipur, India …, 2021 - Springer
Starting from the five-card trick proposed by Den Boer (EUROCRYPT'89), many card-based
protocols performing secure multiparty computations with a deck of physical cards have …

Efficient card-based majority voting protocols

Y Abe, T Nakai, Y Kuroki, S Suzuki, Y Koga… - New Generation …, 2022 - Springer
Card-based cryptography is a variety of secure multiparty computation (MPC). Recently, a
new technique called private operations was introduced because the protocol can be …

[PDF][PDF] Cryptographic protocols from physical assumptions

A Koch - 2019 - core.ac.uk
Modern cryptography does not only enable to protect your personal data on the Internet, or
to authenticate for certain services, but also evaluate a function on private inputs of multiple …