Skip to main content
Erschienen in:

Open Access 24.07.2024 | Research Paper

Physical Zero-Knowledge Proof Protocols for Topswops and Botdrops

verfasst von: Yuichi Komano, Takaaki Mizuki

Erschienen in: New Generation Computing | Ausgabe 3/2024

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nehmen wir an, eine Folge von Karten mit der Nummer 1 bis wird in zufälliger Reihenfolge aufgedeckt. Nehmen wir die Zahl auf der ersten Karte in der Reihenfolge. Nehmen Sie dann die ersten Karten aus der Sequenz, ordnen Sie diese Kartenfolge in umgekehrter Reihenfolge an und geben Sie sie in die ursprüngliche Reihenfolge zurück. Wiederholen Sie diese Vorsilbenumkehrung, bis die Zahl auf der ersten Karte in der Sequenz zu 1 wird. Dies ist ein Ein-Spieler-Kartenspiel namens Topswops. Die Rechenkomplexität von Topswops wurde nicht gründlich untersucht. Lässt man beispielsweise die maximale Anzahl der Umkehrungen von Vorwahlen für Topswaps mit Karten angeben, bleiben die Werte von für unbekannt. Im Allgemeinen gibt es keinen bekannten effizienten Algorithmus, um eine anfängliche Sequenz von Karten zu finden, die genaue Umkehrungen von Vorzeichen für beliebige Integer und erfordert. In dieser Arbeit schlagen wir unter Verwendung eines Kartenstapels ein physikalisches Null-Wissen-Proof-Protokoll vor, das es einem Prüfer ermöglicht, einen Prüfer davon zu überzeugen, dass der Prüfer eine Anfangssequenz von Karten kennt, die eine Umkehrung der Vorsilbe erfordert, ohne Wissen über diese Sequenz preiszugeben. Wir beschäftigen uns auch mit Botdrops, einer Variante von Topswops.
Hinweise
An earlier version of this study was presented at the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, Taipei (and online), Taiwan, November 23–25, and appeared in Proc. ISPEC 2022, Lecture Notes in Computer Science, Springer, vol. 13620, pp. 537–553, 2022 [1]. The first author was with Toshiba corporation during this earlier study.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

1 Introduction

Topswops is a one-player card game in which one randomly arranges n cards, numbered 1 to n. Given such an initial sequence of n cards, the player rearranges the sequence as follows. After looking at the number written on the first card, denoted as k, the player rearranges the first k cards into their reverse order while leaving the remaining \(n-k\) cards unchanged. The player repeatedly applies such prefix reversals to the current sequence until the number on the first card in the sequence becomes 1. For example, consider the case where \(n=5\), and let (3, 1, 4, 5, 2) be an initial sequence. In Topswops, the player rearranges the sequence as
$$\begin{aligned}&(\underline{\textbf{3},1,4},5,2) \rightarrow (\underline{\textbf{4},1,3,5},2) \rightarrow (\underline{\textbf{5},3,1,4,2}) \rightarrow (\underline{\textbf{2},4},1,3,5) \rightarrow (\underline{\textbf{4},2,1,3},5) \\ {}&\rightarrow (\underline{\textbf{3},1,2},4,5) \rightarrow (\underline{\textbf{2},1},3,4,5) \rightarrow (1,2,3,4,5) , \end{aligned}$$
so the game ends in seven steps (namely, seven prefix reversals). In this example, the cards are finally sorted in ascending order. Note that the number of steps depends on an individual initial sequence and that the n cards may not be finally sorted in ascending order. For instance, if the initial sequence is (2, 1, 3, 5, 4), the game ends with (1, 2, 3, 5, 4) after one step, so that the cards are unsorted.

1.1 Open Problems in Topswops

Topswops is said to be invented by J.H. Conway (see the Introduction in [2] or p. 116 of [3]). Historically, the problem of which initial sequences produce the maximum number of steps has been investigated. For example, recall that the initial sequence (3, 1, 4, 5, 2) shown above requires exactly seven steps; it is known that in the case of \(n=5\), there is no initial sequence that results in more than seven steps, and hence, seven is the maximum number of steps for Topswops with five cards. Therefore, letting f(n) denote the maximum number of steps for Topswops with n cards, we have \(f(5)=7\).
Generally, the currently known upper bound on f(n) is \(O(1.62^n)\) [3, 4] and the currently known lower bound is \(\Omega (n^2)\) [2]. Thus, there is an exponential gap between the (currently known) upper and lower bounds on f(n), and finding better bounds to reduce that gap is an open problem.
Table 1
Values for f(n) (OEIS A000375) and g(n) (OEIS A123398)
n
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
f(n)
0
1
2
4
7
10
16
22
30
38
51
65
80
101
113
139
159
191
221
g(n)
1
1
2
2
2
1
5
2
1
1
1
1
1
4
6
1
2
1
4
Since there is no known efficient algorithm for finding the values of f(n), several studies have used brute-force searches to report values for f(n) and the corresponding initial sequences (e.g., [5, 6]). Specifically, values are known up to \(n \le 19\). Table 1 shows known values for f(n), which are registered as OEIS A0003751 in The On-Line Encyclopedia of Integer Sequences (OEIS). That table also shows as g(n) the number of initial sequences requiring f(n) steps, which are registered as OEIS A123398.2 The most recent result was that Kimura et al. [6] obtained values for f(18), f(19) (and g(18), g(19)) in 2021, using 172 threads on nine computers over about six days.3 Finding values of f(n) and g(n) for \(n \ge 20\) has remained an important open problem for many years, along with narrowing the gap between the upper and lower bounds on f(n), as described above.

1.2 Zero-Knowledge Proof Protocol for Topswops

As mentioned above, the computational complexity of Topswops has been insufficiently revealed, and many open problems related to Topswops remain. In particular, for any positive integers n and \(\ell \) (such that \(1 \le \ell \le f(n)\)), there is no known efficient algorithm for finding an initial sequence of n cards that requires exactly \(\ell \) steps. Therefore, there are possible situations where it is invaluable that only a single person knows a particular initial sequence (and its number of steps) while the others do not know anything about it. Hence, let us try to apply the concept of zero-knowledge proof [7] to Topswops. In other words, let us consider a zero-knowledge proof protocol for Topswops whereby a prover P can convince a verifier V that P knows an initial sequence requiring exactly \(\ell \) steps without leaking any information about the sequence. The following illustrates two such situations.
  • Suppose that prover P has discovered an initial sequence of 20 cards requiring 250 steps, which is longer than the currently known lower bound \(f(20)\ge 249\),4 and wants to publish it as a new achievement. However, if P shows the initial sequence to a (possibly malicious) third party, that party might claim it as its own achievement. If, however, a zero-knowledge proof protocol could be applied to Topswops, P could prove that P discovered the initial sequence while still keeping it secret. After gaining sufficient recognition, P could claim the initial sequence by disclosing it without any trouble.
  • Suppose that several players want to play a game in which they try to find an initial sequence of Topswops. The rules of the game state that the winner is the player who finds an initial sequence with a larger number of steps, or one with a predetermined number of steps. Assume that the game may be played many times, with different players and different conditions. If the initial sequences are disclosed every time to determine a game winner, those sequences lead to another sequence corresponding to a smaller number of steps, or it will serve as a clue for finding another sequence having a larger number of steps, which makes it impossible to fairly or enjoyably play subsequent games. Using a zero-knowledge proof protocol to determine the game winner, however, would make it possible to enjoy the game.

1.3 Botdrops and Zero-Knowledge Proof Protocol

“Botdrops” (a.k.a. Bottomdrops) [8] is a variant of Topswops and is also a one-player card game. In this game, given an initial sequence of n cards numbered 1 to n, the player rearranges the sequence as follows. The player first looks at the number written on the bottom card, denoted as k, the player rearranges the first k cards into the reverse order and puts the reversed sub-sequence on the bottom. The player repeats such an operation to the current sequence. After such an operation is performed several times, the sequence falls into an \(\ell \)-cycle loop (for some integer \(\ell \)).
Similar to the case of Topswops, there is no known efficient algorithm to find an initial sequence which leads to an \(\ell \)-cycle loop for given \(\ell \). Hence, a solution (namely, an initial sequence) of Botdrops is also invaluable and we will construct a zero-knowledge proof protocol for Botdrops.

1.4 Contribution

In this paper, we propose a zero-knowledge proof protocol for Topswops. Namely, assuming that positive integers n and \(\ell \) (such that \(1 \le \ell \le f(n)\)) are public, when a prover P knows an initial sequence of n cards requiring exactly \(\ell \) steps, P can convince a verifier V that P knows the initial sequence without disclosing it. Our protocol is a so-called physical zero-knowledge proof protocol that can be executed using a physical deck of cards.
In addition, we deal with “Botdrops.” To our knowledge, Botdrops itself has not been investigated so much in the literature. Thus, we first analyze this game for the case of \(n\le 13\) comprehensively, where n is the size of the game. Consequently, we find that the sequences produced by Botdrops are very different from the ones produced by Topswops, and hence, we believe that this game itself is worthwhile investigating. After such investigation, we construct a zero-knowledge proof protocol for Botdrops. The rediscovery of Botdrops itself is considered one of the main contributions.
In the sequel, after preliminaries are presented in Sect. 2, Sects. 3 and 4 are devoted to Topswops and Botdrops, respectively.
The difference between this paper and the conference version [1] is as follows. While the conference version dealt only with Topswops, this paper deals with both Topswops and Botdrops. That is, the contents presented in Sect. 4 are completely new materials.
In the literature, many physical zero-knowledge proof protocols have been constructed using a physical deck of cards, especially those for pencil puzzles such as Sudoku. Examples include ABC End View [9, 10], Akari [11], Ball Sort Puzzle [12], Cryptarithmetic [13], Five Cells [14], Goishi Hiroi [10], Kurodoko [15], Hashiwokakero (Bridges) [16], Heyawake [17], Hitori [17, 18], Juosan [19], Kakuro [11, 20], KenKen [11], Makaro [21, 22], Masyu [23], Moon-or-Sun [24], Nonogram [2527], Norinori [28], Numberlink [29, 30], Nurikabe [17, 18], Nurimisaki [15, 31], Ripple Effect [32, 33], Shikaku [34], Slitherlink [23, 35], Sudoku [3640], Suguru [41, 42], Takuzu [11, 19], Usowan [43], and Pancake sorting [44].
Since our protocol uses a physical deck of cards, this study falls into the research area of card-based cryptography (refer to [4547] for surveys), which has been rapidly growing recently, e.g., [48, 49]. The recent results on card-based cryptography include proposing efficient protocols for symmetric functions [50, 51], analyzing information leakage due to operative errors [52], introducing graph automorphism shuffles [53], designing a secure sorting protocol [54], lowering the numbers of required cards [55] and shuffles [56], constructing multi-valued protocols with a direction encoding [57], introducing new encoding schemes for integers [58], exploring half-open-action protocols [59], applications of Garbled circuits [6062], and determining the landscape of card-minimal protocols in terms of running time requirements [63].

2 Preliminaries

In this section, we first explain the notations used in this paper, then describe how and what physical cards are utilized, and introduce the “pile-scramble shuffle [64]” and the “sort sub-protocol [65],” both of which are used in our protocols as sub-protocols.

2.1 Notations

Let n denote the Topswops size (i.e., the number of cards in an initial sequence), as in Sect. 1.
We regard any initial sequence of n cards and its succeeding sequences that appear in Topswops as permutations on \(\{1,2,\dots ,n\}\). That is, a permutation \(\pi \in S_n\), i.e.,
$$\begin{aligned} \pi =\left( \begin{array}{ccccc} 1 &{} 2 &{} 3 &{} \cdots &{} n \\ \pi (1) &{} \pi (2) &{} \pi (3) &{} \cdots &{} \pi (n) \end{array} \right) , \end{aligned}$$
represents a sequence of n cards
$$\begin{aligned} (\pi (1), \pi (2), \pi (3), \dots , \pi (n)), \end{aligned}$$
where \(S_n\) denotes the symmetric group of degree n.
For the initial sequence corresponding to a permutation \(\pi \in S_n\), denote by \(\alpha (\pi )\) the number of steps required in Topswops. Using this notation \(\alpha (\pi )\), we formally define f(n), which is the maximum number of steps for n cards, as
$$\begin{aligned} f(n):=\max \left\{ \alpha (\pi )\;|\;\pi \in S_n\right\} . \end{aligned}$$
Using a permutation, let us represent each prefix reversal operation in Topswops, which rearranges the first i cards in their reverse order: Define a permutation https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq46_HTML.gif for every i, \(2\le i\le n\), as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ17_HTML.png
which is sometimes referred to as the swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq48_HTML.gif . Note that https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq49_HTML.gif is equal to its inverse permutation https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq50_HTML.gif . That is, for every i such that \(2\le i\le n\),
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ1_HTML.png
(1)
holds.

2.2 Commitment Based on Physical Cards

The goal of this paper is to construct a zero-knowledge proof protocol for Topswops, which should keep an initial sequence and its subsequent sequences secret. Therefore, as usual in card-based cryptography, we place cards face down and perform a series of operations such as shuffling, rearranging, and turning over cards.
In this paper, we use a deck of physical cards numbered 1 to n, denoted by https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq52_HTML.gif , whose backs are all identical https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq53_HTML.gif . We assume that cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq54_HTML.gif having the same number i are all indistinguishable. By
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ18_HTML.png
we denote a face-down card whose face is https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq55_HTML.gif for a number i.
As explained in the previous subsection, an initial sequence of n cards can be represented by a permutation \(\pi \in S_n\), so a prover P can take n physical cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq57_HTML.gif and place them face down according to the initial sequence \(\pi \):
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ19_HTML.png
It thus seems possible to keep the initial sequence and its succeeding sequences secret. However, it is difficult to apply a swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq59_HTML.gif to such a physical sequence while keeping the integer i secret, and hence, such a simple representation does not work.
We therefore introduce a novel encoding of integers based on swaps https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq60_HTML.gif : an integer \(x \in \{2, 3, \dots , n\}\) is encoded with n cards as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ2_HTML.png
(2)
In other words, each integer \(x \in \{2, 3, \dots , n\}\) is represented by
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ20_HTML.png
In addition, \(x=1\) is represented with n cards of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq64_HTML.gif as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ3_HTML.png
(3)
We call a sequence of n face-down cards encoding an integer \(x \in \{1,2, \dots , n\}\) (according to the encoding rules (2) and (3) above) a ts-commitment to x. Therefore, a ts-commitment to 1 is a sequence of n face-down cards
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ21_HTML.png
and a commitment to x such that \(x\ge 2\) is
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ22_HTML.png
Without distinguishing between the case \(x=1\) and the case \(x>1\), a ts-commitment to x is denoted by
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ23_HTML.png

2.3 Pile-Scramble Shuffle

A pile-scramble shuffle [64] is a shuffling operation by which several piles of cards of the same size are shuffled.
As an example, suppose that we have n commitments and a sequence of n face-down cards corresponding to a permutation \(\pi \in S_n\) as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ4_HTML.png
(4)
where numbers above the commitments represent indexes for convenience. Considering each commitment and the card below it as a single pile, apply a pile-scramble shuffle to the n piles. The transition is
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ5_HTML.png
(5)
where \(r\in S_n\) is a uniformly distributed random permutation generated by the pile-scramble shuffle.
To implement a pile-scramble shuffle, we fix each pile of cards and shuffle the piles [64].

2.4 Sort Sub-protocol

Recall arrangement (4) above, where we have a sequence of n commitments and a sequence of cards corresponding to a permutation \(\pi \in S_n\). Suppose that, after applying a pile-scramble shuffle to them as in transition (5), we turn over all n cards on the second row. Each number 1 to n should appear. We then sort the piles (keeping the order within each pile unchanged) so that the revealed numbers are in ascending order. We now obtain the sequence of piles
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ24_HTML.png
(because, for example, if \(\pi (r^{-1}(i))=1\), then \(r^{-1}(i)=\pi ^{-1}(1)\) and the commitment at position \(\pi ^{-1}(1)\) moves to the first). We have thus rearranged the sequence of n commitments according to the permutation \(\pi \in S_n\) while keeping \(\pi \) secret.
This technique has been commonly used in constructions of zero-knowledge proof protocols for pencil puzzles since the introduction of a zero-knowledge proof protocol for Sudoku [36] that made full use of card-based cryptography. Koch and Walzer [65] formulated this technique and named it the sort sub-protocol. Note that the idea of applying a pile-scramble shuffle to two sequences of cards corresponding to some permutations originally comes from [66], followed by [67].

3 Proposed Protocol for Topswops

In this section, we propose a zero-knowledge proof protocol for Topswops. Let positive integers n and \(\ell \) (such that \(1 \le \ell \le f(n)\)) be public information. Suppose that a prover P knows \(\sigma \in S_n\) such that \(\alpha (\sigma )=\ell \), i.e., an initial sequence \(\sigma \) of n cards requiring exactly \(\ell \) steps. P wants to convince a verifier V that P knows an initial sequence requiring \(\ell \) steps without revealing any information about the initial sequence \(\sigma \). We will construct a card-based protocol to achieve this.
First, Sect. 3.1 describes the idea behind the proposed protocol. Then, Sects. 3.2 and 3.3 present a copy protocol (that we use as a sub-protocol) and our protocol, respectively. Finally, Sect. 3.4 discusses security and performance of our protocol.

3.1 Idea

This subsection describes the idea behind the proposed protocol using the initial \(n=5\) sequence (3, 1, 4, 5, 2) (which has seven steps) as a working example.
First, prover P, who knows the initial sequence, secretly creates a sequence of commitments corresponding to (3, 1, 4, 5, 2):
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ6_HTML.png
(6)
Recall that each commitment follows the encoding (2) and (3) defined in Sect. 2.2. For example, the first commitment
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ25_HTML.png
i.e., the ts-commitment to 3, is
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ26_HTML.png
which is a permutation corresponding to the swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq86_HTML.gif .
Suppose that we can somehow copy this ts-commitment to 3. We then place the five copied face-down cards below the sequence of commitments as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ27_HTML.png
Considering each commitment and the card below as a single pile, we apply a pile-scramble shuffle. After that, as in the sort sub-protocol described in Sect. 2.4, we turn over the five cards in the second row and sort the piles so that the five cards are rearranged in ascending order. We thus obtain the following:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ28_HTML.png
The order of the first three commitments is reversed in the resulting sequence of commitments, which means that the swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq87_HTML.gif was applied to the initial sequence without leaking any information about https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq88_HTML.gif .
The first commitment in the current sequence is a ts-commitment to 4, which corresponds to the swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq89_HTML.gif . Hence, similar to the case of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq90_HTML.gif above, after we copy https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq91_HTML.gif , if we place the cards of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq92_HTML.gif below the sequence of commitments (to which https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq93_HTML.gif was just applied) and apply the sort sub-protocol, the swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq94_HTML.gif can be applied while the integer corresponding to the first commitment remains secret. If we repeat such operations seven times, the first commitment in the sequence should be a ts-commitment to 1. By turning over the first commitment, we can finally confirm that the prover P placed a correct initial sequence.
This is the idea behind our protocol. However, the above procedure cannot guarantee that the sequence of commitments (6) secretly set by P correctly satisfies the encoding rules. Thus, the proposed protocol, shown in Sect. 3.3, requires another step to ensure that the sequence is correctly rearranged.

3.2 Copy Protocol

As mentioned in Sect. 3.1, our main protocol requires a copied commitment. The following describes how to make two identical commitments from a single commitment while its value is kept secret.
Given a ts-commitment to x such that \(2\le x\le n\),
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ29_HTML.png
along with two sets of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq96_HTML.gif through https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq97_HTML.gif as additional cards, our copy protocol proceeds as follows.
Protocol 1
(Copy protocol)
1.
Commitments and additional cards are placed as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ30_HTML.png
 
2.
Turn over the cards in the first and second rows and apply a pile-scramble shuffle:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ31_HTML.png
Then, a uniformly distributed random permutation \(r\in S_n\) corresponding to this pile-scramble shuffle occurs, and the resulting cards can be represented as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ32_HTML.png
 
3.
Turn over all the cards in the third row. If cards 1 through n appear without omission, sort the piles so that the revealed numbered cards are in ascending order, resulting in the following:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ33_HTML.png
Since https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq99_HTML.gif from Equation (1), the first and second rows are commitments to x and we have copied commitments
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ34_HTML.png
 
In the last step, the n cards in the third row are turned over, but no information about x is leaked because these cards were uniformly randomized by the random permutation r in Step 2. Note also that if an input sequence is a ts-commitment to 1, or if it is not a valid commitment, this protocol detects such an error when the cards are turned over in Step 3.
A copy protocol for a permutation was first proposed in [36], but that protocol requires two pile-scramble shuffles. Our proposed copy protocol is simpler with only one pile-scramble shuffle, because by Equation (1), the permutation https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq100_HTML.gif to be copied is equal to its reverse permutation.

3.3 Our Protocol for Topswops

We are now ready to describe our protocol, which is a so-called non-interactive physical zero-knowledge proof protocol that requires no knowledge of the prover after the prover places an input card sequence (see [68] for details).
According to an initial sequence \(\sigma \) such that \(\alpha (\sigma )=\ell \), the prover P places n face-down cards on the table without anyone seeing the order as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ7_HTML.png
(7)
The input to our protocol is this sequence (7) along with additional 2n cards of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq103_HTML.gif and n cards from each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq104_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq105_HTML.gif  . (The protocol may be executed by a prover or a verifier, or even by a third party.5)
Protocol 2
(Physical zero-knowledge proof protocol for Topswops)
1.
Using \(2n-1\) cards of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq107_HTML.gif and \(n-1\) number cards of each from https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq109_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq110_HTML.gif from the additional cards, make a ts-commitment to each of 1 through n and place them above the input sequence (7) as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ35_HTML.png
 
2.
Apply a pile-scramble shuffle:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ36_HTML.png
 
3.
In the manner of the sort sub-protocol described in Sect. 2.4, turn over and sort the cards in the bottom row so that the cards in the bottom row are in ascending order:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ37_HTML.png
(If any card from 1 to n does not appear in the bottom row, the protocol halts.) Set \(\pi := \sigma \).
 
4.
Repeat the following Steps 4(a) and 4(b) \(\ell \) times.
(a)
We have two number cards each from https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq113_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq114_HTML.gif (i.e., the cards revealed in Step 3 above or 4(b) below and the remaining additional cards not used in Step 1). Using these as additional cards, copy the first commitment, \(\pi (1)\), by executing the copy protocol described in Sect. 3.2 and place the copied commitment below the sequence of commitments. Hereinafter, we use x for \(\pi (1)\) in subscripts for simplicity:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ38_HTML.png
(If an illegal card appears during the copy protocol, the protocol halts.)
 
(b)
Apply a pile-scramble shuffle, turn over the cards in the bottom row, and sort the cards in the bottom row in ascending order:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ39_HTML.png
After this operation, the first row is a sequence of commitments such that the order of the first x commitments is reversed, i.e., the swap https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq117_HTML.gif operation has been applied to the previous sequence of commitments. (If any card from 1 to n does not appear, the protocol aborts.) Set https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq118_HTML.gif .
 
 
5.
Turn over the first commitment https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq119_HTML.gif and return ‘accept’ if https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq120_HTML.gif appears. Otherwise, return ‘reject.’
 

3.4 Security and Performance

We first prove that our protocol is a zero-knowledge proof protocol. In other words, we show that our protocol satisfies requirements for completeness, soundness, and zero knowledge.
Completeness: Suppose that a prover P correctly sets as input a sequence of n cards encoding an initial sequence \(\sigma \in S_n\) such that \(\alpha (\sigma )=\ell \). Then, as can be seen from the construction of the protocol, the sequence is not rejected at any step, but accepted at the final step.
Soundness: Assume that an input sequence of n cards is not the encoding of an initial sequence requiring exactly \(\ell \) steps. There are three cases to consider; (i) the initial sequence is invalid, namely, it is not a sequence consisting of n cards, \(1, 2, \ldots , n\), (ii) the initial sequence requires exactly \(\ell '~(< \ell )\) steps, and (iii) the initial sequence requires exactly \(\ell '~(> \ell )\) steps. Our goal is to prove that the protocol eventually rejects each and the following answers it.
(i)
If the input sequence is not encoded for any initial sequence, for example, an input sequence contains two https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq127_HTML.gif ’s, such an invalid sequence is detected and rejected because not every card from 1 to n appears when the cards are turned up in Step 3.
 
(ii)
Suppose that the input sequence requires exactly \(\ell '~(< \ell )\) steps. When Steps 4 of our protocol are executed \(\ell '\) times, the first commitment will be a ts-commitment to 1, and Step 4(a) of iteration \((\ell '+1)\) will duplicate the ts-commitment to 1, and hence, our protocol rejects the first commitment because n cards of 1 appear in the final step of the copy protocol.
 
(iii)
If the input sequence requires \(\ell '~(> \ell )\) steps, the first commitment in the last step is rejected because the first commitment is something other than a ts-commitment to 1.
 
Zero knowledge: Suppose that the sequence set by prover P corresponds to \(\sigma \in S_n\) such that \(\alpha (\sigma )=\ell \). During the protocol (except for the final step), no information about \(\sigma \) is leaked because the order of revealed cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq135_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq136_HTML.gif is always randomized by a pile-scramble shuffle, which is applied immediately before the cards are turned over. In addition, the ts-commitment to 1 opened in the final step is public information (from the definition of Topswops). Thus, the proposed protocol is information-theoretically secure.
We then discuss the performance of our protocol by counting the number of cards and the number of shuffles required in our protocol.
Regarding the number of cards, we use https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq137_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq138_HTML.gif for the input card sequence, as described at the beginning of Sect. 3.3, with additional 2n cards of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq139_HTML.gif and n cards each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq140_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq141_HTML.gif  . Thus, \(2n+1\) cards of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq143_HTML.gif and \(n+1\) cards of each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq145_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq146_HTML.gif are required, which add up to \(n^2+2n\).
Our protocol uses only the pile-scramble shuffle as a shuffling operation. We therefore count the number of pile-scramble shuffles. In our protocol, Step 2 is executed once, and Steps 4(a) and 4(b) are repeated \(\ell \) times. These steps include one pile-scramble shuffle, so our protocol requires \(2\ell +1\) pile-scramble shuffles in total.

4 Zero-Knowledge Proof for Botdrops

In this section, we deal with another game called Botdrops [8]; we propose a physical zero-knowledge proof protocol for Botdrops. Although little is known about Botdrops and it has been little analyzed to date, we display in this paper that Botdrops is a very interesting one-player game, having quite different features from Topswops.
In Sect. 4.1, we introduce Botdrops and investigate it comprehensively for the case of \(n \le 13\) (where n is the size of the game). In Sect. 4.2, we customize the commitments according to the operations used in Botdrops. In Sect. 4.3, we present the idea behind our protocol. In Sect. 4.4, we present a couple of sub-protocols used in our protocol as building blocks. In Sect. 4.5, we construct a zero-knowledge proof protocol for Botdrops. Finally, Sect. 4.6 discusses the security and performance of the protocol.

4.1 Botdrops

Botdrops (a.k.a. Bottomdrops) [8] is a variant of Topswops and is also a one-player card game in which one randomly arranges n cards, numbered 1 to n. Given such an initial sequence of n cards, the player rearranges the sequence as follows. The player first looks at the number written on the bottom card, denoted as k, the player rearranges the first k cards into the reverse order and puts the reversed sub-sequence on the bottom. The player repeats such an operation, which we call a botdrops operation, to the current sequence.
Take (3, 1, 4, 5, 2) as an example of an initial sequence with \(n=5\); then, a player rearranges the sequence as
$$\begin{aligned}&(\underline{3,1},4,5,\textbf{2}) \rightarrow (\underline{4,5,2},1,\textbf{3}) \rightarrow (\underline{1,3,2,5},\textbf{4}) \rightarrow (\underline{4},5,2,3,\textbf{1}) \rightarrow (\underline{5,2,3,1},\textbf{4}) \\&\rightarrow (\underline{4,1,3,2,\textbf{5}}) \rightarrow (\underline{5,2,3,1},\textbf{4}) \rightarrow \cdots , \end{aligned}$$
and the player finds himself/herself in a loop because \((\underline{5,2,3,1},\textbf{4})\) appears again, which leads to a 2-cycle loop of \((\underline{5,2,3,1},\textbf{4})\) and \((\underline{4,1,3,2,\textbf{5}})\). In general, as easily imagined, Botdrops always produces a loop (unlike Topswops). We are now interested in what kinds of cycles appear in Botdrops.
According to Martin Gardner’s book [8], for the case of \(n=13\), “Roland Silver of San Cristobal, N.M., exploring the Botdrops for cycles, discovered why the game usually terminates in a king-queen loop. There are no other 2-cycles and none of 3 and 4. Although 5 cycles exist, the probability of entering one is low.” As Gardner wrote “on rare occasions other loops possible. (Can you find one?)” in the same book [8], finding an initial sequence which leads to a cycle of length more than two is an intriguing and challenging problem6.
Since the above book [8] (introducing Botdrops) was written in 1988, we thought that there would have been many existing results on cycle lengths. However, we cannot find any such known results in the literature. Hence, we first tackle the question of what initial sequences produce a loop of length more than two, and especially, we seek for the longest cycles. Actually, for example, for the case of \(n=13\), we find that (1, 4, 3, 6, 12, 5, 8, 13, 7, 9, 2, 11, 10) produces a cycle of length 30:
$$\begin{aligned}&(\underline{1, 4, 3, 6, 12, 5, 8, 13, 7, 9}, 2, 11, \textbf{10}) \rightarrow (\underline{2}, 11, 10, 9, 7, 13, 8, 5, 12, 6, 3, 4, \textbf{1}) \\ {}&\rightarrow (\underline{11, 10}, 9, 7, 13, 8, 5, 12, 6, 3, 4, 1, \textbf{2}) \rightarrow (\underline{9, 7, 13, 8, 5, 12, 6, 3, 4, 1, 2}, 10, \textbf{11}) \\ {}&\rightarrow (\underline{10, 11, 2, 1, 4, 3, 6, 12, 5}, 8, 13, 7, \textbf{9}) \rightarrow (\underline{8, 13, 7, 9, 5, 12, 6, 3, 4, 1}, 2, 11, \textbf{10}) \\ {}&\rightarrow (\underline{2, 11, 10, 1, 4, 3, 6, 12}, 5, 9, 7, 13, \textbf{8}) \rightarrow (\underline{5, 9}, 7, 13, 8, 12, 6, 3, 4, 1, 10, 11, \textbf{2}) \\ {}&\rightarrow (\underline{7, 13, 8, 12, 6}, 3, 4, 1, 10, 11, 2, 9, \textbf{5}) \rightarrow (\underline{3, 4, 1, 10, 11, 2, 9}, 5, 6, 12, 8, 13, \textbf{7}) \\ {}&\rightarrow (\underline{5, 6, 12}, 8, 13, 7, 9, 2, 11, 10, 1, 4, \textbf{3}) \rightarrow (\underline{8, 13, 7, 9, 2}, 11, 10, 1, 4, 3, 12, 6, \textbf{5}) \\ {}&\rightarrow (\underline{11, 10, 1, 4, 3, 12, 6, 5}, 2, 9, 7, 13, \textbf{8}) \rightarrow (\underline{2, 9, 7, 13, 8, 5, 6, 12, 3, 4, 1}, 10, \textbf{11}) \\ {}&\rightarrow (\underline{10, 11}, 1, 4, 3, 12, 6, 5, 8, 13, 7, 9, \textbf{2}) \rightarrow (\underline{1, 4, 3, 12, 6, 5, 8, 13, 7, 9}, 2, 11, \textbf{10}) \\&\rightarrow (\underline{2}, 11, 10, 9, 7, 13, 8, 5, 6, 12, 3, 4, \textbf{1}) \rightarrow (\underline{11, 10}, 9, 7, 13, 8, 5, 6, 12, 3, 4, 1, \textbf{2}) \\ {}&\rightarrow (\underline{9, 7, 13, 8, 5, 6, 12, 3, 4, 1, 2}, 10, \textbf{11}) \rightarrow (\underline{10, 11, 2, 1, 4, 3, 12, 6, 5}, 8, 13, 7, \textbf{9}) \\ {}&\rightarrow (\underline{8, 13, 7, 9, 5, 6, 12, 3, 4, 1}, 2, 11, \textbf{10}) \rightarrow (\underline{2, 11, 10, 1, 4, 3, 12, 6}, 5, 9, 7, 13, \textbf{8}) \\ {}&\rightarrow (\underline{5, 9}, 7, 13, 8, 6, 12, 3, 4, 1, 10, 11, \textbf{2}) \rightarrow (\underline{7, 13, 8, 6, 12}, 3, 4, 1, 10, 11, 2, 9, \textbf{5}) \\ {}&\rightarrow (\underline{3, 4, 1, 10, 11, 2, 9}, 5, 12, 6, 8, 13, \textbf{7}) \rightarrow (\underline{5, 12, 6}, 8, 13, 7, 9, 2, 11, 10, 1, 4, \textbf{3}) \\ {}&\rightarrow (\underline{8, 13, 7, 9, 2}, 11, 10, 1, 4, 3, 6, 12, \textbf{5}) \rightarrow (\underline{11, 10, 1, 4, 3, 6, 12, 5}, 2, 9, 7, 13, \textbf{8}) \\ {}&\rightarrow (\underline{2, 9, 7, 13, 8, 5 ,12, 6, 3, 4, 1}, 10, \textbf{11}) \rightarrow (\underline{10, 11}, 1, 4, 3, 6, 12, 5, 8, 13, 7, 9, \textbf{2}) \\ {}&\rightarrow (1, 4, 3, 6, 12, 5, 8, 13, 7, 9, 2, 11, 10). \end{aligned}$$
We have investigated the cycle lengths for the case of \(n \le 13\) comprehensively. To display our obtained results, we first introduce some notations. For an initial sequence corresponding to a permutation \(\sigma \in S_n\), denote the length of a loop (i.e., the cycle length) generated from the sequence by \(\beta (\sigma )\). Let \({\mathcal {B}}(n)\) be the set of cycle lengths with n cards, i.e.,
$$\begin{aligned} {\mathcal {B}}(n):= \{\beta (\sigma ) \;|\; \sigma \in S_n\}. \end{aligned}$$
Let h(n) be the maximum number in \({\mathcal {B}}(n)\), i.e.,
$$\begin{aligned} {h}(n):= \max ({\mathcal {B}}(n)). \end{aligned}$$
Tables 2 and 3 show \({\mathcal {B}}(n)\) and h(n) for \(n=1,2, {\ldots }, 13\), respectively. Interestingly, there are loops with other than 2-cycles or 5-cycles for \(n=13\), and the maximum length h(n) for n seems to vary irregularly. The sets \({\mathcal {B}}(n)\) are also interesting; for example, \({\mathcal {B}}(10) \subset {\mathcal {B}}(11)\) while \({\mathcal {B}}(11) \not \subset {\mathcal {B}}(12)\). Such properties would make it difficult to find an initial sequence which produces the longest cycle.
Table 2
Values of \({\mathcal {B}}(n)\) for Botdrops
n
\({\mathcal {B}}(n)\)
1
1
2 – 6
2
7
2, 5
8
2, 5, 10
9
2, 5, 12
10
2, 5, 10, 20
11
2, 5, 8, 9, 10, 12, 20
12
2, 5, 8, 10, 12, 20, 30
13
2, 5, 6, 8, 9, 10, 12, 16, 20, 24, 30
Table 3
Values of h(n) for Botdrops
n
1
2
3
4
5
6
7
8
9
10
11
12
13
h(n)
1
2
2
2
2
2
5
10
12
20
20
30
30
As in the case of Topswops explained in Sect. 1.1, there are possible situations where it is invaluable that only a single person knows a particular initial sequence (and its cycle length) while the others do not know anything about it. This is a motivation that we construct a zero-knowledge proof protocol for Botdrops.

4.2 Commitment for Botdrops

In this subsection, we first define permutations corresponding to the botdrops operations (appearing in Botdrops). We then define commitments for Botdrops. In the sequel, let n denote the Botdrops size (namely, the number of elements in an initial sequence).
Using a permutation in \(S_n\), let us represent each botdrops operation in Botdrops, which rearranges the first i cards in their reverse order and moves them to the bottom: Define a permutation \(\textsf{bd}_i \in S_n\) for every i, \(1\le i\le n\), as
$$\begin{aligned} \textsf{bd}_i=\left( \begin{array}{ccccccccccccc} 1 &{} 2 &{} \cdots &{} i-1 &{} i &{} i+1 &{} i+2 &{} \cdots &{} n-1 &{} n \\ n &{} n-1 &{} \cdots &{} n-i+2 &{} n-i+1 &{} 1 &{} 2 &{} \cdots &{} n-i-1 &{} n-i \end{array} \right) . \end{aligned}$$
Unlike https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq175_HTML.gif , note that \(\textsf{bd}_i\) is not equal to its inverse permutation \(\textsf{bd}_i^{-1}\).
Similar to the protocol for Topswops, for an integer x such that \(1\le x\le n\), we call a sequence of n face-down cards
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ40_HTML.png
a bd-commitment to x.

4.3 Goal and Idea

Assume that n and \(\ell \) (such that \(2 \le \ell \le {h}(n)\)) are public information, and that a prover wants to convince a verifier that the prover knows an initial sequence \(\sigma \) such that \(\beta (\sigma )=\ell \). Without loss of generality, we assume that the initial sequence \(\sigma \) immediately falls into an \(\ell \)-cycle loop at the beginning.
At first glance, a zero-knowledge proof protocol seems to be naturally derived, in a similar way to the protocol for Topswops (namely, Protocol 2), by arranging bd-commitments to from 1 to n and permuting them based on the bottom bd-commitment \(\ell \) times. However, a protocol for Botdrops needs to check that the transition surely forms a loop (of length \(\ell \)). To this end, it suffices to verify that the final sequence is identical to the initial sequence as well as every other sequence is not the same as the initial sequence.
Let us explain the overall flow of our protocol. Similar to Protocol 2, first, a prover and a verifier arrange a sequence of bd-commitments corresponding to the initial sequence \(\sigma \in S_n\) somehow:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ41_HTML.png
Unlike the protocol for Topswops in which the first card indicates the amount of a prefix reversal, in Botdrops, the bottom card indicates the size of a botdrops operation. Therefore, using the last bd-commitment to \(\sigma (n)\), we secretly apply the permutation \(\textsf{bd}_x\) to the sequence, where \(x=\sigma (n)\):
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ42_HTML.png
We repeatedly apply such a transformation \(\ell \) times, in a similar way to Protocol 2.
As mentioned above, we have to check that the final sequence, namely the \(\ell \)-th sequence, is identical to the initial sequence and every other sequence, namely every i-th sequence with \(1 \le i< \ell \), is not the same as the initial sequence. To this end, we attach a tag-commitment to each bd-commitment, as illustrated below:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ43_HTML.png
Here, each tag-commitment represents the same value as that of the bd-commitment below it. During the botdrops operations, we make each tag-commitment follow the corresponding bd-commitment. Thus, instead of bd-commitments, we use such tag-commitments to check that the transition surely forms an \(\ell \)-cycle loop.
If we attempt to use numbered cards as tag-commitments, it seems difficult to verify whether given two tag-commitments (or two sequences of tag-commitments) are identical without leaking any information other than that. Therefore, we consider making use of the typical encoding rule used in card-based cryptography [45, 74]: we use black and red cards to represent a one-bit value:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ44_HTML.png
We call two face-down cards following the above encoding a bit-commitment. Since we have to prepare n tag-commitments corresponding to integers from 1 to n, we use \(2 \lceil \log _2 n \rceil \) cards to make each tag-commitment, as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ45_HTML.png
Thus, we attach such a sequence of bit-commitments as a tag-commitment to each bd-commitment:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ46_HTML.png

4.4 Sub-protocols

To construct a zero-knowledge proof protocol for Botdrops, we require a way for checking whether two sequences of tag-commitments are identical or not. For this, in this subsection, we present two sub-protocols along with a general copy protocol.
We first prepare a bit-wise check sub-protocol. Given two bit-commitments https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq196_HTML.gif and https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq197_HTML.gif to bits a and b, respectively, let us introduce a sub-protocol which outputs (copies of) bit-commitments to ab as well as a bit-commitment to \(a \oplus b \oplus 1\). Note that \(a \oplus b \oplus 1=1\) if \(a=b\) holds; otherwise, \(a \oplus b \oplus 1=0\). This sub-protocol is based on the existing bit-commitment copy protocol [75] together with the idea behind the existing input-preserving XOR protocol for polarizing cards [76]. The following sub-protocol uses four additional cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq202_HTML.gif aside from two input bit-commitments to \(a,b\in \{0,1\}\).
Protocol 3
(\(\textsf{Sub}\)-\(\textsf{protocol}_1\)
1.
Place https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq206_HTML.gif and bit-commitments to ab, and turn over the additional cards, as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ47_HTML.png
 
2.
Apply a pile-scramble shuffle to the first three rows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ48_HTML.png
where \(r\in \{0,1\}\) is a uniformly distributed random bit.
 
3.
Turn over the cards in the third row. If https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq208_HTML.gif appears, swap the cards in the first through third rows (namely, bit-commitments) and turn over the cards in the third row to be face-down. Otherwise, do nothing. Then, we have:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ49_HTML.png
 
4.
After turning over the cards in the third row, apply a pile-scramble shuffle to the last three rows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ50_HTML.png
 
5.
Turn over the cards in the fourth row. If https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq209_HTML.gif appears, swap cards in the second through fourth rows. Otherwise, do nothing. Then, we have:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ51_HTML.png
 
6.
Swap the cards in the second row, resulting in:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ52_HTML.png
 
We next introduce the second sub-protocol which checks whether two sequences of tag-commitments are identical or not. Given two sequences of tag-commitments A and B each consisting of 2mn cards as inputs, the following sub-protocol returns ‘true’ or ‘false’ using six additional cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq210_HTML.gif  , where \(m:= \lceil \log _2 n \rceil \) in the sequel.
Protocol 4
(\(\textsf{Sub}\)-\(\textsf{protocol}_2\)
1.
Place additional cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq214_HTML.gif and turn over them to be face-down. We call this bit-commitment ans:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ53_HTML.png
 
2.
Repeat the following Steps 2(a) and 2(b) for \(i = 1, 2, {\ldots }, n\).
(a)
Pick the i-th tag-commitments of A and B each consisting of 2m cards:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ54_HTML.png
 
(b)
Repeat the following Steps 2(b)(i) through 2(b)(iv) for \(j=1,2, \ldots , m\).
(i)
Pick the jth bit-commitments from both the tag-commitments; name them bit-commitments to a and b:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ55_HTML.png
 
(ii)
Run \(\textsf{Sub}\)-\(\textsf{protocol}_1\) with the above two bit-commitments to obtain copies of the two bit-commitments to \(a, b \in \{0,1\}\) along with a bit-commitment to \(a \oplus b \oplus 1\), which is referred to as match. We also obtain two free cards .
 
(iii)
Place the copies of two bit-commitments back to each of the i-th tag-commitments of A and B.
 
(iv)
Using the existing committed-format AND protocol [75] requiring two additional cards, update ans with a secure computation of \(ans \wedge match \). After applying one more shuffle to the unused bit-commitment [77], we have four free cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq223_HTML.gif  .
 
 
 
3.
Turn over the cards for ans, and return ‘true’ if https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq224_HTML.gif appears. Otherwise, return ‘false.’
 
Finally, we introduce the general copy protocol [36]. The copy protocol presented in Sect. 3.2 makes copies of a commitment \(\sigma \) satisfying \(\sigma ^{-1}=\sigma \). However, a bd-commitment in our protocol for Botdrops does not satisfy \(\sigma ^{-1}=\sigma \). Therefore, the following general copy protocol is required.
Protocol 5
(General copy protocol [36])
(a)
All cards of a bd-commitment and additional numbered cards are placed as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ56_HTML.png
 
(b)
Turn over the cards in the first row and apply a pile-scramble shuffle:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ57_HTML.png
Then, a uniformly distributed random permutation \(r\in S_n\) corresponding to this pile-scramble shuffle occurs, and the resulting cards can be represented as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ58_HTML.png
 
(c)
Turn over all the cards in the second row. If cards of 1 through n appear without omission, place cards of the same number in the third row. Then, turn over all cards in the second and third rows, resulting in the following:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ59_HTML.png
 
(d)
Apply a pile-scramble shuffle:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ60_HTML.png
Then, a uniformly distributed random permutation \(r'\in S_n\) corresponding to this pile-scramble shuffle occurs, and the resulting cards can be represented as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ61_HTML.png
 
(e)
Turn over all the cards in the first row, and sort the piles so that the revealed numbered cards are in ascending order, resulting in the following:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ62_HTML.png
Hence, two copies of the bd-commitment are obtained in the second and third rows.
 

4.5 Our Protocol for Botdrops

In this subsection, we present our zero-knowledge proof protocol for Botdrops.
According to an initial sequence \(\sigma \) such that \(\beta (\sigma )=\ell \), the prover P places n face-down cards on the table without anyone seeing the order as
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ63_HTML.png
The input to our protocol is the above sequence along with additional \((n+2)\) cards from each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq233_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq234_HTML.gif and \((2mn+3)\) cards each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq236_HTML.gif and https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq237_HTML.gif  . (The protocol may be executed by a prover or a verifier, or even by a third party.)
Protocol 6
(Physical zero-knowledge proof protocol for Botdrops) 
1.
Using 2mn pairs of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq238_HTML.gif and https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq239_HTML.gif  , make two identical tag-commitments to every number from 1 to n:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ64_HTML.png
 
2.
Using n number cards of each from https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq240_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq241_HTML.gif from the additional cards, make a bd-commitment to each of 1 through n. Place them above the input sequence. Moreover, place the tag-commitments (made in Step 1) above them as follows:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ65_HTML.png
 
3.
Apply a pile-scramble shuffle:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ66_HTML.png
 
4.
In the manner of the sort sub-protocol described in Sect. 2.4, turn over and sort the cards in the bottom row so that the cards in the bottom row are in ascending order:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ67_HTML.png
(If any card from 1 to n does not appear in the bottom row, the protocol halts.) Put the first row (namely, a sequence of tag-commitments corresponding to \(\sigma \)) aside, which will be used as the initial sequence when checking whether a succeeding sequence is the same or not. Set \(\pi := \sigma \).
 
5.
Repeat following Steps 5(a) to 5(c) for \(i = 1, 2, \ldots , \ell \).
(a)
We have two number cards each from https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq245_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq246_HTML.gif (i.e., the cards revealed in Step 4 or 5(b) below and the remaining additional cards not used in Step 2). Using these as additional cards, copy the last bd-commitment, \(\pi (n)\), by executing the general copy protocol described in Sect. 4.4 and place it below the sequence of bd-commitments. Hereinafter, we use x for \(\pi (n)\) in subscripts for simplicity:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ68_HTML.png
(If an illegal card appears during the copy protocol, the protocol halts.)
 
(b)
Apply a pile-scramble shuffle, turn over the cards in the bottom row, and sort the cards in the bottom row in ascending order:
https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_Equ69_HTML.png
After this operation, the second row is a sequence of bd-commitments where the order of the first x bd-commitments was reversed and moved to the bottom, i.e., the botdrops operation \(\textsf{bd}_x\) has been applied to the previous sequence of bd-commitments. (If any card from 1 to n does not appear, the protocol aborts.) Set \(\pi := \textsf{bd}_x \circ \pi \).
 
(c)
If \(\ell \) is divisible by i, check whether the current sequence of tag-commitments is identical to that of the initial sequence or not: Run \(\textsf{Sub}\)-\(\textsf{protocol}_2\) described in Sect. 4.4 with the current sequence and the sequence of tag-commitments corresponding to \(\sigma \) (made in Step 4). If they are identical and \(i < \ell \), the protocol aborts. When \(i = \ell \), if they are identical, return ‘accept.’ Otherwise, return ‘reject.’
 
 
In Step 5(c) above, we use \(\textsf{Sub}\)-\(\textsf{protocol}_2\) to check whether a current sequence of tag-commitments for each i is identical to that of the initial sequence or not. Note that \(\textsf{Sub}\)-\(\textsf{protocol}_2\) checks only two sequences of tag-commitments, we can check all sequences of tag-commitments for \(i=1,2,\ldots , \ell \) sequentially. (It should be noted that Botdrops produces exactly one loop for any initial sequence, and hence, a loop never contains a smaller loop within it.) Also note that, we can modify \(\textsf{Sub}\)-\(\textsf{protocol}_2\) to another sub-protocol which checks all sequences of tag-commitments at once, but, in this case, each sequence of tag-commitments should be stored and the number of required cards increases.

4.6 Security and Performance

We first prove that our protocol is a zero-knowledge proof protocol.
Completeness: Suppose that a prover P correctly places as input a sequence of n cards encoding an initial sequence \(\sigma \in S_n\) such that \(\beta (\sigma )=\ell \). Then, as can be seen from the construction of the protocol, the sequence is not rejected at any step, but accepted at the final step.
Soundness: Assume that an input sequence of n cards is not the encoding of an initial sequence \(\sigma \) producing an \(\ell \)-cycle. There are four cases to consider; we will show that the protocol eventually rejects each.
(i)
If the input sequence is not encoded for any initial sequence, for example, an input sequence consists of n https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq268_HTML.gif ’s, such an invalid input sequence is detected and rejected because not every card from 1 to n appears when the cards are turned up in Step 4.
 
(ii)
If the input sequence is not an origin of a loop, the \(\ell \)-th sequence is never the same as the input sequence, and hence, such an invalid input sequence does not pass the check in Step 5(c) for \(i=\ell \).
 
(iv)
Suppose that the input sequence produces an \(\ell '~(< \ell )\)-cycle loop. In order for a malicious P to cheat that the input sequence leads to an \(\ell \)-cycle loop, \(\ell \) should be multiple of \(\ell '\). However, such a cheat is detected in Step 5(c) for \(i=\ell '\) because the initial sequence is the same as the current sequence for \(i=\ell '\).
 
(v)
If the input sequence produces an \(\ell '~(> \ell )\)-cycle loop, such an invalid input sequence does not pass the check in Step 5(c) for \(i=\ell \) because the input sequence is different from the current sequence for \(i=\ell \).
 
Zero knowledge: Suppose that the sequence set by prover P corresponds to \(\sigma \in S_n\) such that \(\beta (\sigma )=\ell \). During the protocol (except for the final step), no information about \(\sigma \) is leaked because the order of revealed cards https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq283_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq284_HTML.gif is always randomized by a pile-scramble shuffle, which is applied immediately before the cards are turned over. In addition, sub-protocols \(\textsf{Sub}\)-\(\textsf{protocol}_1\) and \(\textsf{Sub}\)-\(\textsf{protocol}_2\) which check whether two sequences of tag-commitments are identical or not are also zero-knowledge protocols and leak no information of tags. Thus, the proposed protocol is information-theoretically secure.
We then discuss the performance of our protocol by counting the number of cards and the number of shuffles required in our protocol.
Regarding the number of cards, as described at the beginning of Sect. 4.5, we use \((n+2)\) cards from each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq290_HTML.gif to https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq291_HTML.gif and \((2mn+3)\) colored cards of each of https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq293_HTML.gif and https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00272-3/MediaObjects/354_2024_272_IEq294_HTML.gif  . Thus, the total number of cards required in our protocol is \(n^2+4mn+2n+6\).
Our protocol uses the pile-scramble shuffle and the random bisection cut (within the AND protocol at Step 2(b)(iv) of Protocol 4) as shuffling operations. Note that the random bisection cut is a special case of the pile-scramble shuffle. In our protocol, Step 3 is executed once, Steps 5(a) and 5(b) are repeated \(\ell \) times, and Steps 5(c) is executed \(d(\ell )\) times where \(d(\ell )\) represents the number of divisors for integer \(\ell \). Step 5(a) and 5(b) include two pile-scramble shuffles (Steps 2 and 4 in Protocol 5) and one pile-scramble shuffle, respectively. Step 5(c) includes 2mn pile-scramble shuffles (Step 2(b)(ii) of Protocol 4) and 2mn random bisection cuts (Step 2(b)(iv) of Protocol 4). Hence, our protocol requires \(4mn d(\ell )+3\ell +1\) shuffles in total.

5 Conclusion

In this paper, we proposed a physical zero-knowledge proof protocol for Topswops. The main idea is that the permutation corresponding to “the operation of reversing the first i cards” encodes a positive integer i, which enables us to efficiently and secretly perform prefix reversals in Topswops. The main idea can be applicable to construct a zero-knowledge proof protocol for other problems, such as the pancake sorting problem [44].
In addition, we rediscovered Botdrops, which is a variant of Topswops; after investigating the cycle lengths, we proposed a physical zero-knowledge proof protocol for Botdrops. Unlike the protocol for Topswops, the protocol for Botdrops requires tag-commitments. The tag-commitments are used to check that the transition in the game surely forms a loop while this check should be zero-knowledge. To this end, we proposed sub-protocols. Constructing more efficient protocols is future work.

Acknowledgements

This work was supported by JSPS KAKENHI Grant numbers JP18H05289, JP21K11881, JP23H00479, JP24K14951, JP24K02938.

Declarations

Conflict of interest

This work was supported by JSPS KAKENHI Grant Numbers JP18H05289, JP21K11881, JP23H00479, JP24K14951, JP24K02938. Takaaki Mizuki is a Guest Editor-in-Chief of this special issue of the journal.

Ethical approval

This article does not contain any studies with human participants or animals performed by any of the authors.
Not applicable.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Fußnoten
3
According to Zimmermann’s Programming Contests (http://​azspcs.​com/​Contest/​Cards/​FinalReport, accessed 16 Aug 2022), four initial sequences which require 221 steps for \(n=19\) were discovered in 2011. Hence, it seems that at that time the lower bounds on f(19) and g(19) were known to be 221 and 4, respectively.
 
4
At the present moment, of course, it is unknown whether such an initial sequence exists, i.e. whether \(f(20) \ge 250\) or \(f(20)=249\).
 
5
More precisely, it is specified as a card-based protocol formulated in the standard model of card-based cryptography [45, 69]. (Note that there are other models, e.g. [7073].)
 
6
A king-queen loop (which appears in the book [8]) means a loop of two sequences: a sequence whose leftmost card is King (\(=13\)) and a sequence whose leftmost card is Queen (\(=12\)).
 
Literatur
1.
Zurück zum Zitat Komano, Y., Mizuki, T.: Physical zero-knowledge proof protocol for topswops. In: Su, C., Gritzalis, D., Piuri, V. (eds.) Information Security Practice and Experience—17th International Conference, ISPEC 2022. Lecture Notes in Computer Science, vol. 13620, pp. 537–553. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21280-2_30 Komano, Y., Mizuki, T.: Physical zero-knowledge proof protocol for topswops. In: Su, C., Gritzalis, D., Piuri, V. (eds.) Information Security Practice and Experience—17th International Conference, ISPEC 2022. Lecture Notes in Computer Science, vol. 13620, pp. 537–553. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-21280-2_​30
4.
Zurück zum Zitat Knuth, D.E.: The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations (Art of Computer Programming). Addison-Wesley Professional (2005) Knuth, D.E.: The Art of Computer Programming, Volume 4, Fascicle 2: Generating All Tuples and Permutations (Art of Computer Programming). Addison-Wesley Professional (2005)
5.
6.
8.
Zurück zum Zitat Gardner, M.: Time Travel And Other Mathematical Bewilderments. W.H. Freeman and Company, New York (1988) Gardner, M.: Time Travel And Other Mathematical Bewilderments. W.H. Freeman and Company, New York (1988)
9.
Zurück zum Zitat Fukasawa, T., Manabe, Y.: Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABCend view. In: Batina, L., Picek, S., Mondal, M. (eds.) Security, Privacy, and Applied Cryptography Engineering. LNCS, vol. 13783, pp. 147–161. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-22829-2_9 Fukasawa, T., Manabe, Y.: Card-based zero-knowledge proof for the nearest neighbor property: Zero-knowledge proof of ABCend view. In: Batina, L., Picek, S., Mondal, M. (eds.) Security, Privacy, and Applied Cryptography Engineering. LNCS, vol. 13783, pp. 147–161. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-22829-2_​9
10.
11.
Zurück zum Zitat Bultel, X., Dreier, J., Dumas, J.-G., Lafourcade, P.: Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen. In: Demaine, E.D., Grandoni, F. (eds.) Fun with Algorithms. LIPIcs, vol. 49, pp. 8:1-8:20. Schloss Dagstuhl, Dagstuhl, Germany (2016). https://doi.org/10.4230/LIPIcs.FUN.2016.8 Bultel, X., Dreier, J., Dumas, J.-G., Lafourcade, P.: Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen. In: Demaine, E.D., Grandoni, F. (eds.) Fun with Algorithms. LIPIcs, vol. 49, pp. 8:1-8:20. Schloss Dagstuhl, Dagstuhl, Germany (2016). https://​doi.​org/​10.​4230/​LIPIcs.​FUN.​2016.​8
13.
Zurück zum Zitat Isuzugawa, R., Miyahara, D., Mizuki, T.: Zero-knowledge proof protocol for Cryptarithmetic using dihedral cards. In: Kostitsyna, I., Orponen, P. (eds.) Unconventional Computation and Natural Computation. LNCS, vol. 12984, pp. 51–67. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-87993-8_4 Isuzugawa, R., Miyahara, D., Mizuki, T.: Zero-knowledge proof protocol for Cryptarithmetic using dihedral cards. In: Kostitsyna, I., Orponen, P. (eds.) Unconventional Computation and Natural Computation. LNCS, vol. 12984, pp. 51–67. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-87993-8_​4
15.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Physical ZKP protocols for Nurimisaki and Kurodoko. Theor. Comput. Sci. 972, 114071 (2023)MathSciNetCrossRef Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Physical ZKP protocols for Nurimisaki and Kurodoko. Theor. Comput. Sci. 972, 114071 (2023)MathSciNetCrossRef
16.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical ZKP for connected spanning subgraph: applications to Bridges puzzle and other problems. In: Kostitsyna, I., Orponen, P. (eds.) Unconventional Computation and Natural Computation, pp. 149–163. Springer, Cham (2021)CrossRef Ruangwises, S., Itoh, T.: Physical ZKP for connected spanning subgraph: applications to Bridges puzzle and other problems. In: Kostitsyna, I., Orponen, P. (eds.) Unconventional Computation and Natural Computation, pp. 149–163. Springer, Cham (2021)CrossRef
17.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Card-based ZKP for connectivity: Applications to Nurikabe, Hitori, and Heyawake. New Gener. Comput. 40, 149–171 (2022)CrossRef Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Card-based ZKP for connectivity: Applications to Nurikabe, Hitori, and Heyawake. New Gener. Comput. 40, 149–171 (2022)CrossRef
18.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Interactive physical ZKP for connectivity: Applications to Nurikabe and Hitori. In: De Mol, L., Weiermann, A., Manea, F., Fernández-Duque, D. (eds.) Connecting with Computability. LNCS, vol. 12813, pp. 373–384. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-80049-9_37 Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Interactive physical ZKP for connectivity: Applications to Nurikabe and Hitori. In: De Mol, L., Weiermann, A., Manea, F., Fernández-Duque, D. (eds.) Connecting with Computability. LNCS, vol. 12813, pp. 373–384. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-80049-9_​37
19.
Zurück zum Zitat Miyahara, D., Robert, L., Lafourcade, P., Takeshige, S., Mizuki, T., Shinagawa, K., Nagao, A., Sone, H.: Card-based ZKP protocols for Takuzu and Juosan. In: Farach-Colton, M., Prencipe, G., Uehara, R. (eds.) Fun with Algorithms. LIPIcs, vol. 157, pp. 20:1-20:21. Schloss Dagstuhl, Dagstuhl, Germany (2020). https://doi.org/10.4230/LIPIcs.FUN.2021.20 Miyahara, D., Robert, L., Lafourcade, P., Takeshige, S., Mizuki, T., Shinagawa, K., Nagao, A., Sone, H.: Card-based ZKP protocols for Takuzu and Juosan. In: Farach-Colton, M., Prencipe, G., Uehara, R. (eds.) Fun with Algorithms. LIPIcs, vol. 157, pp. 20:1-20:21. Schloss Dagstuhl, Dagstuhl, Germany (2020). https://​doi.​org/​10.​4230/​LIPIcs.​FUN.​2021.​20
20.
Zurück zum Zitat Miyahara, D., Sasaki, T., Mizuki, T., Sone, H.: Card-based physical zero-knowledge proof for Kakuro. IEICE Trans. Fundam. 102(9), 1072–1078 (2019)CrossRef Miyahara, D., Sasaki, T., Mizuki, T., Sone, H.: Card-based physical zero-knowledge proof for Kakuro. IEICE Trans. Fundam. 102(9), 1072–1078 (2019)CrossRef
21.
Zurück zum Zitat Bultel, X., Dreier, J., Dumas, J., Lafourcade, P., Miyahara, D., Mizuki, T., Nagao, A., Sasaki, T., Shinagawa, K., Sone, H.: Physical zero-knowledge proof for Makaro. In: Izumi, T., Kuznetsov, P. (eds.) Stabilization, Safety, and Security of Distributed Systems. LNCS, vol. 11201, pp. 111–125 (2018). https://doi.org/10.1007/978-3-030-03232-6_8 Bultel, X., Dreier, J., Dumas, J., Lafourcade, P., Miyahara, D., Mizuki, T., Nagao, A., Sasaki, T., Shinagawa, K., Sone, H.: Physical zero-knowledge proof for Makaro. In: Izumi, T., Kuznetsov, P. (eds.) Stabilization, Safety, and Security of Distributed Systems. LNCS, vol. 11201, pp. 111–125 (2018). https://​doi.​org/​10.​1007/​978-3-030-03232-6_​8
23.
Zurück zum Zitat Lafourcade, P., Miyahara, D., Mizuki, T., Robert, L., Sasaki, T., Sone, H.: How to construct physical zero-knowledge proofs for puzzles with a “single loop’’ condition. Theor. Comput. Sci. 888, 41–55 (2021)MathSciNetCrossRef Lafourcade, P., Miyahara, D., Mizuki, T., Robert, L., Sasaki, T., Sone, H.: How to construct physical zero-knowledge proofs for puzzles with a “single loop’’ condition. Theor. Comput. Sci. 888, 41–55 (2021)MathSciNetCrossRef
24.
Zurück zum Zitat Hand, S., Koch, A., Lafourcade, P., Miyahara, D., Robert, L.: Check alternating patterns: A physical zero-knowledge proof for Moon-or-Sun. In: Shikata, J., Kuzuno, H. (eds.) Advances in Information and Computer Security. LNCS, vol. 14128, pp. 255–272. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-41326-1_14 Hand, S., Koch, A., Lafourcade, P., Miyahara, D., Robert, L.: Check alternating patterns: A physical zero-knowledge proof for Moon-or-Sun. In: Shikata, J., Kuzuno, H. (eds.) Advances in Information and Computer Security. LNCS, vol. 14128, pp. 255–272. Springer, Cham (2023). https://​doi.​org/​10.​1007/​978-3-031-41326-1_​14
27.
28.
Zurück zum Zitat Dumas, J.-G., Lafourcade, P., Miyahara, D., Mizuki, T., Sasaki, T., Sone, H.: Interactive physical zero-knowledge proof for Norinori. In: Du, D.-Z., Duan, Z., Tian, C. (eds.) Computing and Combinatorics. LNCS, vol. 11653, pp. 166–177. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-26176-4_14 Dumas, J.-G., Lafourcade, P., Miyahara, D., Mizuki, T., Sasaki, T., Sone, H.: Interactive physical zero-knowledge proof for Norinori. In: Du, D.-Z., Duan, Z., Tian, C. (eds.) Computing and Combinatorics. LNCS, vol. 11653, pp. 166–177. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-26176-4_​14
30.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for Numberlink puzzle and k vertex-disjoint paths problem. New Gener. Comput. 39(1), 3–17 (2021)CrossRef Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for Numberlink puzzle and k vertex-disjoint paths problem. New Gener. Comput. 39(1), 3–17 (2021)CrossRef
31.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Card-based ZKP protocol for Nurimisaki. In: Devismes, S., Petit, F., Altisen, K., Di Luna, G.A., Fernandez Anta, A. (eds.) Stabilization, Safety, and Security of Distributed Systems. LNCS, vol. 13751, pp. 285–298. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21017-4_19 Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Card-based ZKP protocol for Nurimisaki. In: Devismes, S., Petit, F., Altisen, K., Di Luna, G.A., Fernandez Anta, A. (eds.) Stabilization, Safety, and Security of Distributed Systems. LNCS, vol. 13751, pp. 285–298. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-21017-4_​19
33.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for Ripple effect. Theor. Comput. Sci. 895, 115–123 (2021)MathSciNetCrossRef Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for Ripple effect. Theor. Comput. Sci. 895, 115–123 (2021)MathSciNetCrossRef
35.
Zurück zum Zitat Lafourcade, P., Miyahara, D., Mizuki, T., Sasaki, T., Sone, H.: A physical ZKP for Slitherlink: How to perform physical topology-preserving computation. In: Heng, S.-H., Lopez, J. (eds.) Information Security Practice and Experience. LNCS, vol. 11879, pp. 135–151. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34339-2_8 Lafourcade, P., Miyahara, D., Mizuki, T., Sasaki, T., Sone, H.: A physical ZKP for Slitherlink: How to perform physical topology-preserving computation. In: Heng, S.-H., Lopez, J. (eds.) Information Security Practice and Experience. LNCS, vol. 11879, pp. 135–151. Springer, Cham (2019). https://​doi.​org/​10.​1007/​978-3-030-34339-2_​8
37.
Zurück zum Zitat Sasaki, T., Miyahara, D., Mizuki, T., Sone, H.: Efficient card-based zero-knowledge proof for Sudoku. Theor. Comput. Sci. 839, 135–142 (2020)MathSciNetCrossRef Sasaki, T., Miyahara, D., Mizuki, T., Sone, H.: Efficient card-based zero-knowledge proof for Sudoku. Theor. Comput. Sci. 839, 135–142 (2020)MathSciNetCrossRef
38.
Zurück zum Zitat Ruangwises, S.: Two standard decks of playing cards are sufficient for a ZKP for Sudoku. New Gener. Comput. 40, 49–65 (2022)CrossRef Ruangwises, S.: Two standard decks of playing cards are sufficient for a ZKP for Sudoku. New Gener. Comput. 40, 49–65 (2022)CrossRef
41.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Physical zero-knowledge proof for Suguru puzzle. In: Devismes, S., Mittal, N. (eds.) Stabilization, Safety, and Security of Distributed Systems. LNCS, vol. 12514, pp. 235–247. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-64348-5_19 Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Physical zero-knowledge proof for Suguru puzzle. In: Devismes, S., Mittal, N. (eds.) Stabilization, Safety, and Security of Distributed Systems. LNCS, vol. 12514, pp. 235–247. Springer, Cham (2020). https://​doi.​org/​10.​1007/​978-3-030-64348-5_​19
42.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Libralesso, L., Mizuki, T.: Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle. Inf. Comput. 285, 1–14 (2021). (In Press)MathSciNet Robert, L., Miyahara, D., Lafourcade, P., Libralesso, L., Mizuki, T.: Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle. Inf. Comput. 285, 1–14 (2021). (In Press)MathSciNet
43.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Hide a liar: Card-based ZKP protocol for Usowan. In: Du, D.-Z., Du, D., Wu, C., Xu, D. (eds.) Theory and Applications of Models of Computation. LNCS, vol. 13571, pp. 201–217. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-20350-3_17 Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Hide a liar: Card-based ZKP protocol for Usowan. In: Du, D.-Z., Du, D., Wu, C., Xu, D. (eds.) Theory and Applications of Models of Computation. LNCS, vol. 13571, pp. 201–217. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-20350-3_​17
44.
Zurück zum Zitat Komano, Y., Mizuki, T.: Card-based zero-knowledge proof protocol for pancake sorting. In: Bella, G., Doinea, M., Janicke, H. (eds.) Innovative Security Solutions for Information Technology and Communications. LNCS, vol. 13809, pp. 222–239. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-32636-3_13 Komano, Y., Mizuki, T.: Card-based zero-knowledge proof protocol for pancake sorting. In: Bella, G., Doinea, M., Janicke, H. (eds.) Innovative Security Solutions for Information Technology and Communications. LNCS, vol. 13809, pp. 222–239. Springer, Cham (2023). https://​doi.​org/​10.​1007/​978-3-031-32636-3_​13
45.
Zurück zum Zitat Mizuki, T., Shizuya, H.: Computational model of card-based cryptographic protocols and its applications. IEICE Trans. Fundam. E100.A(1), 3–11 (2017)CrossRef Mizuki, T., Shizuya, H.: Computational model of card-based cryptographic protocols and its applications. IEICE Trans. Fundam. E100.A(1), 3–11 (2017)CrossRef
48.
Zurück zum Zitat Mizuki, T.: Preface: special issue on card-based cryptography. New Gener. Comput. 39, 1–2 (2021)CrossRef Mizuki, T.: Preface: special issue on card-based cryptography. New Gener. Comput. 39, 1–2 (2021)CrossRef
49.
Zurück zum Zitat Mizuki, T.: Preface: special issue on card-based cryptography 2. New Gener. Comput. 40, 47–48 (2022)CrossRef Mizuki, T.: Preface: special issue on card-based cryptography 2. New Gener. Comput. 40, 47–48 (2022)CrossRef
50.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Securely computing the n-variable equality function with 2n cards. Theor. Comput. Sci. 887, 99–110 (2021)MathSciNetCrossRef Ruangwises, S., Itoh, T.: Securely computing the n-variable equality function with 2n cards. Theor. Comput. Sci. 887, 99–110 (2021)MathSciNetCrossRef
51.
Zurück zum Zitat Shikata, H., Toyoda, K., Miyahara, D., Mizuki, T.: Card-minimal protocols for symmetric Boolean functions of more than seven inputs. In: Seidl, H., Liu, Z., Pasareanu, C.S. (eds.) Theoretical Aspects of Computing—ICTAC 2022. LNCS, vol. 13572, pp. 388–406. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17715-6_25 Shikata, H., Toyoda, K., Miyahara, D., Mizuki, T.: Card-minimal protocols for symmetric Boolean functions of more than seven inputs. In: Seidl, H., Liu, Z., Pasareanu, C.S. (eds.) Theoretical Aspects of Computing—ICTAC 2022. LNCS, vol. 13572, pp. 388–406. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-17715-6_​25
52.
Zurück zum Zitat Mizuki, T., Komano, Y.: Information leakage due to operative errors in card-based protocols. Inf. Comput. 285, 104910 (2022)MathSciNetCrossRef Mizuki, T., Komano, Y.: Information leakage due to operative errors in card-based protocols. Inf. Comput. 285, 104910 (2022)MathSciNetCrossRef
53.
Zurück zum Zitat Miyamoto, K., Shinagawa, K.: Graph automorphism shuffles from pile-scramble shuffles. New Gener. Comput. 40, 199–223 (2022)CrossRef Miyamoto, K., Shinagawa, K.: Graph automorphism shuffles from pile-scramble shuffles. New Gener. Comput. 40, 199–223 (2022)CrossRef
54.
Zurück zum Zitat Haga, R., Toyoda, K., Shinoda, Y., Miyahara, D., Shinagawa, K., Hayashi, Y., Mizuki, T.: Card-based secure sorting protocol. In: Cheng, C.-M., Akiyama, M. (eds.) Advances in Information and Computer Security. LNCS, vol. 13504, pp. 224–240. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-15255-9_12 Haga, R., Toyoda, K., Shinoda, Y., Miyahara, D., Shinagawa, K., Hayashi, Y., Mizuki, T.: Card-based secure sorting protocol. In: Cheng, C.-M., Akiyama, M. (eds.) Advances in Information and Computer Security. LNCS, vol. 13504, pp. 224–240. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-15255-9_​12
55.
Zurück zum Zitat Haga, R., Hayashi, Y., Miyahara, D., Mizuki, T.: Card-minimal protocols for three-input functions with standard playing cards. In: Batina, L., Daemen, J. (eds.) Progress in Cryptology—AFRICACRYPT 2022. LNCS, vol. 13503, pp. 448–468. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-17433-9_19 Haga, R., Hayashi, Y., Miyahara, D., Mizuki, T.: Card-minimal protocols for three-input functions with standard playing cards. In: Batina, L., Daemen, J. (eds.) Progress in Cryptology—AFRICACRYPT 2022. LNCS, vol. 13503, pp. 448–468. Springer, Cham (2022). https://​doi.​org/​10.​1007/​978-3-031-17433-9_​19
60.
Zurück zum Zitat Shinagawa, K., Nuida, K.: A single shuffle is enough for secure card-based computation of any Boolean circuit. Discrete Appl. Math. 289, 248–261 (2021)MathSciNetCrossRef Shinagawa, K., Nuida, K.: A single shuffle is enough for secure card-based computation of any Boolean circuit. Discrete Appl. Math. 289, 248–261 (2021)MathSciNetCrossRef
61.
63.
Zurück zum Zitat Koch, A.: The landscape of optimal card-based protocols. Math. Cryptol. 1(2), 115–131 (2022)MathSciNet Koch, A.: The landscape of optimal card-based protocols. Math. Cryptol. 1(2), 115–131 (2022)MathSciNet
64.
Zurück zum Zitat Ishikawa, R., Chida, E., Mizuki, T.: Efficient card-based protocols for generating a hidden random permutation without fixed points. In: Calude, C.S., Dinneen, M.J. (eds.) Unconventional Computation and Natural Computation. LNCS, vol. 9252, pp. 215–226. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21819-9_16 Ishikawa, R., Chida, E., Mizuki, T.: Efficient card-based protocols for generating a hidden random permutation without fixed points. In: Calude, C.S., Dinneen, M.J. (eds.) Unconventional Computation and Natural Computation. LNCS, vol. 9252, pp. 215–226. Springer, Cham (2015). https://​doi.​org/​10.​1007/​978-3-319-21819-9_​16
65.
Zurück zum Zitat Koch, A., Walzer, S.: Private function evaluation with cards. New Gener. Comput. 40, 115–147 (2022)CrossRef Koch, A., Walzer, S.: Private function evaluation with cards. New Gener. Comput. 40, 115–147 (2022)CrossRef
67.
Zurück zum Zitat Hashimoto, Y., Nuida, K., Shinagawa, K., Inamura, M., Hanaoka, G.: Toward finite-runtime card-based protocol for generating a hidden random permutation without fixed points. IEICE Trans. Fundam. E101.A(9), 1503–1511 (2018)CrossRef Hashimoto, Y., Nuida, K., Shinagawa, K., Inamura, M., Hanaoka, G.: Toward finite-runtime card-based protocol for generating a hidden random permutation without fixed points. IEICE Trans. Fundam. E101.A(9), 1503–1511 (2018)CrossRef
68.
Zurück zum Zitat Miyahara, D., Haneda, H., Mizuki, T.: Card-based zero-knowledge proof protocols for graph problems and their computational model. In: Huang, Q., Yu, Y. (eds.) Provable and Practical Security. LNCS, vol. 13059, pp. 136–152. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-90402-9_8 Miyahara, D., Haneda, H., Mizuki, T.: Card-based zero-knowledge proof protocols for graph problems and their computational model. In: Huang, Q., Yu, Y. (eds.) Provable and Practical Security. LNCS, vol. 13059, pp. 136–152. Springer, Cham (2021). https://​doi.​org/​10.​1007/​978-3-030-90402-9_​8
69.
Zurück zum Zitat Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Secur. 13(1), 15–23 (2014)CrossRef Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Secur. 13(1), 15–23 (2014)CrossRef
70.
Zurück zum Zitat Manabe, Y., Ono, H.: Card-based cryptographic protocols with malicious players using private operations. New Gener. Comput. 40, 67–93 (2022)CrossRef Manabe, Y., Ono, H.: Card-based cryptographic protocols with malicious players using private operations. New Gener. Comput. 40, 67–93 (2022)CrossRef
72.
Zurück zum Zitat Ono, H., Manabe, Y.: Card-based cryptographic logical computations using private operations. New Gener. Comput. 39(1), 19–40 (2021)CrossRef Ono, H., Manabe, Y.: Card-based cryptographic logical computations using private operations. New Gener. Comput. 39(1), 19–40 (2021)CrossRef
73.
Zurück zum Zitat Nakai, T., Misawa, Y., Tokushige, Y., Iwamoto, M., Ohta, K.: Secure computation for threshold functions with physical cards: power of private permutations. New Gener. Comput. 40, 95–113 (2022)CrossRef Nakai, T., Misawa, Y., Tokushige, Y., Iwamoto, M., Ohta, K.: Secure computation for threshold functions with physical cards: power of private permutations. New Gener. Comput. 40, 95–113 (2022)CrossRef
76.
Zurück zum Zitat Shinagawa, K., Mizuki, T., Schuldt, J., Nuida, K., Kanayama, N., Nishide, T., Hanaoka, G., Okamoto, E.: Secure computation protocols using polarizing cards. IEICE Trans. Fundam. E99.A(6), 1122–1131 (2016)CrossRef Shinagawa, K., Mizuki, T., Schuldt, J., Nuida, K., Kanayama, N., Nishide, T., Hanaoka, G., Okamoto, E.: Secure computation protocols using polarizing cards. IEICE Trans. Fundam. E99.A(6), 1122–1131 (2016)CrossRef
77.
Zurück zum Zitat Yoshida, T., Tanaka, K., Nakabayashi, K., Chida, E., Mizuki, T.: Upper bounds on the number of shuffles for two-helping-card multi-input AND protocols. In: Deng, J., Kolesnikov, V., Schwarzmann, A.A. (eds.) Cryptology and Network Security. LNCS, vol. 14342, pp. 211–231. Springer, Singapore (2023). https://doi.org/10.1007/978-981-99-7563-1_10 Yoshida, T., Tanaka, K., Nakabayashi, K., Chida, E., Mizuki, T.: Upper bounds on the number of shuffles for two-helping-card multi-input AND protocols. In: Deng, J., Kolesnikov, V., Schwarzmann, A.A. (eds.) Cryptology and Network Security. LNCS, vol. 14342, pp. 211–231. Springer, Singapore (2023). https://​doi.​org/​10.​1007/​978-981-99-7563-1_​10
Metadaten
Titel
Physical Zero-Knowledge Proof Protocols for Topswops and Botdrops
verfasst von
Yuichi Komano
Takaaki Mizuki
Publikationsdatum
24.07.2024
Verlag
Springer Japan
Erschienen in
New Generation Computing / Ausgabe 3/2024
Print ISSN: 0288-3635
Elektronische ISSN: 1882-7055
DOI
https://doi.org/10.1007/s00354-024-00272-3