Skip to main content
Erschienen in:

Open Access 18.06.2024 | Research Paper

Printing Protocol: Physical ZKPs for Decomposition Puzzles

verfasst von: Suthee Ruangwises, Mitsugu Iwamoto

Erschienen in: New Generation Computing | Ausgabe 3/2024

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Der Artikel stellt ein einzigartiges kartenbasiertes Protokoll vor, das als "Druckprotokoll" bezeichnet wird und Lösungen für Zersetzungsrätsel wie Five Cells and Meadows verifizieren soll. Dieses Protokoll ermöglicht die Verifizierung von Rätsellösungen, ohne die tatsächliche Lösung preiszugeben, und nutzt das Konzept der Null-Wissen-Beweise. Die Autoren demonstrieren die praktische Anwendung dieses Protokolls, indem sie spezifische Null-Wissen-Nachweisprotokolle für die Fünf-Zellen-und-Wiesen-Rätsel entwickeln. Das Druckprotokoll ist vielseitig einsetzbar und kann an verschiedene Zersetzungsrätsel angepasst werden, wodurch eine greifbare und intuitive Methode zur Verifizierung komplexer Puzzellösungen zur Verfügung steht. Der Artikel beleuchtet auch die Beschränkungen des aktuellen Protokolls und schlägt zukünftige Forschungsrichtungen vor, um Rätsel mit einer größeren Anzahl regionaler Typen zu lösen.
Hinweise
A preliminary version of this paper [25] has appeared at LATINCRYPT 2023.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

1 Introduction

Pencil puzzles are puzzles that can be solved by writing down the solution on a paper. They must be solved using only logical reasoning and do not require additional knowledge. Examples of pencil puzzles include Sudoku, Nonogram, Kakuro, and Slitherlink.
Pencil puzzles can be categorized into several types based on their core theme. One of the common themes is to partition a rectangular grid into several regions to satisfy certain rules. We call these puzzles decomposition puzzles.

1.1 Five Cells

Five Cells is a decomposition puzzle created by Nikoli, a Japanese publisher famous for developing many popular pencil puzzles. The puzzle consists of an \(m \times n\) rectangular grid, with some cells containing a number. The player has to partition the grid into pentominoes. The number in each cell indicates the number of edges of that cell that are borders of pentominoes (including the outer boundary of the grid) [17]. See Fig. 1.
Deciding solvability of a given Five Cells puzzle is NP-complete [11].

1.2 Meadows

Meadows is another decomposition puzzle consisting of an \(n \times n\) square grid, with some cells containing a dot. The player has to partition the grid into squares such that each square contains exactly one dotted cell. See Fig. 2.
The rules of Meadows are similar to those of Shikaku,1 a more well-known decomposition puzzle developed by Nikoli, so the puzzle may be considered a variant of Shikaku [12], which is also NP-complete [35].

1.3 Zero-Knowledge Proof

Suppose that Panthalassa, a puzzle expert, creates a pencil puzzle and challenges his friend Vodka to solve it. He wants to convince her that the puzzle indeed has a solution, but does not want to reveal the solution itself. A zero-knowledge proof (ZKP) makes this seemingly difficult task possible.
Formally, a ZKP is an interactive protocol between a prover P and a verifier V, where both are given a computational problem x, but only P knows its solution w. Also, the computational power of V is limited, so V cannot obtain w from x. A ZKP has to satisfy the following three properties.
1.
Completeness: If P knows w, then V accepts with high probability. (In this paper, we consider the perfect completeness property where V always accepts.)
 
2.
Soundness: If P does not know w, then V rejects with high probability. (In this paper, we consider the perfect soundness property where V always rejects.)
 
3.
Zero-knowledge: V learns nothing about w. Formally, there exists a probabilistic polynomial time algorithm S (called a simulator) that does not know w but has an access to V, and the outputs of S follow the same probability distribution as the ones of the real protocol.
 
The concept of a ZKP was first introduced in 1989 by Goldwasser et al. [7]. It has been proved that every NP problem has a ZKP [6], so a computational ZKP for any NP puzzle can be constructed via a reduction to another problem. Such construction, however, is unintuitive and looks unconvincing. Therefore, many researchers instead focused on constructing physical ZKPs using a deck of playing cards. These card-based protocols have benefits that they require only portable objects easily found in everyday life and do not require computers. They are also easy to understand and verify the correctness and security, even for non-experts, and thus can be used for didactic purpose.
Card-based ZKP protocols for many pencil puzzles have been developed,2 including Sudoku [8, 27, 33], Nonogram [3, 23], Akari [1], Takuzu [1, 15], Kakuro [1, 16], KenKen [1], Makaro [2, 32], Norinori [4], Slitherlink [14], Juosan [15], Numberlink [29], Suguru [19], Ripple Effect [30], Nurikabe [20], Hitori [20], Bridges [31], Masyu [14], Heyawake [20], Shikaku [28], Usowan [21], Nurimisaki [22], ABC End View [5, 26], Goishi Hiroi [26], Moon-or-Sun [9], and Kurodoko [22], as well as those for non-pencil logic puzzles such as Cryptarithmetic [10] and Ball sort puzzle [24].

1.4 Our Contribution

In this paper, we construct a generic card-based protocol called printing protocol. This protocol prints some numbers from the template onto a target area from the grid, and also verifies that the printed numbers do not overlap with the already existing numbers in that area. The printing protocol can be used to verify solutions of many decomposition puzzles. We show two applications of it by developing ZKP protocols for two such puzzles: Five Cells and Meadows.

2 Preliminaries

2.1 Cards

Each card used in our protocol either has an integer written on the front side (e.g. https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figa_HTML.gif https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figb_HTML.gif ) or is a blank card with nothing written on the front side ( https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figc_HTML.gif ). All cards have indistinguishable back sides denoted by https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figd_HTML.gif .

2.2 Pile-Shifting Shuffle

Given a matrix M of cards, a pile-shifting shuffle [34] shifts the columns of M by a uniformly random cyclic shift unknown to all parties (see Fig. 3). It can be implemented in real world by putting all cards in each column into an envelope, and letting all parties take turns to apply Hindu cuts (taking some envelopes from the bottom and putting them on the top) to the pile of envelopes.
Note that each card in M may be replaced by a stack of cards, and the protocol still works in the same way as long as every stack in the same row has the same number of cards.

2.3 Chosen Cut Protocol

Given a sequence \(C = (c_1,c_2,...,c_q)\) of q face-down cards, a chosen cut protocol [13] allows P to select a desired card \(c_i\) to use in other protocols without revealing i to V. Optionally, the protocol can also revert C back to its original state after P finishes using \(c_i\).
P performs the following steps (called the first part).
1.
Construct the following \(3 \times q\) matrix M (see Fig. 4).
(a)
In Row 1, place the sequence C.
 
(b)
In Row 2, place a face-down https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Fige_HTML.gif at Column i and a face-down https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figf_HTML.gif at each other column.
 
(c)
In Row 3, place a face-up https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figg_HTML.gif at Column 1 and a face-up https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figh_HTML.gif at each other column.
 
 
2.
Turn over all face-up cards. Apply the pile-shifting shuffle to M.
 
3.
Turn over all cards in Row 2 and locate the position of the only https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figi_HTML.gif . A card in Row 1 directly above this https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figj_HTML.gif will be the card \(c_i\) as desired.
 
Optionally, if P wants to revert C back to its original state, P continues the following steps (called the second part) after finishing using \(c_i\) in other protocols.
4.
Place \(c_i\) back into M at the same position.
 
5.
Turn over all face-up cards. Apply the pile-shifting shuffle to M.
 
6.
Turn over all cards in Row 3 and locate the position of the only https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figk_HTML.gif . Shift the columns of M cyclically such that this https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figl_HTML.gif moves to Column 1. M is now reverted back to its original state.
 
Note that each card in C may be replaced by a stack of cards, and the protocol still works in the same way as long as every stack has the same number of cards.

3 Printing Protocol

Given a \(p \times q\) matrix of cards called a template (which contains some non-blank cards, and possibly some blank cards) and another \(p \times q\) matrix of cards representing an area from the puzzle grid, all known to P but not to V. A printing protocol verifies that positions in the area corresponding to non-blank cards in the template are initially empty (consisting of all blank cards). The protocol then places all non-blank cards from the template at the corresponding positions in the area, replacing the original blank cards (see Fig. 5) without revealing any card to V.
P performs the following steps.
1.
Place each card from the template on top of each corresponding card from the area, creating pq stacks of two cards.
 
2.
For each of the pq stacks, perform the following steps.
(a)
Apply the first part of the chosen cut protocol to select a blank card. (If the preconditions are met, at least one card must be blank; if both cards are blank, P can select any of them.)
 
(b)
Reveal the selected card that it is a blank card (otherwise V rejects) and remove it from the stack.
 
 
After these steps, all non-blank cards from the template are placed at the corresponding positions in the area. V is also convinced that these positions in the area were initially empty (consisting of all blank cards) before the protocol.
Using the printing protocol, P can separately print each region in the partition onto the grid to construct P’s solution of a decomposition puzzle. V will be convinced that the regions do not overlap with one another.

4 ZKP Protocol for Five Cells

First, from the solution of Five Cells, one can fill a number on every cell according to the rule of the puzzle (the number in each cell being the number of edges of that cell that are borders of pentominoes). We call this instance an extended solution of the puzzle.
The key observation is that there are only \(\Theta (1)\) different types of pentomino. Namely, there are 63 of them [18].3 Furthermore, inside each type of pentomino in the extended solution, the number in each cell is fixed for that type. Therefore, we need to construct only 63 different templates.
In our protocol, P constructs 63 templates, one for each type of pentomino. Each template has size \(5 \times 5\) (as the height and length of a pentomino are at most five), and the pentomino is placed at the top-left corner of the template. A cell inside the pentomino is represented by a card with a number equal to the number of edges of that cell that are borders of the pentomino, while a cell outside the pentomino is represented by a blank card (see Fig. 6).

4.1 Main Protocol

Initially, P publicly places a blank card on every cell in the grid. To handle edge cases, P publicly appends four rows and four columns of “dummy” blank cards to the bottom and to the right of the grid. Then, P turns all card face-down. We now have an \((m+4) \times (n+4)\) matrix of cards.
Observe that if we arrange all \((m+4)(n+4)\) cards in the matrix into a single sequence \(A=(a_1,a_2,...,a_{(m+4)(n+4)})\), starting at the top-left corner and going from left to right in Row 1, then from left to right in Row 2, and so on, we can locate exactly where the four neighbors of any given card are. Namely, the cards on the neighbor to the left, right, top, and bottom of a cell containing \(a_i\) are \(a_{i-1}\), \(a_{i+1}\), \(a_{i-n-4}\), and \(a_{i+n+4}\), respectively.
Also, P constructs 63 templates of all 63 types of pentomino and lets V verify that all templates are correct (otherwise V rejects).
Suppose that in P’s extended solution, the grid is partitioned into k pentominoes \(B_1,B_2,...,B_k\), where \(k=mn/5\). For each \(i=1,2,...,k\), P performs the following steps.
1.
Apply the first part of the chosen cut protocol to select a \(5 \times 5\) area containing pentomino \(B_i\) in the same position as in its corresponding template. (To be precise, P selects just the top-left corner cell of the area, and the rest will follow as the chosen cut protocol preserves the cyclic order).
 
2.
Apply the first part of the chosen cut protocol to select a template of a pentomino with the same type as \(B_i\).
 
3.
Apply the printing protocol on the selected template and the selected area. Continue the second part of the chosen cut protocol invoked in Step 1 to revert the grid into its original state.
 
4.
Reconstruct a template that has just been used and replenish the pile of templates with it. Let V verify again that all 63 templates are correct (otherwise V rejects). Note that V does not know which template has been used.
 
Finally, P reveals all cards on the cells that contain a number (in the original Five Cell puzzle). V verifies that the numbers on the cards match the numbers in the cells (otherwise V rejects). P also reveals all dummy cards that they are still blank. If all verification steps pass, then V accepts.
This protocol uses \(\Theta (mn)\) cards and \(\Theta (mn)\) shuffles.

4.2 Proof of Correctness and Security

We will prove the perfect completeness, perfect soundness, and zero-knowledge properties of this protocol.
Lemma 1
(Perfect Completeness) If P knows a solution of the Five Cells puzzle, then V always accepts.
Proof
Suppose P knows an extended solution of the puzzle. Consider each i-th iteration of the main protocol.
  • In Step 3, since \(B_1,B_2,...,B_k\) form a partition of the grid, \(B_i\) does not overlap with \(B_1,B_2,...,B_{i-1}\). Thus, the printing protocol will pass, and the numbers in \(B_i\) will be printed on the grid.
  • In Step 4, P reconstructs a template that has just been used, so this step will pass.
Therefore, every iteration will pass. After k iterations, all numbers in P’s extended solution will be printed on the grid, so all numbers in the original puzzle will match the numbers on the corresponding cards.
Hence, we can conclude that V always accept. \(\square \)
Lemma 2
(Perfect Soundness) If P does not know a solution of the Five Cells puzzle, then V always rejects.
Proof
We will prove the contrapositive of this statement. Suppose V accepts, which means the verification passes in all steps. Consider the main protocol.
Since Step 4 passes for every iteration, all 63 templates are correct after each iteration (and also at the beginning of the protocol), which implies the numbers printed in every iteration form a shape of a pentomino and follow the rule of the puzzle.
In Step 3, since the printing protocol passes for every iteration, \(B_i\) does not overlap with \(B_1,B_2,...,B_{i-1}\) for every i. Also, the combined area of \(B_1,B_2,...,B_k\) is \(5k=mn\), which implies \(B_1,B_2,...,B_k\) must form a partition of the grid.
Since the final verification passes, all numbers in the original puzzle match the numbers on the corresponding cards.
Hence, we can conclude that the original puzzle grid is partitioned into pentominoes according to the rule, which means P must know a valid solution of the puzzle. \(\square \)
Lemma 3
(Zero-Knowledge) During the verification, V obtains no information about P’s solution.
Proof
We will prove that the interaction between P and V can be simulated by a simulator S that does not know P’s solution. It is sufficient to show that all distributions of cards that are turned face-up can be simulated by S.
  • In Steps 3 and 6 of the chosen cut protocol in Sect. 2.3, the https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figm_HTML.gif has probability 1/q to be at each of the q columns (due to the pile-shifting shuffles), so these two steps can be simulated by S.
  • In Step 2(b) of the printing protocol in Sect. 3, there is only one deterministic pattern of the cards that are turned face-up (all blank cards), so this step can be simulated by S.
  • In Step 4 of the main protocol, there is only one deterministic pattern of the cards that are turned face-up (all correct templates), so this step can be simulated by S.
Hence, we can conclude that V obtains no information about P’s solution. \(\square \)

5 ZKP Protocol for Meadows

The key observation is that there are only n different sizes of square in the solution of Meadows. Therefore, we need to construct only n different templates.
In our protocol, P constructs n templates, one for each size of square. Each template has size \(n \times n\), and the square is placed at the top-left corner of the template. A cell inside the square is represented by a https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Fign_HTML.gif , while a cell outside the square is represented by a blank card (see Fig. 7).

5.1 Main Protocol

Initially, P publicly places a blank card on every cell in the grid. To handle edge cases, P publicly appends \(n-1\) rows and \(n-1\) columns of “dummy” blank cards to the bottom and to the right of the grid. Then, P turns all card face-down. We now have an \((2n-1) \times (2n-1)\) matrix of cards.
Also, P constructs n templates of all n sizes of square and lets V verify that all templates are correct (otherwise V rejects).
Let \(d_1,d_2,...,d_k\) be the dotted cells in the grid. Suppose that in P’s solution, the grid is partitioned into k squares \(B_1,B_2,...,B_k\), with each square \(B_i\) containing cell \(d_i\). For each \(i=1,2,...,k\), P performs the following steps.
1.
Apply the first part of the chosen cut protocol to select an \(n \times n\) area whose top-left corner is the top-left corner of square \(B_i\). (To be precise, P selects just the top-left corner cell of the area, and the rest will follow).
 
2.
Apply the first part of the chosen cut protocol to select a template of a square with the same size as \(B_i\).
 
3.
Apply the printing protocol on the selected template and the selected area. Continue the second part of the chosen cut protocol invoked in Step 1 to revert the grid into its original state.
 
4.
Turn over cards on cells \(d_i,d_{i+1},...,d_k\) to show that the card on \(d_i\) is a https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_IEq63_HTML.gif , and the cards on \(d_{i+1},d_{i+2},...,d_k\) are all blank cards (otherwise V rejects).
 
5.
Reconstruct a template that has just been used and replenish the pile of templates with it. Let V verify again that all n templates are correct (otherwise V rejects). Note that V does not know which template has been used.
 
Finally, P reveals all cards in the grid that they are all https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_IEq65_HTML.gif s (otherwise V rejects). P also reveals all dummy cards that they are still blank. If all verification steps pass, then V accepts.
This protocol uses \(\Theta (n^3)\) cards and \(\Theta (kn^2)\) shuffles.

5.2 Proof of Correctness and Security

We will prove the perfect completeness, perfect soundness, and zero-knowledge properties of this protocol.
Lemma 4
(Perfect Completeness) If P knows a solution of the Meadows puzzle, then V always accepts.
Proof
Suppose P knows a solution of the puzzle. Consider each i-th iteration of the main protocol.
  • In Step 3, since \(B_1,B_2,...,B_k\) form a partition of the grid, \(B_i\) does not overlap with \(B_1,B_2,...,B_{i-1}\). Thus, the printing protocol will pass, and all https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figo_HTML.gif s in \(B_i\) will be printed on the grid.
  • In Step 4, since all https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figp_HTML.gif s inside \(B_i\) have already been printed, and all https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figq_HTML.gif s inside \(B_{i+1},B_{i+2},...,B_k\) have not yet been printed, this step will pass.
  • In Step 5, P reconstructs a template that has just been used, so this step will pass.
Therefore, every iteration will pass. After k iterations, all cells in the grid will be printed with https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figr_HTML.gif s, so the final verification will also pass.
Hence, we can conclude that V always accept. \(\square \)
Lemma 5
(Perfect Soundness) If P does not know a solution of the Meadows puzzle, then V always rejects.
Proof
We will prove the contrapositive of this statement. Suppose V accepts, which means the verification passes in all steps. Consider the main protocol.
Since Step 5 passes for every iteration, all n templates are correct after each iteration (and also at the beginning of the protocol), which implies the https://static-content.springer.com/image/art%3A10.1007%2Fs00354-024-00266-1/MediaObjects/354_2024_266_Figs_HTML.gif s printed in every iteration form a shape of a square.
Since Step 4 passes for every iteration, the square printed in each i-th iteration must contain exactly one dotted cell, which is \(d_i\).
In Step 3, since the printing protocol passes for every iteration, \(B_i\) does not overlap with \(B_1,B_2,...,B_{i-1}\) for every i. Also, since the final verification passes, the combined area of \(B_1,B_2,...,B_k\) must cover the whole grid, i.e. \(B_1,B_2,...,B_k\) form a partition of the grid.
Hence, we can conclude that the puzzle grid is partitioned into squares, with each one contaning exactly one dotted cell, which means P must know a valid solution of the puzzle. \(\square \)
Lemma 6
(Zero-Knowledge) During the verification, V obtains no information about P’s solution.
Proof
We will prove that the interaction between P and V can be simulated by a simulator S that does not know P’s solution. It is sufficient to show that all distributions of cards that are turned face-up can be simulated by S.
The zero-knowledge property of the chosen cut protocol and the printing protocol has been proved in the proof of Lemma 3, so it is sufficient to consider only the main protocol.
  • In Step 4, there is only one deterministic pattern of the cards that are turned face-up, so this step can be simulated by S.
  • In Step 5, there is only one deterministic pattern of the cards that are turned face-up (all correct templates), so this step can be simulated by S.
Hence, we can conclude that V obtains no information about P’s solution. \(\square \)

6 Future Work

We constructed the printing protocol, which can be used to develop ZKP protocols for decompositon puzzles.4 However, the limitation of this protocol is that the number of different possible types of region (which is equal to the number of templates we need to prepare) must be polynomially bounded. A possible future work is to find a technique to deal with decompositon puzzles which the number of different possible types of region are exponentially bounded, e.g. Fillomino.

Acknowledgements

The authors would like to thank the anonymous reviewers of LATINCRYPT 2023 who kindly suggested the main idea of the printing protocol. Without them, this paper would not have been possible. The authors would also like to thank Kyosuke Hatsugai, Yoshiki Abe, and Tomoki Ono for a valuable discussion on this research. This work was supported by JSPS KAKENHI Grant Numbers JP23H00468, JP23H00479, JP23K17455, JP22H03590, JP21H03395, and JST CREST JPMJCR23M2.

Declarations

Conflict of interest

The authors have no relevant financial or non-financial interests to disclose.
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Fußnoten
1
Although there exists a card-based ZKP for Shikaku [28], the protocol uses a technique specifically designed for Shikaku, which cannot be applied to Meadows.
 
2
Among these puzzles, only Shikaku is a decomposition puzzle, and its ZKP protocol [28] uses a completely different approach from the one in this paper.
 
3
A pentomino obtained by rotating or reflecting another pentomino is considered a different one.
 
4
The printing protocol can also be used to construct a ZKP for Shikaku. However, for an \(m \times n\) Shikaku grid, we need to prepare mn templates, each having size \(m \times n\), resulting in the total of \(\Theta (m^2n^2)\) cards, while the existing ZKP protocol [28] uses only \(\Theta (mn)\) cards.
 
Literatur
1.
Zurück zum Zitat Bultel, X., Dreier, J., Dumas, J.-G., Lafourcade, P.: Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen. In: Proceedings of the 8th International Conference on Fun with Algorithms (FUN), pp. 8:1–8:20 (2016) Bultel, X., Dreier, J., Dumas, J.-G., Lafourcade, P.: Physical zero-knowledge proofs for Akari, Takuzu, Kakuro and KenKen. In: Proceedings of the 8th International Conference on Fun with Algorithms (FUN), pp. 8:1–8:20 (2016)
2.
Zurück zum Zitat Bultel, X., Dreier, J., Dumas, J.-G., Lafourcade, P., Miyahara, D., Mizuki, T., Nagao, A., Sasaki, T., Shinagawa, K., Sone, H.: Physical zero-knowledge proof for Makaro. In: Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), pp. 111–125 (2018) Bultel, X., Dreier, J., Dumas, J.-G., Lafourcade, P., Miyahara, D., Mizuki, T., Nagao, A., Sasaki, T., Shinagawa, K., Sone, H.: Physical zero-knowledge proof for Makaro. In: Proceedings of the 20th International Symposium on Stabilization, Safety, and Security of Distributed Systems (SSS), pp. 111–125 (2018)
3.
Zurück zum Zitat Chien, Y.-F., Hon, W.-K.: Cryptographic and Physical zero-knowledge proof: from sudoku to Nonogram. In: Proceedings of the 5th International Conference on Fun with Algorithms (FUN), pp. 102–112 (2010) Chien, Y.-F., Hon, W.-K.: Cryptographic and Physical zero-knowledge proof: from sudoku to Nonogram. In: Proceedings of the 5th International Conference on Fun with Algorithms (FUN), pp. 102–112 (2010)
4.
Zurück zum Zitat Dumas, J.-G., Lafourcade, P., Miyahara, D., Mizuki, T., Sasaki, T., Sone, H.: Interactive physical zero-knowledge proof for Norinori. In: Proceedings of the 25th International Computing and Combinatorics Conference (COCOON), pp. 166–177 (2019) Dumas, J.-G., Lafourcade, P., Miyahara, D., Mizuki, T., Sasaki, T., Sone, H.: Interactive physical zero-knowledge proof for Norinori. In: Proceedings of the 25th International Computing and Combinatorics Conference (COCOON), pp. 166–177 (2019)
5.
Zurück zum Zitat Fukusawa, T., Manabe, Y.: Card-based zero-knowledge proof for the nearest neighbor property: zero-knowledge proof of ABC end view. In: Proceedings of the 12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE), pp. 147–161 (2022) Fukusawa, T., Manabe, Y.: Card-based zero-knowledge proof for the nearest neighbor property: zero-knowledge proof of ABC end view. In: Proceedings of the 12th International Conference on Security, Privacy and Applied Cryptographic Engineering (SPACE), pp. 147–161 (2022)
6.
Zurück zum Zitat Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. J. ACM 38(3), 691–729 (1991)CrossRef Goldreich, O., Micali, S., Wigderson, A.: Proofs that yield nothing but their validity and a methodology of cryptographic protocol design. J. ACM 38(3), 691–729 (1991)CrossRef
7.
Zurück zum Zitat Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRef Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186–208 (1989)MathSciNetCrossRef
8.
Zurück zum Zitat Gradwohl, R., Naor, M., Pinkas, B., Rothblum, G.N.: Cryptographic and physical zero-knowledge proof systems for solutions of sudoku puzzles. Theory Comput. Syst. 44(2), 245–268 (2009)MathSciNetCrossRef Gradwohl, R., Naor, M., Pinkas, B., Rothblum, G.N.: Cryptographic and physical zero-knowledge proof systems for solutions of sudoku puzzles. Theory Comput. Syst. 44(2), 245–268 (2009)MathSciNetCrossRef
9.
Zurück zum Zitat Hand, S., Koch, A., Lafourcade, P., Miyahara, D., Robert, L.: Check alternating patterns: a physical zero-knowledge proof for Moon-or-Sun. In: Proceedings of the 18th International Workshop on Security (IWSEC), pp. 255–272 (2023) Hand, S., Koch, A., Lafourcade, P., Miyahara, D., Robert, L.: Check alternating patterns: a physical zero-knowledge proof for Moon-or-Sun. In: Proceedings of the 18th International Workshop on Security (IWSEC), pp. 255–272 (2023)
10.
Zurück zum Zitat Isuzugawa, R., Miyahara, D., Mizuki, T.: Zero-knowledge proof protocol for cryptarithmetic using dihedral cards. In: Proceedings of the 19th International Conference on Unconventional Computation and Natural Computation (UCNC), pp. 51–67 (2021) Isuzugawa, R., Miyahara, D., Mizuki, T.: Zero-knowledge proof protocol for cryptarithmetic using dihedral cards. In: Proceedings of the 19th International Conference on Unconventional Computation and Natural Computation (UCNC), pp. 51–67 (2021)
11.
Zurück zum Zitat Iwamoto, C., Ide, T.: Five cells and tilepaint are NP-complete. IEICE Trans. Inf. Syst. 105.D(3), 508–516 (2022)CrossRef Iwamoto, C., Ide, T.: Five cells and tilepaint are NP-complete. IEICE Trans. Inf. Syst. 105.D(3), 508–516 (2022)CrossRef
13.
Zurück zum Zitat Koch, A., Walzer, S.: Foundations for actively secure card-based cryptography. In: Proceedings of the 10th International Conference on Fun with Algorithms (FUN), pp. 17:1–17:23 (2020) Koch, A., Walzer, S.: Foundations for actively secure card-based cryptography. In: Proceedings of the 10th International Conference on Fun with Algorithms (FUN), pp. 17:1–17:23 (2020)
14.
Zurück zum Zitat Lafourcade, P., Miyahara, D., Mizuki, T., Robert, L., Sasaki, T., Sone, H.: How to construct physical zero-knowledge proofs for puzzles with a “single loop’’ condition. Theor. Comput. Sci. 888, 41–55 (2021)MathSciNetCrossRef Lafourcade, P., Miyahara, D., Mizuki, T., Robert, L., Sasaki, T., Sone, H.: How to construct physical zero-knowledge proofs for puzzles with a “single loop’’ condition. Theor. Comput. Sci. 888, 41–55 (2021)MathSciNetCrossRef
15.
Zurück zum Zitat Miyahara, D., Robert, L., Lafourcade, P., Takeshige, S., Mizuki, T., Shinagawa, K., Nagao, A., Sone, H.: Card-based ZKP protocols for Takuzu and Juosan. In: Proceedings of the 10th International Conference on Fun with Algorithms (FUN), pp. 20:1–20:21 (2020) Miyahara, D., Robert, L., Lafourcade, P., Takeshige, S., Mizuki, T., Shinagawa, K., Nagao, A., Sone, H.: Card-based ZKP protocols for Takuzu and Juosan. In: Proceedings of the 10th International Conference on Fun with Algorithms (FUN), pp. 20:1–20:21 (2020)
16.
Zurück zum Zitat Miyahara, D., Sasaki, T., Mizuki, T., Sone, H.: Card-based physical zero-knowledge proof for Kakuro. IEICE Trans. Fundam. E102.A(9), 1072–1078 (2019)CrossRef Miyahara, D., Sasaki, T., Mizuki, T., Sone, H.: Card-based physical zero-knowledge proof for Kakuro. IEICE Trans. Fundam. E102.A(9), 1072–1078 (2019)CrossRef
19.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Libralesso, L., Mizuki, T.: Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle. Inf. Comput. 285(B), 104858 (2022)MathSciNetCrossRef Robert, L., Miyahara, D., Lafourcade, P., Libralesso, L., Mizuki, T.: Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle. Inf. Comput. 285(B), 104858 (2022)MathSciNetCrossRef
20.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Card-based ZKP for connectivity: applications to Nurikabe, Hitori, and Heyawake. New Gener. Comput. 40(1), 149–171 (2022)CrossRef Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Card-based ZKP for connectivity: applications to Nurikabe, Hitori, and Heyawake. New Gener. Comput. 40(1), 149–171 (2022)CrossRef
21.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Hide a Liar: card-based ZKP protocol for Usowan. In: Proceedings of the 17th Annual Conference on Theory and Applications of Models of Computation (TAMC), pp. 201–217 (2022) Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Hide a Liar: card-based ZKP protocol for Usowan. In: Proceedings of the 17th Annual Conference on Theory and Applications of Models of Computation (TAMC), pp. 201–217 (2022)
22.
Zurück zum Zitat Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Physical ZKP protocols for Nurimisaki and Kurodoko. Theor. Comput. Sci. 972, 114071 (2023)MathSciNetCrossRef Robert, L., Miyahara, D., Lafourcade, P., Mizuki, T.: Physical ZKP protocols for Nurimisaki and Kurodoko. Theor. Comput. Sci. 972, 114071 (2023)MathSciNetCrossRef
23.
Zurück zum Zitat Ruangwises, S.: An improved physical ZKP for Nonogram and Nonogram color. J. Combin. Optim. 45(5), 122 (2023)MathSciNetCrossRef Ruangwises, S.: An improved physical ZKP for Nonogram and Nonogram color. J. Combin. Optim. 45(5), 122 (2023)MathSciNetCrossRef
24.
Zurück zum Zitat Ruangwises, S.: Physical zero-knowledge proof for ball sort puzzle. In: Proceedings of the 19th Conference on Computability in Europe (CiE), pp. 246–257 (2023) Ruangwises, S.: Physical zero-knowledge proof for ball sort puzzle. In: Proceedings of the 19th Conference on Computability in Europe (CiE), pp. 246–257 (2023)
25.
Zurück zum Zitat Ruangwises, S.: Physical zero-knowledge proofs for five cells. In: Proceedings of the 8th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), pp. 315–330 (2023) Ruangwises, S.: Physical zero-knowledge proofs for five cells. In: Proceedings of the 8th International Conference on Cryptology and Information Security in Latin America (LATINCRYPT), pp. 315–330 (2023)
26.
Zurück zum Zitat Ruangwises, S.: Physically verifying the first nonzero term in a sequence: physical ZKPs for ABC end view and Goishi Hiroi. In: Proceedings of the 17th Conference on Frontiers of Algorithmic Wisdom (FAW), pp. 171–183 (2023) Ruangwises, S.: Physically verifying the first nonzero term in a sequence: physical ZKPs for ABC end view and Goishi Hiroi. In: Proceedings of the 17th Conference on Frontiers of Algorithmic Wisdom (FAW), pp. 171–183 (2023)
27.
Zurück zum Zitat Ruangwises, S.: Two standard decks of playing cards are sufficient for a ZKP for sudoku. New Gener. Comput. 40(1), 49–65 (2022)CrossRef Ruangwises, S.: Two standard decks of playing cards are sufficient for a ZKP for sudoku. New Gener. Comput. 40(1), 49–65 (2022)CrossRef
28.
Zurück zum Zitat Ruangwises, S., Itoh, T.: How to physically verify a rectangle in a grid: a physical ZKP for Shikaku. In: Proceedings of the 11th International Conference on Fun with Algorithms (FUN), pp. 24:1–24:12 (2022) Ruangwises, S., Itoh, T.: How to physically verify a rectangle in a grid: a physical ZKP for Shikaku. In: Proceedings of the 11th International Conference on Fun with Algorithms (FUN), pp. 24:1–24:12 (2022)
29.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for numberlink puzzle and \(k\) vertex-disjoint paths problem. New Gener. Comput. 39(1), 3–17 (2021)CrossRef Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for numberlink puzzle and \(k\) vertex-disjoint paths problem. New Gener. Comput. 39(1), 3–17 (2021)CrossRef
30.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for ripple effect. Theor. Comput. Sci. 895, 115–123 (2021)MathSciNetCrossRef Ruangwises, S., Itoh, T.: Physical zero-knowledge proof for ripple effect. Theor. Comput. Sci. 895, 115–123 (2021)MathSciNetCrossRef
31.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical ZKP for connected spanning subgraph: applications to bridges puzzle and other problems. In: Proceedings of the 19th International Conference on Unconventional Computation and Natural Computation (UCNC), pp. 149–163 (2021) Ruangwises, S., Itoh, T.: Physical ZKP for connected spanning subgraph: applications to bridges puzzle and other problems. In: Proceedings of the 19th International Conference on Unconventional Computation and Natural Computation (UCNC), pp. 149–163 (2021)
32.
Zurück zum Zitat Ruangwises, S., Itoh, T.: Physical ZKP for Makaro using a standard deck of cards. In: Proceedings of the 17th Annual Conference on Theory and Applications of Models of Computation (TAMC), pp. 43–54 (2022) Ruangwises, S., Itoh, T.: Physical ZKP for Makaro using a standard deck of cards. In: Proceedings of the 17th Annual Conference on Theory and Applications of Models of Computation (TAMC), pp. 43–54 (2022)
33.
Zurück zum Zitat Sasaki, T., Miyahara, D., Mizuki, T., Sone, H.: Efficient card-based zero-knowledge proof for Sudoku. Theor. Comput. Sci. 839, 135–142 (2020)MathSciNetCrossRef Sasaki, T., Miyahara, D., Mizuki, T., Sone, H.: Efficient card-based zero-knowledge proof for Sudoku. Theor. Comput. Sci. 839, 135–142 (2020)MathSciNetCrossRef
34.
Zurück zum Zitat Shinagawa, K., Mizuki, T., Schuldt, J.C.N., Nuida, K., Kanayama, N., Nishide, T., Hanaoka, G., Okamoto, E.: Card-based protocols using regular polygon cards. IEICE Trans. Fundam. E100.A(9), 1900–1909 (2017)CrossRef Shinagawa, K., Mizuki, T., Schuldt, J.C.N., Nuida, K., Kanayama, N., Nishide, T., Hanaoka, G., Okamoto, E.: Card-based protocols using regular polygon cards. IEICE Trans. Fundam. E100.A(9), 1900–1909 (2017)CrossRef
35.
Zurück zum Zitat Takenaga, Y., Aoyagi, S., Iwata, S., Kasai, T.: Shikaku and ripple effect are NP-complete. Congressus Numerantium 216, 119–127 (2013)MathSciNet Takenaga, Y., Aoyagi, S., Iwata, S., Kasai, T.: Shikaku and ripple effect are NP-complete. Congressus Numerantium 216, 119–127 (2013)MathSciNet
Metadaten
Titel
Printing Protocol: Physical ZKPs for Decomposition Puzzles
verfasst von
Suthee Ruangwises
Mitsugu Iwamoto
Publikationsdatum
18.06.2024
Verlag
Springer Japan
Erschienen in
New Generation Computing / Ausgabe 3/2024
Print ISSN: 0288-3635
Elektronische ISSN: 1882-7055
DOI
https://doi.org/10.1007/s00354-024-00266-1