{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:14Z","timestamp":1772893034109,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031637414","type":"print"},{"value":"9783031637421","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-63742-1_6","type":"book-chapter","created":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T20:11:01Z","timestamp":1718655061000},"page":"74-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Card-Based Cryptography Meets 3D Printer"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-4285-1481","authenticated-orcid":false,"given":"Yuki","family":"Ito","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3829-5751","authenticated-orcid":false,"given":"Hayato","family":"Shikata","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5798-5125","authenticated-orcid":false,"given":"Takuo","family":"Suganuma","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-1043","authenticated-orcid":false,"given":"Takaaki","family":"Mizuki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,18]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Boer, B.D.: More efficient match-making and satisfiability the five card trick. In: EUROCRYPT 1989. LNCS, vol.\u00a0434, pp. 208\u2013217. Springer, Heidelberg (1990)","DOI":"10.1007\/3-540-46885-4_23"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Hanaoka, G.: Towards user-friendly cryptography. In: Paradigms in Cryptology\u2013Mycrypt 2016. Malicious and Exploratory Cryptology. LNCS, vol. 10311, pp. 481\u2013484. Springer, Cham (2017)","DOI":"10.1007\/978-3-319-61273-7_24"},{"key":"6_CR3","unstructured":"Koch, A.: Cryptographic Protocols from Physical Assumptions. Ph.D. thesis, Karlsruhe Institute of Technology (2019)"},{"key":"6_CR4","unstructured":"Koch, A., Walzer, S.: Foundations for actively secure card-based cryptography. In: Fun with Algorithms. LIPIcs, vol.\u00a0157, pp. 17:1\u201317:23. Schloss Dagstuhl, Dagstuhl, Germany (2020)"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/s00354-021-00149-9","volume":"40","author":"A Koch","year":"2022","unstructured":"Koch, A., Walzer, S.: Private function evaluation with cards. New Gener. Comput. 40, 115\u2013147 (2022)","journal-title":"New Gener. Comput."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Koch, A., Walzer, S., H\u00e4rtel, K.: Card-based cryptographic protocols using a minimal number of cards. In: Advances in Cryptology\u2014ASIACRYPT 2015. LNCS, vol.\u00a09452, pp. 783\u2013807. Springer, Heidelberg (2015)","DOI":"10.1007\/978-3-662-48797-6_32"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00354-021-00127-1","volume":"39","author":"T Mizuki","year":"2021","unstructured":"Mizuki, T.: Preface: Special issue on card-based cryptography. New Gener. Comput. 39, 1\u20132 (2021)","journal-title":"New Gener. Comput."},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/s00354-022-00170-6","volume":"40","author":"T Mizuki","year":"2022","unstructured":"Mizuki, T.: Preface: Special issue on card-based cryptography 2. New Gener. Comput. 40, 47\u201348 (2022)","journal-title":"New Gener. Comput."},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10207-013-0219-4","volume":"13","author":"T Mizuki","year":"2014","unstructured":"Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Secur. 13(1), 15\u201323 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Mizuki, T., Shizuya, H.: Computational model of card-based cryptographic protocols and its applications. IEICE Trans. Fundam. E100.A(1), 3\u201311 (2017)","DOI":"10.1587\/transfun.E100.A.3"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Mizuki, T., Sone, H.: Six-card secure AND and four-card secure XOR. In: Frontiers in Algorithmics. LNCS, vol.\u00a05598, pp. 358\u2013369. Springer, Berlin, Heidelberg (2009)","DOI":"10.1007\/978-3-642-02270-8_36"},{"issue":"9","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1494","DOI":"10.1587\/transfun.E101.A.1494","volume":"101","author":"A Nishimura","year":"2018","unstructured":"Nishimura, A., Hayashi, Y., Mizuki, T., Sone, H.: Pile-shifting scramble for card-based protocols. IEICE Trans. Fundam. 101(9), 1494\u20131502 (2018)","journal-title":"IEICE Trans. Fundam."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Nishimura, A., Nishida, T., Hayashi, Y., Mizuki, T., Sone, H.: Five-card secure computations using unequal division shuffle. In: Theory and Practice of Natural Computing. LNCS, vol.\u00a09477, pp. 109\u2013120. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-26841-5_9"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s00500-017-2858-2","volume":"22","author":"A Nishimura","year":"2018","unstructured":"Nishimura, A., Nishida, T., Hayashi, Y., Mizuki, T., Sone, H.: Card-based protocols using unequal division shuffles. Soft. Comput. 22, 361\u2013371 (2018)","journal-title":"Soft. Comput."},{"key":"6_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.tcs.2021.07.007","volume":"887","author":"S Ruangwises","year":"2021","unstructured":"Ruangwises, S., Itoh, T.: Securely computing the n-variable equality function with 2n cards. Theor. Comput. Sci. 887, 99\u2013110 (2021)","journal-title":"Theor. Comput. Sci."},{"key":"6_CR16","unstructured":"Shinagawa, K.: On the Construction of Easy to Perform Card-Based Protocols. Ph.D. thesis, Tokyo Institute of Technology (2020)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Shinagawa, K., et al.: Multi-party computation with small shuffle complexity using regular polygon cards. In: Provable Security. LNCS, vol.\u00a09451, pp. 127\u2013146. Springer, Cham (2015)","DOI":"10.1007\/978-3-319-26059-4_7"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Shinagawa, K., et al.: Card-based protocols using regular polygon cards. IEICE Trans. Fundam. E100.A(9), 1900\u20131909 (2017)","DOI":"10.1587\/transfun.E100.A.1900"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1016\/j.dam.2020.10.013","volume":"289","author":"K Shinagawa","year":"2021","unstructured":"Shinagawa, K., Nuida, K.: A single shuffle is enough for secure card-based computation of any Boolean circuit. Discret. Appl. Math. 289, 248\u2013261 (2021)","journal-title":"Discret. Appl. Math."},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Ueda, I., Nishimura, A., Hayashi, Y., Mizuki, T., Sone, H.: How to implement a random bisection cut. In: Theory and Practice of Natural Computing. LNCS, vol. 10071, pp. 58\u201369. Springer, Cham (2016)","DOI":"10.1007\/978-3-319-49001-4_5"}],"container-title":["Lecture Notes in Computer Science","Unconventional Computation and Natural Computation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-63742-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,17]],"date-time":"2024-06-17T20:12:13Z","timestamp":1718655133000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-63742-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031637414","9783031637421"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-63742-1_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"18 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"UCNC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Unconventional Computation and Natural Computation","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pohang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"uc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sites.google.com\/view\/ucnc-2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}