{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T23:56:20Z","timestamp":1772927780381,"version":"3.50.1"},"reference-count":20,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Fundamentals"],"published-print":{"date-parts":[[2026,3,1]]},"DOI":"10.1587\/transfun.2025cip0014","type":"journal-article","created":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T22:06:44Z","timestamp":1756678004000},"page":"362-370","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Card-Based Protocols for Basic Arithmetic Operations"],"prefix":"10.1587","volume":"E109.A","author":[{"given":"Reo","family":"ERIGUCHI","sequence":"first","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology"}]},{"given":"Kazumasa","family":"SHINAGAWA","sequence":"additional","affiliation":[{"name":"National Institute of Advanced Industrial Science and Technology"},{"name":"Ibaraki University"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] B. Den Boer, \u201cMore efficient match-making and satisfiability the five card trick,\u201d Advances in Cryptology - EUROCRYPT\u201989, pp.208-217, 1990. 10.1007\/3-540-46885-4_23","DOI":"10.1007\/3-540-46885-4_23"},{"key":"2","doi-asserted-by":"publisher","unstructured":"[3] T. Mizuki and H. Shizuya, \u201cA formalization of card-based cryptographic protocols via abstract machine,\u201d Int. J. Inf. Secur., vol.13, no.1, pp.15-23, 2014. 10.1007\/s10207-013-0219-4","DOI":"10.1007\/s10207-013-0219-4"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[4] T. Nishida, Y. Hayashi, T. Mizuki, and H. Sone, \u201cCard-based protocols for any Boolean function,\u201d Theory and Applications of Models of Computation, pp.110-121, 2015. 10.1007\/978-3-319-17142-5_11","DOI":"10.1007\/978-3-319-17142-5_11"},{"key":"4","doi-asserted-by":"publisher","unstructured":"[5] K. Shinagawa and K. Nuida, \u201cA single shuffle is enough for secure card-based computation of any Boolean circuit,\u201d Discrete Applied Mathematics, vol.289, pp.248-261, 2021. 10.1016\/j.dam.2020.10.013","DOI":"10.1016\/j.dam.2020.10.013"},{"key":"5","doi-asserted-by":"publisher","unstructured":"[6] V. Niemi and A. Renvall, \u201cSolitaire zero-knowledge,\u201d Fundamenta Informaticae, vol.38, no.1,2, pp.181-188, 1999. 10.3233\/fi-1999-381214","DOI":"10.3233\/FI-1999-381214"},{"key":"6","doi-asserted-by":"publisher","unstructured":"[7] R. Gradwohl, M. Naor, B. Pinkas, and G.N. Rothblum, \u201cCryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles,\u201d Theory of Comput. Syst., vol.44, no.2, pp.245-268, 2009. 10.1007\/s00224-008-9119-9","DOI":"10.1007\/s00224-008-9119-9"},{"key":"7","doi-asserted-by":"crossref","unstructured":"[8] D. Miyahara, H. Haneda, and T. Mizuki, \u201cCard-based zero-knowledge proof protocols for graph problems and their computational model,\u201d Provable and Practical Security, pp.136-152, 2021. 10.1007\/978-3-030-90402-9_8","DOI":"10.1007\/978-3-030-90402-9_8"},{"key":"8","unstructured":"[9] R. Eriguchi, K. Shinagawa, and T. Murakami, \u201cCard-based cryptography meets differential privacy,\u201d 12th International Conference on Fun with Algorithms (FUN 2024), pp.12:1-12:20, 2024. 10.4230\/LIPIcs.FUN.2024.12"},{"key":"9","doi-asserted-by":"crossref","unstructured":"[10] S. Ruangwises and T. Itoh, \u201cSecurely computing the <i>n<\/i>-variable equality function with 2<i>n<\/i> cards,\u201d Theory and Applications of Models of Computation, pp.25-36, 2020. 10.1007\/978-3-030-59267-7_3","DOI":"10.1007\/978-3-030-59267-7_3"},{"key":"10","doi-asserted-by":"publisher","unstructured":"[11] K. Shinagawa, T. Mizuki, J. Schuldt, K. Nuida, N. Kanayama, T. Nishide, G. Hanaoka, and E. Okamoto, \u201cCard-based protocols using regular polygon cards,\u201d IEICE Trans. Fundamentals., vol.E100-A, no.9, pp.1900-1909, Sept. 2017. 10.1587\/transfun.e100.a.1900","DOI":"10.1587\/transfun.E100.A.1900"},{"key":"11","doi-asserted-by":"publisher","unstructured":"[12] K. Shinagawa, \u201cCard-based cryptography with dihedral symmetry,\u201d New Gener. Comput., vol.39, no.1, pp.41-71, 2021. 10.1007\/s00354-020-00117-9","DOI":"10.1007\/s00354-020-00117-9"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[13] K. Tozawa, H. Morita, and T. Mizuki, \u201cSingle-shuffle card-based protocol with eight cards per gate,\u201d Unconventional Computation and Natural Computation, pp.171-185, 2023. 10.1007\/978-3-031-34034-5_12","DOI":"10.1007\/978-3-031-34034-5_12"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[14] T. Ono, K. Shinagawa, T. Nakai, Y. Watanabe, and M. Iwamoto, \u201cSingle-shuffle card-based protocols with six cards per gate,\u201d Information Security and Cryptology - ICISC 2023, pp.157-169, 2024. 10.1007\/978-981-97-1238-0_9","DOI":"10.1007\/978-981-97-1238-0_9"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[15] T. Mizuki, I.K. Asiedu, and H. Sone, \u201cVoting with a logarithmic number of cards,\u201d Unconventional Computation and Natural Computation, pp.162-173, 2013. 10.1007\/978-3-642-39074-6_16","DOI":"10.1007\/978-3-642-39074-6_16"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[16] H. Shikata, K. Toyoda, D. Miyahara, and T. Mizuki, \u201cCard-minimal protocols for symmetric Boolean functions of more than seven inputs,\u201d Theoretical Aspects of Computing - ICTAC 2022, H. Seidl, Z. Liu, and C.S. Pasareanu, eds., LNCS, vol.13572, pp.388-406, Springer, Cham, 2022. 10.1007\/978-3-031-17715-6_25","DOI":"10.1007\/978-3-031-17715-6_25"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[17] S. Ruangwises, \u201cUsing five cards to encode each integer in \u2124\/6\u2124,\u201d Innovative Security Solutions for Information Technology and Communications, pp.165-177, 2022. 10.1007\/978-3-031-17510-7_12","DOI":"10.1007\/978-3-031-17510-7_12"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[18] S. Odaka and Y. Komano, \u201cCard-based arithmetic operations and application to statistical data aggregation,\u201d Innovative Security Solutions for Information Technology and Communications, pp.118-134, 2025. 10.1007\/978-3-031-87760-5_10","DOI":"10.1007\/978-3-031-87760-5_10"},{"key":"18","doi-asserted-by":"crossref","unstructured":"[19] R. Isuzugawa, D. Miyahara, and T. Mizuki, \u201cZero-knowledge proof protocol for Cryptarithmetic using dihedral cards,\u201d Unconventional Computation and Natural Computation, pp.51-67, 2021. 10.1007\/978-3-030-87993-8_4","DOI":"10.1007\/978-3-030-87993-8_4"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[20] T. Mizuki and H. Sone, \u201cSix-card secure AND and four-card secure XOR,\u201d Frontiers in Algorithmics, pp.358-369, 2009. 10.1007\/978-3-642-02270-8_36","DOI":"10.1007\/978-3-642-02270-8_36"},{"key":"20","doi-asserted-by":"publisher","unstructured":"[21] D. Miyahara, Y. Hayashi, T. Mizuki, and H. Sone, \u201cPractical card-based implementations of Yao\u2019s millionaire protocol,\u201d Theoretical Computer Science, vol.803, pp.207-221, 2020. 10.1016\/j.tcs.2019.11.005","DOI":"10.1016\/j.tcs.2019.11.005"}],"container-title":["IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E109.A\/3\/E109.A_2025CIP0014\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T04:11:03Z","timestamp":1772856663000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/transfun\/E109.A\/3\/E109.A_2025CIP0014\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,1]]},"references-count":20,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2026]]}},"URL":"https:\/\/doi.org\/10.1587\/transfun.2025cip0014","relation":{},"ISSN":["0916-8508","1745-1337"],"issn-type":[{"value":"0916-8508","type":"print"},{"value":"1745-1337","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,1]]},"article-number":"2025CIP0014"}}