{"id":2001755,"updated":"2025-05-01T05:04:31.464264+00:00","links":{},"created":"2025-04-09T00:41:25.419305+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:02001755","sets":["581:11839:11843"]},"path":["11843"],"owner":"80578","recid":"2001755","title":["Card Protocols that Allow You to Switch Cards to Mahjong Tiles"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2025-04-15"},"_buckets":{"deposit":"cc9a57d2-a7d8-47cb-b93b-5ba3950bb429"},"_deposit":{"id":"2001755","pid":{"type":"depid","value":"2001755","revision_id":0},"owners":[80578],"status":"published","created_by":80578},"item_title":"Card Protocols that Allow You to Switch Cards to Mahjong Tiles","author_link":[],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Card Protocols that Allow You to Switch Cards to Mahjong Tiles","subitem_title_language":"ja"},{"subitem_title":"Card Protocols that Allow You to Switch Cards to Mahjong Tiles","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"[一般論文(推薦論文)] card-based protocols, non-committed protocols, random cut, m-deck partitioning method, association schemes","subitem_subject_scheme":"Other"}]},"item_type_id":"2","publish_date":"2025-04-15","item_2_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Internet Initiative Japan Inc."}]},"item_2_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Internet Initiative Japan Inc.","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"control_number":"2001755","publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/2001755/files/IPSJ-JNL6604011.pdf","label":"IPSJ-JNL6604011.pdf"},"date":[{"dateType":"Available","dateValue":"2027-04-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-JNL6604011.pdf","filesize":[{"value":"2.9 MB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"5"},{"tax":["include_tax"],"price":"0","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"8"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"0b0d08db-e799-4bea-aff2-fe3c6121db18","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2025 by the Information Processing Society of Japan"}]},"item_2_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuji,Suga"}]}]},"item_2_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Yuji Suga","creatorNameLang":"en"}]}]},"item_2_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AN00116647","subitem_source_identifier_type":"NCID"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_6501","resourcetype":"journal article"}]},"item_2_publisher_15":{"attribute_name":"公開者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"item_2_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"1882-7764","subitem_source_identifier_type":"ISSN"}]},"item_2_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Card-based cryptographic protocols are useful for performing secure computations using physical cards instead of digital systems and are well-suited for educational purposes, especially for those new to studying multi-party computation (MPC). In this paper, we investigate using cards (such as business cards or mahjong tiles) with the same design on the back, but the front sides can face different directions. These cards are defined as those whose backs are indistinguishable and whose fronts can be differentiated based on the top and bottom. Mahjong tiles, painted the same color on the back, cannot be differentiated from the back even when swapped. Thus, tiles whose fronts show different designs when swapped can be used as top and bottom cards. Here, we examine the practical feasibility of implementing such protocols, focusing on whether the shuffle is practical. We present a realistic method to determine if protocols using up-down cards can be implemented by replacing cards with mahjong tiles. Additionally, we introduce the construction of a new protocol specifically for shuffling mahjong tiles. This study aims to provide a practical approach to utilizing up-down cards in secure and efficient card protocols, demonstrating their versatility and applicability in real-world scenarios.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.33(2025) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.33.276\n------------------------------","subitem_description_type":"Other"}]},"item_2_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Card-based cryptographic protocols are useful for performing secure computations using physical cards instead of digital systems and are well-suited for educational purposes, especially for those new to studying multi-party computation (MPC). In this paper, we investigate using cards (such as business cards or mahjong tiles) with the same design on the back, but the front sides can face different directions. These cards are defined as those whose backs are indistinguishable and whose fronts can be differentiated based on the top and bottom. Mahjong tiles, painted the same color on the back, cannot be differentiated from the back even when swapped. Thus, tiles whose fronts show different designs when swapped can be used as top and bottom cards. Here, we examine the practical feasibility of implementing such protocols, focusing on whether the shuffle is practical. We present a realistic method to determine if protocols using up-down cards can be implemented by replacing cards with mahjong tiles. Additionally, we introduce the construction of a new protocol specifically for shuffling mahjong tiles. This study aims to provide a practical approach to utilizing up-down cards in secure and efficient card protocols, demonstrating their versatility and applicability in real-world scenarios.\n------------------------------\nThis is a preprint of an article intended for publication Journal of\nInformation Processing(JIP). This preprint should not be cited. This\narticle should be cited as: Journal of Information Processing Vol.33(2025) (online)\nDOI http://dx.doi.org/10.2197/ipsjjip.33.276\n------------------------------","subitem_description_type":"Other"}]},"item_2_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographic_titles":[{"bibliographic_title":"情報処理学会論文誌"}],"bibliographicIssueDates":{"bibliographicIssueDate":"2025-04-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"4","bibliographicVolumeNumber":"66"}]},"relation_version_is_last":true,"weko_creator_id":"80578"}}