TY - GEN
T1 - Cyclic Equalizability of Words and Its Application to Card-Based Cryptography
AU - Shinagawa, Kazumasa
AU - Nuida, Koji
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2026.
PY - 2026
Y1 - 2026
N2 - Card-based cryptography is a research area to implement cryptographic procedures using a deck of physical cards. In recent years, it has been found to be related to finite group theory and algebraic combinatorics, and is becoming more and more closely connected to the field of mathematics. In this paper, we discuss the relationship between card-based cryptography and combinatorics on words for the first time. In particular, we focus on cyclic equality of words. We say that a set of words are cyclically equalizable if they can be transformed to be cyclically equal by repeated simultaneous insertion of letters. The main result of this paper is to show that two binary words of equal length and equal Hamming weight are cyclically equalizable. As applications of cyclic equalizability to card-based cryptography, we describe its applications to the information erasure problem and to single-cut full-open protocols.
AB - Card-based cryptography is a research area to implement cryptographic procedures using a deck of physical cards. In recent years, it has been found to be related to finite group theory and algebraic combinatorics, and is becoming more and more closely connected to the field of mathematics. In this paper, we discuss the relationship between card-based cryptography and combinatorics on words for the first time. In particular, we focus on cyclic equality of words. We say that a set of words are cyclically equalizable if they can be transformed to be cyclically equal by repeated simultaneous insertion of letters. The main result of this paper is to show that two binary words of equal length and equal Hamming weight are cyclically equalizable. As applications of cyclic equalizability to card-based cryptography, we describe its applications to the information erasure problem and to single-cut full-open protocols.
KW - Card-based cryptography
KW - Combinatorics on words
UR - https://www.scopus.com/pages/publications/105017372356
UR - https://www.scopus.com/pages/publications/105017372356#tab=citedBy
U2 - 10.1007/978-3-032-04700-7_30
DO - 10.1007/978-3-032-04700-7_30
M3 - Conference contribution
AN - SCOPUS:105017372356
SN - 9783032046994
T3 - Lecture Notes in Computer Science
SP - 406
EP - 419
BT - Fundamentals of Computation Theory - 25th International Symposium, FCT 2025, Proceedings
A2 - Jez, Artur
A2 - Otop, Jan
PB - Springer Science and Business Media Deutschland GmbH
T2 - 25th International Symposium on Fundamentals of Computation Theory, FCT 2025
Y2 - 15 September 2025 through 17 September 2025
ER -