Air pollution is a pressing issue in cities, and managing air quality poses a challenge for urban designers and decision-makers. This study proposes a Digital Twin (DT) Smart City integrated with Mixed Reality technol...
详细信息
This study addresses the Testing Facility Location with Constrained Queue Time Problem. This optimization problem focuses on determining the best places to deploy testing sites and their available testers for infectio...
详细信息
In real world applications of multiclass classification models, misclassification in an important class (e.g., stop sign) can be significantly more harmful than in other classes (e.g., no parking). Thus, it is crucial...
详细信息
This research shows that social learning can be used to increase an organization's cybersecurity maturity level. Using a literature study and case study approach. Literature studies are used to identify social lea...
详细信息
Some Web browsers working on certain operating systems (OSs) specify that a single-word search query entered into the search bar be sent to the recursive resolver of the domain name system (DNS) as a DNS request that ...
详细信息
Federated graph attention networks (FGATs) are gaining prominence for enabling collaborative and privacy-preserving graph model training. The attention mechanisms in FGATs enhance the focus on crucial graph features f...
详细信息
One way to increase solar photovoltaic penetration in the grid is management of voltage fluctuations. This is because a photovoltaic plant cannot be interconnected to the grid if it causes voltage violations. Voltage ...
详细信息
This working-in-progress paper aims to present a three-dimensional reconstruction using aerial images in different environments. The experiments were conducted with aircraft in both external and internal settings, sta...
详细信息
The process of using ICT to provide services to the public is known as the Indonesian e-Government system, or Sistem Pemerintahan Berbasis Elektronik (SPBE). The e-Government initiative in Jakarta Provincial Health Of...
详细信息
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a lin...
详细信息
A Zero-Knowledge Proof (ZKP) protocol allows a participant to prove the knowledge of some secret without revealing any information about it. While such protocols are typically executed by computers, there exists a line of research proposing physical instances of ZKP protocols. Up to now, many card-based ZKP protocols for pen-and-pencil puzzles, like Sudoku, have been designed. Those games, mostly edited by Nikoli, have simple rules, yet designing them in card-based ZKP protocols is non-trivial. In this work, we propose a card-based ZKP protocol for Usowan, a Nikoli game. In Usowan, for each room of a puzzle instance, there is exactly one piece of false information. The goal of the game is to detect this wrong data amongst the correct data and also to satisfy the other rules. Designing a card-based ZKP protocol to deal with the property of detecting a liar has never been done. In some sense, we propose a physical ZKP for hiding of a liar. This work extends a previous paper appearing in Ref. [1]. In this extension, we propose two other protocols, for Herugolf and Five Cells. The puzzles are specifically chosen because each of those three puzzles shares a common constraint, connectivity. However, showing the connected configuration cannot be done with generic approach and brings new construction to the existing connectivity ZKP protocol. Indeed, in Herugolf, the connectivity is handled with a given length of cell which is decremental (i.e., the length of each connected cell decreases by one at each step). For Five Cells, there is an additional step in the setup allowing to encode all the information needed to ensure a valid ZKP protocol.
暂无评论