“…Works on implementing cryptographic protocols using physical objects are numerous, such as in [21]; or in [8] where a physical secure auction protocol was proposed. Other implementations have been studied using cards in [4,15], polarising plates [37], polygon cards [38], a standard deck of playing cards [18], using a PEZ dispenser [2,3], using a dial lock [19], using a 15 puzzle [20], or using a tamper-evident seals [23][24][25]. ZKP's for several other puzzles have been studied such as Sudoku [30,36], Akari [5], Takuzu [5,16], Kakuro [5,17], KenKen [5], Makaro [6,35], Norinori [9], Nonogram [7,29], Slitherlink [15], Suguru [27], Nurikabe [28], Ripple Effect [32], Numberlink [31], Bridges [33], and Cryptarithmetic [12].…”