Abstract
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players’ private inputs.
Similar content being viewed by others
Avoid common mistakes on your manuscript.
1 Introduction
1.1 Backgrounds
Secure computation is a cryptographic protocol that enables mutually distrustful parties to compute a function jointly while keeping their inputs secret [6, 29]. While general cryptographic protocols are supposed to be implemented on computers, there is a line of work to realize it using physical objects with manual operations. Such protocols are suitable as educational and recreational tools since they allow for hands-on and visual understanding of the procedures.
Card-based cryptography is a variant of secure computation, which is realized with physical cards [4, 5, 17]. Most of the existing works for card-based cryptography are based on two-colored cards, e.g., [5, 8, 16, 18, 19, 23, 28]. They use two types of cards such that the faces have different colors, black and red
, and the same type of cards are indistinguishable. Their backsides have the same suit
. Besides, some works use a standard deck of cards (or playing cards), such as typically used to play the poker game [7, 9, 15, 24]. Unlike two-colored cards, each playing card in a deck is identifiable since every card has a unique face pattern. Hence, it requires different techniques to construct a protocol using playing cards than two-colored ones.
In addition to the card types, we can classify card-based protocols with operating models. There are two types of operating models in card-based cryptography: public and private models. The public model supposes that all operations are done publicly. The shuffle is a key operation to achieve the privacy of players’ inputs under the condition that all operations are made public. It enables players to generate a random number that no players can identify in a public area. In this model, using face-down cards is the only way to express players’ inputs in a secret state. Since at least two cards are necessary for an arbitrary representation of a binary value, an n-bit input protocol must use at least 2n cards.
The private model allows players to operate cards privately [13, 22], such as by hiding cards behind their backs. Precisely, instead of the shuffle, this model uses a private permutation, an operation to permute a card order privately, and a communication, an operation to pass cards to another player. It is known that this model allows us to break the lower bound regarding the number of cards in the public model. This is thanks to the fact that players can express their inputs secretly by using private permutations depending on the values. Indeed, several works showed n-bit input protocols with less than 2n cards [2, 3, 20, 21, 25]. These results, however, are only for the two-colored card setting. Hence, it is non-trivial whether the private model can break the lower bound in the playing card setting.
1.2 Our Contribution
This paper is devoted to showing that the private model can break the lower bound of the public model in the playing card setting. For some specific functions, we demonstrate that an n-bit input protocol can be realized with less than 2n playing cards: We first show that a two-bit input AND protocol can be realized with three cards (see Table 1). Note that the public model requires at least four cards to implement the protocol. Afterwards, we show that a two-bit input OR protocol can be realized by applying the De Morgan’s law to this protocol. Furthermore, we present a two-bit input XOR protocol using two cards. Based on the above AND and OR protocols, we construct a three-input majority voting protocol using only three cards (see Table 2). This is the first work to realize a three-input majority voting protocol using playing cards in the private model.
Notably, none of our proposed protocols depend on players’ private randomness. That is, there is no operation that generates a random number. This is the preferable property since a random generation is generally a very costly operation.
2 Preliminaries
2.1 Settings and Notations
We consider an honest-but-curious adversary that exactly follows a protocol but is curious to learn anything more from rightfully obtained information. A protocol fulfills privacy if an arbitrary player cannot learn any additional information than the output from his/her view of the protocol.
Two-colored cards. Card-based cryptography based on two-colored cards uses black and red
cards. (For simplicity, we sometimes omit the frame and write them as \(\clubsuit \) and \(\heartsuit \).) Their back sides have the same pattern and indistinguishable, described as
.
Playing cards. Excluding the joker, playing cards consist of 52 distinct cards. To represent a card deck of playing cards, we use the following notation:
![](http://media.springernature.com/lw244/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Equ3_HTML.png)
As in the two-colored card setting, all cards have the same pattern on their backs.
2.2 Operating Models
2.2.1 Public Model
In the public model, players perform all card operations in a public area, such as on the table. A protocol based on this model consists of three operations: permutation, reverse, and shuffle. The permutation is to change a card order deterministically. The reverse is an operation to change the face of a card. The shuffle is a probabilistic permutation to a card order, which is a key ingredient to achieve privacy under the setting that all operations are run publicly. While a shuffle is performed in a public area, it assumes that the permutation result cannot be identified for all players, including the player who runs it. A known method of implementing a shuffle is repeating permutation with sufficient times. Thus, the shuffle is the most costly operation. The computational cost of a protocol is evaluated with the number of shuffles.
In the public model, using face-down cards is the only way to express a player’s input value privately. Also, a party must use at least two cards to express an arbitrary Boolean value, such as the following encoding:
![](http://media.springernature.com/lw309/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Equ4_HTML.png)
where \(1 \le i<j \le 52\). We call a face-down cards expressing a Boolean value a commitment. Note that, even if we encode a bit using a single card, such as \(\clubsuit =0,\,\heartsuit =1\), a player must hold two cards to represent an arbitrary Boolean value. Thus, 2n cards are necessary to realize an n-bit input protocol.
2.2.2 Private Model
This model allows players to permute cards secretly, such as by hiding them behind their backs. It consists of the following operations.
-
Public permutation: permuting a card order publicly.
-
Private permutation (PP): permuting a card order privately.
-
Public reverse: changing the face of a card publicly.
-
Communication: handing over cards to another player.
The computational cost is evaluated by the number of PPs and communications. Although the PP allows players to permute a card order depending on their randomness, generating a random number puts a burden on the player. From this viewpoint, we further add the number of random generation processes to the efficiency evaluation.
We can realize a shuffle with the combination of PPs and communications [22]. Thus, a protocol based on the public model can be executed on the private model by converting each shuffle to a combination of PPs and communications. On the other hand, since a PP enables players’ malicious behaviors, the private model needs to assume the semi-honest model that deals with only honest-but-curious adversaries.Footnote 1
The private model allows a player to express his/her input using PP instead of the commitment. Thanks to this fact, the private model can break the lower bounds 2n regarding the number of cards in the public model. As an example, we show Marcedone et al.’s work [13] for secure AND protocol. Protocol 1 shows the procedure. Since a secure AND protocol is 2-bit inputs, four cards are necessary to realize the protocol in the public model. On the other hand, Protocol 1 breaks the lower bound and uses only three cards by using a PP-based input. See steps 1 and 3. Although Alice uses a commitment to express her input, Bob expresses his input by a PP and does not use any additional cards. It is known that the lower bound can be broken for various protocols other than secure AND protocol using PPs [2, 3, 20, 21, 25].
![figure a](http://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Figa_HTML.png)
3 Proposed Protocols for Logic Gates with Playing Cards
This section shows three protocols based on playing cards; three-card AND, three-card OR, and two-card XOR protocols. In this section, let Alice and Bob hold \(a,b \in \{0,1\}\), respectively.
3.1 Three-Card AND Protocol
We first show our three-card AND protocol, which is based on Protocol 1. Before presenting our construction, we observe the problems that arise when the cards in Protocol 1 are simply replaced by playing cards.
By replacing two club cards with and a heart card with
, the first step becomes as follows:
![figure b](http://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Figb_HTML.png)
Suppose that we thereafter apply the same steps as Protocol 1. In other words, Alice and Bob perform steps 2–4 in Protocol 1 after the above step 1.
Table 3 is the card order at step 4. See the left card of each row, which is the revealed card at the step. Since the card is only if \(a \wedge b =1\), the protocol fulfills the correctness. However, the protocol does not achieve the privacy. It is due to the fact that the reveal card has two patterns, i.e.,
and
, when \(a\wedge b=0\). For instance, if the revealed card is
, players can identify the inputs as \((a,b)=(0,1)\). To resolve this issue, we modify the protocol so that the revealed card is the same for the three cases regarding \(a \wedge b =0\).
We here observe the card order of the output phase, i.e., step 4, from Alice’s view, and realize the modification. Since Bob does not touch the right card, Alice can identify it as follows:
-
If \(a=0\), the right card is
.
-
If \(a=1\), the right card is
.
Note that, if \(a=0\), Alice knows that the output always becomes zero regardless of Bob’s input. We utilize this fact and modify the protocol so that Alice chooses as the output when \(a=0\), i.e., she chooses the right card as the output if \(a=0\). That is, the modified protocol applies
to the output card representing \(a \wedge b=0\).
See Table 3, the card orders corresponding to \(a=1\) are as follows:
-
If \(b=0\), the card order is
.
-
If \(b=1\), the card order is
.
Since we assigned as the output card to express \(a \wedge b=0\), it must be the output also when \((a,b)=(1,0)\). Thus, Alice chooses the center card as the output if \(a=1\) in our modification. As a result,
is always revealed when \(a \wedge b =0\). Also, only when \(a \wedge b =1\),
becomes the output card. In summary, our three-card AND protocol proceeds as in Protocol 2. Note that step 5 corresponds to additional Alice’s process discussed above.
Security Proof of Protocol 2. We first note that, in an AND protocol, a player who inputs 1 can uniquely identify the other player’s input from the output. For achieving the privacy, it is necessary to guarantee that a player whose input is 0 cannot identify the other player’s input. See Table 4 that shows the card order at step 6 of Protocol 2. The output card corresponding to \(a \wedge b=0\) is always . That is, it is the same for the three cases, \((a,b)=(0,0),(0,1),(1,0)\). (Note that the output card is only card that is revealed in the protocol.) Hence, in the case of \(a=0\), Alice cannot tell whether \(b=0\) or not since she cannot distinguish between the two cases, \((a,b)=(0,0),(0,1)\). This is also true for Bob. In the case of \(b=0\), Bob cannot identify whether \((a,b)=(0,0)\) or \((a,b)=(1,0)\), and cannot learn anything about Alice’s input. Moreover, all operations depending on players’ inputs are hidden to the other players by the assumption of PP. Hence, no information beyond the output leaks from the process, and thus the protocol fulfills privacy. \(\square \)
![figure c](http://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Figc_HTML.png)
![figure d](http://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Figd_HTML.png)
![figure e](http://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Fige_HTML.png)
![figure f](http://media.springernature.com/lw685/springer-static/image/art%3A10.1007%2Fs00354-024-00269-y/MediaObjects/354_2024_269_Figf_HTML.png)
3.2 Three-Card OR Protocol
This subsection presents our three-card OR protocol, which is constructed based on the AND protocol. We aim to construct it such that the output format is the same as the AND protocol. That is, and
represent \(a \vee b=0\) and \(a \vee b =1\), respectively. The format match is helpful to construct a three-input majority voting protocol, described in Sect. 4.
To derive from the AND protocol to an OR protocol, we use the De Morgan’s law, \(a \vee b = \lnot (\lnot a \wedge \lnot b)\). From the equation, we can construct an OR protocol by making the following two changes to the AND protocol.
-
I.
Negating the input values.
-
II.
Negating the output value.
Change I can be easily realized by which Alice and Bob inputs \(\lnot a\) and \(\lnot b\), respectively. (See Table 5 that shows the result of applying change I to Protocol 2.)
Regarding change II, note that it is non-trivial to apply the negation operation to the output since we use a single card to express a bit.Footnote 2 We realize the negation by interchanging the positions of and
in the output phase. To realize the interchange, we swap
and
in Alice’s first card arrangement. By this swapping, the positions of
and
in the output phase are reversed, and we obtain the negation.
Protocol 3 shows our three-card OR protocol that is achieved by applying changes I and II to our three-card AND protocol. See step 1 that corresponds to change II. Compared to step 1 of Protocol 2, we can see that the placements of and
are reversed. (Note that change I reverses the sequences of cards \(a=0\) and \(a=1\) in the step.)
See Table 6 that shows the card order at step 6. We can see the correctness from the table. Since we can confirm the privacy by the same way as Protocol 2, we omit the proof here.
3.3 Two-Card XOR Protocol
Nakai et al. [21] showed a two-card XOR protocol in the two-colored setting. Note that for protocols consisting of two cards, there is no difference between the two-colored and the playing-card settings. That is, by mapping cards as and
, we can convert a protocol with two-colored cards into a protocol with the playing cards that achieves the same functionality. Protocol 4 presents the two-card XOR protocol realized by mapping cards of Nakai et al.’s protocol as the above.
4 Three-input Majority Voting Protocol with Three Playing Cards
This section shows our three-input majority voting protocol with three cards. In this section, let Alice, Bob, and Carol hold \(a,b,c \in \{0,1\}\), respectively. The function for three-input majority voting is formally described as:
4.1 Idea of Our Construction
Following Nakai et al.’s work [21], to construct a three-input majority voting protocol, we use the following equation:
That is, we obtain the protocol by constructing a protocol that outputs \(a \wedge b\) for \(c=0\) and \(a \vee b\) for \(c=1\).
Recall changes I and II used to convert the AND protocol into the OR protocol, described in Sect. 3.2. In our three-input majority voting protocol, Alice and Bob perform the same procedure as the AND protocol. Intuitively, Carol takes on the role of deciding whether or not to apply changes I and II to their protocol. That is, if \(c=0\), she does virtually nothing, and Alice and Bob run the AND protocol as is. Otherwise, Carol applies changes I and II to the AND protocol secretly, Alice and Bob run the OR protocol without realizing this fact. As a result, they can obtain \(a \wedge b\) or \(a \vee b\) according to Carol’s input as described in Eq. (2) without revealing Carol’s input.
As an important point, players can obtain \(a \wedge b\) and \(a \vee b\) as the same encoding, i.e., and
express zero and one, respectively, for both cases. Thanks to this, Alice and Bob cannot tell whether the output corresponds to the AND or OR operation and do not learn Carol’s input from patterns of the output card.
4.2 Three-input Majority Voting Protocol
Protocol 5 shows our three-input majority voting protocol based on the idea, shown in the previous subsection. See step 1 that corresponds to change II. Indeed, in the case of \(c=0\), the card order at the end of step 3 is if \(a=0\) and
otherwise. That is the same result as Alice’s first arrangement of Protocol 2. Similarly, in the case of \(c=1\), the card order at the end of step 3 is
if \(a=0\) and
otherwise, which is the same result as Alice’s first arrangement of Protocol 3.
Step 9 corresponds to change I. That is, Carol’s permutation in step 9 with \(c=1\) realizes negations for Alice and Bob’s inputs in steps 5 and 7. Table 7 shows the card order at step 10 of Protocol 5. From the table, we can see that the card order for \(c=0\) (resp. \(c=1\)) is the same as the AND (resp. OR) protocol (see also Tables 4 and 6).
Security Proof of Protocol 5. The output card corresponding to \(\textsf{maj}(a,b,c)=0\) and \(\textsf{maj}(a,b,c)=1\) is always and
, respectively. Hence, players cannot get more information than the output from the revealed card at step 10. Moreover, all operations depending on players’ inputs are kept secret by the assumption of PP. Hence, no information beyond the output leaks from the process, and thus the protocol fulfills privacy. \(\square \)
5 Conclusion
This paper focused on card-based cryptography using a standard deck of cards in the private model. Using two-colored cards, it is known that the private model can break the lower bound regarding the number of cards in the public model. Our motivation was to show that we can break the lower bound based also on a deck of cards.
We first showed efficient protocols for two-input AND, OR, and XOR operations. Note that four cards are necessary to construct these protocols in the public model. Based on Marcedone et al.’s work [13], we constructed a three-card AND protocol. By applying De Morgan’s law to this protocol, we realized a three-card OR protocol. Also, we presented a two-card XOR protocol based on Nakai et al.’s work [21]. Furthermore, we proposed three-input majority voting protocols using only three cards. Based on Eq. (2), this protocol was constructed by the composition of our AND and OR protocols. As a notable feature, our protocols rely on no players’ randomness, i.e., there is no need to generate a random number in an arbitrary process.
Data availability
No data was used for the research described in the article.
References
Abe, Y., Iwamoto, M., Ohta, K.: How to detect malicious behaviors in a card-based majority voting protocol with three inputs. In: 2020 International Symposium on Information Theory and Its Applications (ISITA), pp. 377–381 (2020)
Abe, Y., Nakai, T., Kuroki, Y., Suzuki, S., Koga, Y., Watanabe, Y., Iwamoto, M., Ohta, K.: Efficient card-based majority voting protocols. New Gen. Comput. 40(1), 173–198 (2022)
Abe, Y., Nakai, T., Watanabe, Y., Iwamoto, M., Ohta, K.: A computationally efficient card-based majority voting protocol with fewer cards in the private model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E106.A(3), 315–324 (2023)
Crépeau, C., Kilian, J.: Discreet solitary games. In: Advances in Cryptology—CRYPTO ’93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22–26, 1993, Proceedings, pp. 319–330 (1993)
den Boer, B.: More efficient match-making and satisfiability: the five card trick. In: Advances in Cryptology—EUROCRYPT ’89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10–13, 1989, Proceedings, pp. 208–217 (1989)
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, STOC ’87, pp. 218–229. Association for Computing Machinery (1987)
Koch, A., Schrempp, M., Kirsten, M.: Card-based cryptography meets formal verification. In: Advances in Cryptology—ASIACRYPT 2019, pp. 488–517. Springer International Publishing, Cham (2019)
Koch, A., Walzer, S., Härtel, K.: Card-based cryptographic protocols using a minimal number of cards. In: Advances in Cryptology—ASIACRYPT 2015—21st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part I, pp. 783–807 (2015)
Koyama, H., Miyahara, D., Mizuki, T., Sone, H.: A secure three-input and protocol with a standard deck of minimal cards. In: Computer Science—Theory and Applications: 16th International Computer Science Symposium, CSR 2021, Proceedings, pp. 242–256. Springer, Berlin (2021)
Koyama, H., Miyahara, D., Mizuki, T., Sone, H.: Three-input and and majority protocols with a standard deck of cards. In: Proceedings of 2021 Symposium on Cryptography and Information Security (SCIS2021), pp. 2F2–2 (2021) (in Japanese)
Manabe, Y., Ono, H.: Card-based cryptographic protocols with a standard deck of cards using private operations. In: Theoretical Aspects of Computing—ICTAC 2021, pp. 256–274. Springer International Publishing, Cham (2021)
Manabe, Y., Ono, H.: Card-based cryptographic protocols with malicious players using private operations. New Gen. Comput. 40(1), 67–93 (2022)
Marcedone, A., Wen, Z., Shi, E.: Secure dating with four or fewer cards. Cryptology ePrint Archive, Report 2015/1031 (2015). https://eprint.iacr.org/2015/1031
Mizuki, T.: A note on secure computations with commercially available playing cards. IEICE Technical Report 114(470), 179–186 (2015)
Mizuki, T.: Efficient and secure multiparty computations using a standard deck of playing cards. In: Cryptology and Network Security—15th International Conference, CANS, Proceedings, pp. 484–499 (2016)
Mizuki, T., Kumamoto, M., Sone, H.: The five-card trick can be done with four cards. In: Advances in Cryptology—ASIACRYPT 2012—18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2–6, 2012. Proceedings, pp. 598–606 (2012)
Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Sec. 13(1), 15–23 (2014)
Mizuki, T., Sone, H.: Six-card secure AND and four-card secure XOR. In: Frontiers in Algorithmics, Third International Workshop, FAW 2009, Hefei, China, June 20–23, 2009. Proceedings, pp. 358–369 (2009)
Mizuki, T., Uchiike, F., Sone, H.: Securely computing XOR with 10 cards. Australas. J. Combin. 36, 279–293 (2006)
Nakai, T., Misawa, Y., Tokushige, Y., Iwamoto, M., Ohta, K.: How to solve millionaires’ problem with two kinds of cards. New Gen. Comput. 39, 73–96 (2021)
Nakai, T., Shirouchi, S., Tokushige, Y., Iwamoto, M., Ohta, K.: Secure computation for threshold functions with physical cards: power of private permutations. New Gen. Comput. 40(1), 95–113 (2022)
Nakai, T., Tokushige, Y., Misawa, Y., Iwamoto, M., Ohta, K.: Efficient card-based cryptographic protocols for millionaires’ problem utilizing private permutations. In: Cryptology and Network Security—15th International Conference, CANS, 2016, Proceedings, pp. 500–517 (2016)
Niemi, V., Renvall, A.: Secure multiparty computations without computers. Theor. Comput. Sci. 191(1–2), 173–183 (1998)
Niemi, V., Renvall, A.: Solitaire zero-knowledge. Fundam. Inf. 38, 181–188 (1999)
Ono, H., Manabe, Y.: Efficient card-based cryptographic protocols for the millionaires’ problem using private input operations. In: 2018 13th Asia Joint Conference on Information Security (AsiaJCIS), pp. 23–28 (2018)
Ono, H., Manabe, Y.: Minimum round card-based cryptographic protocols using private operations. Cryptography 5(3) (2021)
Shimizu, Y., Kishi, Y., Sasaki, T., Fujioka, A.: Card-based cryptographic protocols with private operations which can prevent malicious behaviors. In: IEICE Techinical Report ISEC2017-113, pp. 129–135 (2018) (in Japanese)
Stiglic, A.: Computations with a deck of cards. Theor. Comput. Sci. 259(1–2), 671–678 (2001)
Yao, A.C.-C.: How to generate and exchange secrets. In: Proceedings of the 27th Annual Symposium on Foundations of Computer Science, FOCS ’86, pp. 162–167. IEEE Computer Society (1986)
Acknowledgements
This work was supported by JSPS KAKENHI Grant Numbers JP23H00468, JP23H00479, JP23K16880, JP23K17455, JP23K24846, JP23K21644, JP23K21668, JP22H03590, JP22KJ1362, JP21H03441, JP21H03395, and JP18H05289, JST CREST JPMJCR23M2, and MEXT Leading Initiative for Excellent Young Researchers.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
This article is published under an open access license. Please check the 'Copyright Information' section either on this page or in the PDF for details of this license and what re-use is permitted. If your intended use exceeds what is permitted by the license or if you are unable to locate the licence and re-use information, please contact the Rights and Permissions team.
About this article
Cite this article
Nakai, T., Iwanari, K., Ono, T. et al. Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model. New Gener. Comput. (2024). https://doi.org/10.1007/s00354-024-00269-y
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s00354-024-00269-y