Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks

被引:0
|
作者
Takahashi, Yoshihiro [1 ]
Shinagawa, Kazumasa [2 ]
Shikata, Hayato [3 ]
Mizuki, Takaaki [4 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki, Japan
[2] Ibaraki Univ, AIST, Hitachi, Ibaraki, Japan
[3] Tohoku Univ, Sendai, Miyagi, Japan
[4] Tohoku Univ, AIST, Sendai, Miyagi, Japan
来源
PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024 | 2024年
关键词
Card-based cryptography; Secure computation; Symmetric function; CRYPTOGRAPHIC PROTOCOLS; SECURE; COMPUTATIONS;
D O I
10.1145/3659467.3659902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is an area involving cryptographic techniques that use a deck of physical cards to implement secure computation. In this paper, we study card-based cryptographic protocols for symmetric functions.. : {0, 1}(n) -> R, where R is an arbitrary finite set. Any symmetric Boolean function has the property that its output value is determined only by the sum of input bits, and the class of them includes many interesting functions such as the AND and equality functions. In 2020, Ruangwises and Itoh proposed a protocol which uses 2n +2 cards to securely compute any symmetric function f :{0, 1}(n) -> R reducing the number of cards to less than 2n + 2 was left as an open problem. While the Ruangwises-Itoh protocol uses a two-colored deck of cards, this paper considers using three-colored and four-colored decks: to give a partial answer to the open problem, we propose three protocols for symmetric functions using 2n + 1 cards or less. Specifically, we first propose a protocol using 2n + 1 cards from a three-colored deck. We then propose two protocols using 2n cards from a four-colored deck; one is a simpler protocol and the other is a more shuffle-efficient protocol.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 41 条
  • [1] Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
    Nakai, Takeshi
    Iwanari, Keita
    Ono, Tomoki
    Abe, Yoshiki
    Watanabe, Yohei
    Iwamoto, Mitsugu
    NEW GENERATION COMPUTING, 2024, 42 (03) : 345 - 358
  • [2] Analyzing Execution Time of Card-Based Protocols
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
  • [3] Efficient Card-Based Majority Voting Protocols
    Yoshiki Abe
    Takeshi Nakai
    Yoshihisa Kuroki
    Shinnosuke Suzuki
    Yuta Koga
    Yohei Watanabe
    Mitsugu Iwamoto
    Kazuo Ohta
    New Generation Computing, 2022, 40 : 173 - 198
  • [4] Card-Based Cryptographic Protocols Using a Minimal Number of Cards
    Koch, Alexander
    Walzer, Stefan
    Haertel, Kevin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 783 - 807
  • [5] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
  • [6] Card-based protocols using unequal division shuffles
    Nishimura, Akihiro
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    SOFT COMPUTING, 2018, 22 (02) : 361 - 371
  • [7] Card-Based Protocols Using Regular Polygon Cards
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Schuldt, Jacob C. N.
    Nuida, Koji
    Kanayama, Naoki
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1900 - 1909
  • [8] Efficient Card-based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 23 - 28
  • [9] Card-Based Cryptographic Protocols for Three-Input Functions Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    COMBINATORIAL ALGORITHMS, IWOCA 2021, 2021, 12757 : 469 - 484
  • [10] Evaluating card-based protocols in terms of execution time
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) : 729 - 740