Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks

被引:0
|
作者
Takahashi, Yoshihiro [1 ]
Shinagawa, Kazumasa [2 ]
Shikata, Hayato [3 ]
Mizuki, Takaaki [4 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki, Japan
[2] Ibaraki Univ, AIST, Hitachi, Ibaraki, Japan
[3] Tohoku Univ, Sendai, Miyagi, Japan
[4] Tohoku Univ, AIST, Sendai, Miyagi, Japan
来源
PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024 | 2024年
关键词
Card-based cryptography; Secure computation; Symmetric function; CRYPTOGRAPHIC PROTOCOLS; SECURE; COMPUTATIONS;
D O I
10.1145/3659467.3659902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is an area involving cryptographic techniques that use a deck of physical cards to implement secure computation. In this paper, we study card-based cryptographic protocols for symmetric functions.. : {0, 1}(n) -> R, where R is an arbitrary finite set. Any symmetric Boolean function has the property that its output value is determined only by the sum of input bits, and the class of them includes many interesting functions such as the AND and equality functions. In 2020, Ruangwises and Itoh proposed a protocol which uses 2n +2 cards to securely compute any symmetric function f :{0, 1}(n) -> R reducing the number of cards to less than 2n + 2 was left as an open problem. While the Ruangwises-Itoh protocol uses a two-colored deck of cards, this paper considers using three-colored and four-colored decks: to give a partial answer to the open problem, we propose three protocols for symmetric functions using 2n + 1 cards or less. Specifically, we first propose a protocol using 2n + 1 cards from a three-colored deck. We then propose two protocols using 2n cards from a four-colored deck; one is a simpler protocol and the other is a more shuffle-efficient protocol.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 41 条
  • [21] Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations
    Nakai, Takeshi
    Tokushige, Yuuki
    Misawa, Yuto
    Iwamoto, Mitsugu
    Ohta, Kazuo
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 500 - 517
  • [22] Information leakage due to operative errors in card-based protocols
    Mizuki, Takaaki
    Komano, Yuichi
    INFORMATION AND COMPUTATION, 2022, 285
  • [23] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    NEW GENERATION COMPUTING, 2022, 40 (01) : 67 - 93
  • [24] Card-Based Protocols for Private Set Intersection and Union
    Doi, Anastasiia
    Ono, Tomoki
    Abe, Yoshiki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    NEW GENERATION COMPUTING, 2024, 42 (03) : 359 - 380
  • [25] Few-helping-card Protocols for Some Wider Class of Symmetric Boolean Functions with Arbitrary Ranges
    Shikata, Hayato
    Miyahara, Daiki
    Mizuki, Takaaki
    PROCEEDINGS OF THE 10TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2023, 2023, : 33 - 41
  • [26] Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    THEORETICAL ASPECTS OF COMPUTING, ICTAC 2021, 2021, 12819 : 256 - 274
  • [27] Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    NEW GENERATION COMPUTING, 2024, 42 (03) : 305 - 329
  • [28] Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations
    Kuzuma, Tomoki
    Isuzugawa, Raimu
    Toyoda, Kodai
    Miyahara, Daiki
    Mizuki, Takaaki
    APKC'22: PROCEEDINGS OF THE 9TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2022, : 51 - 58
  • [29] Computational Model of Card-Based Cryptographic Protocols and Its Applications
    Mizuki, Takaaki
    Shizuya, Hiroki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) : 3 - 11
  • [30] Card-based protocols for securely computing the conjunction of multiple variables
    Mizuki, Takaaki
    THEORETICAL COMPUTER SCIENCE, 2016, 622 : 34 - 44