Efficient Card-Based Protocols for Symmetric Functions Using Four-Colored Decks

被引:0
作者
Takahashi, Yoshihiro [1 ]
Shinagawa, Kazumasa [2 ]
Shikata, Hayato [3 ]
Mizuki, Takaaki [4 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki, Japan
[2] Ibaraki Univ, AIST, Hitachi, Ibaraki, Japan
[3] Tohoku Univ, Sendai, Miyagi, Japan
[4] Tohoku Univ, AIST, Sendai, Miyagi, Japan
来源
PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024 | 2024年
关键词
Card-based cryptography; Secure computation; Symmetric function; CRYPTOGRAPHIC PROTOCOLS; SECURE; COMPUTATIONS;
D O I
10.1145/3659467.3659902
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is an area involving cryptographic techniques that use a deck of physical cards to implement secure computation. In this paper, we study card-based cryptographic protocols for symmetric functions.. : {0, 1}(n) -> R, where R is an arbitrary finite set. Any symmetric Boolean function has the property that its output value is determined only by the sum of input bits, and the class of them includes many interesting functions such as the AND and equality functions. In 2020, Ruangwises and Itoh proposed a protocol which uses 2n +2 cards to securely compute any symmetric function f :{0, 1}(n) -> R reducing the number of cards to less than 2n + 2 was left as an open problem. While the Ruangwises-Itoh protocol uses a two-colored deck of cards, this paper considers using three-colored and four-colored decks: to give a partial answer to the open problem, we propose three protocols for symmetric functions using 2n + 1 cards or less. Specifically, we first propose a protocol using 2n + 1 cards from a three-colored deck. We then propose two protocols using 2n cards from a four-colored deck; one is a simpler protocol and the other is a more shuffle-efficient protocol.
引用
收藏
页码:1 / 10
页数:10
相关论文
共 41 条
  • [31] Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model
    Miyahara, Daiki
    Haneda, Hiromichi
    Mizuki, Takaaki
    PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 : 136 - 152
  • [32] Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols
    Mizuki, Takaaki
    Komano, Yuichi
    COMBINATORIAL ALGORITHMS, IWOCA 2018, 2018, 10979 : 250 - 262
  • [33] Malicious Player Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
    Morooka, Tomoya
    Manabe, Yoshifumi
    Shinagawa, Kazumasa
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 332 - 346
  • [34] Efficient card-based zero-knowledge proof for Sudoku
    Sasaki, Tatsuya
    Miyahara, Daiki
    Mizuki, Takaaki
    Sone, Hideaki
    THEORETICAL COMPUTER SCIENCE, 2020, 839 : 135 - 142
  • [35] Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun
    Hand, Samuel
    Koch, Alexander
    Lafourcade, Pascal
    Miyahara, Daiki
    Robert, Leo
    NEW GENERATION COMPUTING, 2024, 42 (03) : 449 - 477
  • [36] Card-Based Cryptographic Logical Computations Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    NEW GENERATION COMPUTING, 2021, 39 (01) : 19 - 40
  • [37] Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem
    Tamura, Yuma
    Suzuki, Akira
    Mizuki, Takaaki
    PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, : 11 - 22
  • [38] A Smart Card-Based Two-Factor Mutual Authentication Scheme for Efficient Deployment of an IoT-Based Telecare Medical Information System
    Khan, Muhammad Asghar
    Alhakami, Hosam
    Alhakami, Wajdi
    Shvetsov, Alexey V.
    Ullah, Insaf
    SENSORS, 2023, 23 (12)
  • [39] An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography
    Zhang, Yuanyuan
    Chen, Jianhua
    Huang, Baojun
    Peng, Cong
    INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (04): : 390 - 401
  • [40] Highly Efficient Symmetric Key Based Authentication and Key Agreement Protocol Using Keccak
    Braeken, An
    SENSORS, 2020, 20 (08)