Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model

被引:0
作者
Nakai, Takeshi [1 ]
Iwanari, Keita [2 ]
Ono, Tomoki [2 ]
Abe, Yoshiki [2 ,3 ]
Watanabe, Yohei [2 ,3 ]
Iwamoto, Mitsugu [2 ]
机构
[1] Toyohashi Univ Technol, Toyohashi, Aichi, Japan
[2] Univ Electrocommun, Chofu, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Koto Ku, Tokyo, Japan
基金
日本学术振兴会;
关键词
Secure computation; Card-based cryptography; Private permutation; COMPUTATIONS; SECURE;
D O I
10.1007/s00354-024-00269-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players' private inputs.
引用
收藏
页码:345 / 358
页数:14
相关论文
共 50 条
[21]   Card-Based Cryptography Meets 3D Printer [J].
Ito, Yuki ;
Shikata, Hayato ;
Suganuma, Takuo ;
Mizuki, Takaaki .
UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2024, 2024, 14776 :74-88
[22]   Card-Based Cryptography Meets Formal Verification [J].
Koch, Alexander ;
Schrempp, Michael ;
Kirsten, Michael .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2019, PT I, 2019, 11921 :488-517
[23]   Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations [J].
Ono, Hibiki ;
Manabe, Yoshifumi .
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 :156-173
[24]   Analyzing Execution Time of Card-Based Protocols [J].
Miyahara, Daiki ;
Ueda, Itaru ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 :145-158
[25]   Card-Based Cryptographic Protocols with Malicious Players Using Private Operations [J].
Manabe, Yoshifumi ;
Ono, Hibiki .
NEW GENERATION COMPUTING, 2022, 40 (01) :67-93
[26]   Card-Based Cryptographic Protocols for Three-Input Functions Using Private Operations [J].
Manabe, Yoshifumi ;
Ono, Hibiki .
COMBINATORIAL ALGORITHMS, IWOCA 2021, 2021, 12757 :469-484
[27]   Card-Based Protocols for Any Boolean Function [J].
Nishida, Takuya ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION (TAMC 2015), 2015, 9076 :110-121
[28]   Card-Based Cryptography Meets Formal Verification [J].
Koch, Alexander ;
Schrempp, Michael ;
Kirsten, Michael .
NEW GENERATION COMPUTING, 2021, 39 (01) :115-158
[29]   Card-Based Cryptography Meets Formal Verification [J].
Alexander Koch ;
Michael Schrempp ;
Michael Kirsten .
New Generation Computing, 2021, 39 :115-158
[30]   Pile-Shifting Scramble for Card-Based Protocols [J].
Nishimura, Akihiro ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1494-1502