Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model

被引:0
作者
Nakai, Takeshi [1 ]
Iwanari, Keita [2 ]
Ono, Tomoki [2 ]
Abe, Yoshiki [2 ,3 ]
Watanabe, Yohei [2 ,3 ]
Iwamoto, Mitsugu [2 ]
机构
[1] Toyohashi Univ Technol, Toyohashi, Aichi, Japan
[2] Univ Electrocommun, Chofu, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Koto Ku, Tokyo, Japan
基金
日本学术振兴会;
关键词
Secure computation; Card-based cryptography; Private permutation; COMPUTATIONS; SECURE;
D O I
10.1007/s00354-024-00269-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players' private inputs.
引用
收藏
页码:345 / 358
页数:14
相关论文
共 50 条
[31]   Card-based protocols using unequal division shuffles [J].
Nishimura, Akihiro ;
Nishida, Takuya ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
SOFT COMPUTING, 2018, 22 (02) :361-371
[32]   Computational Model of Card-Based Cryptographic Protocols and Its Applications [J].
Mizuki, Takaaki ;
Shizuya, Hiroki .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (01) :3-11
[33]   Evaluating card-based protocols in terms of execution time [J].
Miyahara, Daiki ;
Ueda, Itaru ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) :729-740
[34]   Card-Based Zero-Knowledge Proof Protocols for Graph Problems and Their Computational Model [J].
Miyahara, Daiki ;
Haneda, Hiromichi ;
Mizuki, Takaaki .
PROVABLE AND PRACTICAL SECURITY, PROVSEC 2021, 2021, 13059 :136-152
[35]   A formalization of card-based cryptographic protocols via abstract machine [J].
Mizuki, Takaaki ;
Shizuya, Hiroki .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) :15-23
[36]   The Asymmetric five-card trick: working with variable encoding in card-based protocols [J].
Guillen, Luis .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 14 (2) :181-192
[37]   Four Cards Are Sufficient for a Card-Based Three-Input Voting Protocol Utilizing Private Permutations [J].
Nakai, Takeshi ;
Shirouchi, Satoshi ;
Iwamoto, Mitsugu ;
Ohta, Kazuo .
INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 :153-165
[38]   Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding [J].
Nuida, Koji .
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2023, 2023, 14128 :237-254
[39]   Card-Minimal Protocols for Three-Input Functions with Standard Playing Cards [J].
Haga, Rikuo ;
Hayashi, Yuichi ;
Miyahara, Daiki ;
Mizuki, Takaaki .
PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 :448-468
[40]   Information leakage due to operative errors in card-based protocols [J].
Mizuki, Takaaki ;
Komano, Yuichi .
INFORMATION AND COMPUTATION, 2022, 285