Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model

被引:0
作者
Nakai, Takeshi [1 ]
Iwanari, Keita [2 ]
Ono, Tomoki [2 ]
Abe, Yoshiki [2 ,3 ]
Watanabe, Yohei [2 ,3 ]
Iwamoto, Mitsugu [2 ]
机构
[1] Toyohashi Univ Technol, Toyohashi, Aichi, Japan
[2] Univ Electrocommun, Chofu, Tokyo, Japan
[3] Natl Inst Adv Ind Sci & Technol, Koto Ku, Tokyo, Japan
基金
日本学术振兴会;
关键词
Secure computation; Card-based cryptography; Private permutation; COMPUTATIONS; SECURE;
D O I
10.1007/s00354-024-00269-y
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players' private inputs.
引用
收藏
页码:345 / 358
页数:14
相关论文
共 50 条
[41]   Card-based protocols for securely computing the conjunction of multiple variables [J].
Mizuki, Takaaki .
THEORETICAL COMPUTER SCIENCE, 2016, 622 :34-44
[42]   Single-shuffle card-based protocol with eight cards per gate and its extensions [J].
Tozawa, Kazunari ;
Morita, Hiraku ;
Mizuki, Takaaki .
NATURAL COMPUTING, 2025, 24 (01) :131-147
[43]   Card-Based Cryptographic Logical Computations Using Private Operations [J].
Ono, Hibiki ;
Manabe, Yoshifumi .
NEW GENERATION COMPUTING, 2021, 39 (01) :19-40
[44]   Efficient Generation of a Card-Based Uniformly Distributed Random Derangement [J].
Murata, Soma ;
Hara, Daiki Miya ;
Mizuki, Takaaki ;
Sone, Hideaki .
WALCOM: ALGORITHMS AND COMPUTATION, WALCOM 2021, 2021, 12635 :78-89
[45]   Card-based Single-shuffle Protocols for Secure Multiple-input AND and XOR Computations [J].
Kuzuma, Tomoki ;
Isuzugawa, Raimu ;
Toyoda, Kodai ;
Miyahara, Daiki ;
Mizuki, Takaaki .
APKC'22: PROCEEDINGS OF THE 9TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2022, :51-58
[46]   Efficient card-based zero-knowledge proof for Sudoku [J].
Sasaki, Tatsuya ;
Miyahara, Daiki ;
Mizuki, Takaaki ;
Sone, Hideaki .
THEORETICAL COMPUTER SCIENCE, 2020, 839 :135-142
[47]   Efficient Card-Based ZKP for Single Loop Condition and Its Application to Moon-or-Sun [J].
Hand, Samuel ;
Koch, Alexander ;
Lafourcade, Pascal ;
Miyahara, Daiki ;
Robert, Leo .
NEW GENERATION COMPUTING, 2024, 42 (03) :449-477
[48]   Card-Based Zero-Knowledge Proof Protocols for the 15-Puzzle and the Token Swapping Problem [J].
Tamura, Yuma ;
Suzuki, Akira ;
Mizuki, Takaaki .
PROCEEDINGS OF THE 11TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, APKC 2024, 2024, :11-22
[49]   An Efficient Password Authentication Scheme Using Smart Card Based on Elliptic Curve Cryptography [J].
Zhang, Yuanyuan ;
Chen, Jianhua ;
Huang, Baojun ;
Peng, Cong .
INFORMATION TECHNOLOGY AND CONTROL, 2014, 43 (04) :390-401
[50]   Smart card authentication model based on elliptic curve cryptography in IoT networks [J].
Joy, A. Shakeela ;
Ravi, R. .
INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (05) :548-569