Extended Addition Protocol and Efficient Voting Protocols Using Regular Polygon Cards

被引:0
作者
Takahashi, Yoshihiro [1 ]
Shinagawa, Kazumasa [1 ,2 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki 3168511, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
基金
日本学术振兴会;
关键词
Card-based cryptography; Regular polygon cards; Addition protocol; Voting protocol;
D O I
10.1007/s00354-024-00275-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is a research field for realizing cryptographic protocols using a deck of physical cards. Shinagawa et al. proposed a regular n-sided polygon card, which can hold a value from 0 to n - 1, and constructed an addition protocol over Z/nZ and a voting protocol with v voters and c candidates when v < n. In this paper, we propose an addition protocol over Z/mnZ using regular n-sided polygon cards. Technically, we introduce a cyclic integer encoding and a rot-and-shift shuffle to extend the modulus from n to mn. In addition, we construct two voting protocols with v voters and c candidates using regular n-sided polygon cards. Our first voting protocol requires c([v+1/n] + v + 1) cards and v + 1 shuffles without restriction. Our second voting protocol reduces the number of cards to [v+1/n] n + v + 1 when v < n and c <= n.
引用
收藏
页码:479 / 496
页数:18
相关论文
共 27 条
  • [1] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
  • [2] Abe Y, 2020, INT SYM INF THEOR AP, P377
  • [3] Cr?peau C., 1994, LECT NOTES COMPUTER, P319, DOI [DOI 10.1007/3-540-48329-2_27, 10.1007/3-540-48329-2_27]
  • [4] DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
  • [5] Doi A., 2022, INF THEORY APPL
  • [6] Card-Based Secure Sorting Protocol
    Haga, Rikuo
    Toyoda, Kodai
    Shinoda, Yuto
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Hayashi, Yuichi
    Mizuki, Takaaki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2022, 2022, 13504 : 224 - 240
  • [7] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1512 - 1524
  • [8] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    [J]. INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 : 135 - 152
  • [9] Practical card-based implementations of Yao's millionaire protocol
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 803 : 207 - 221
  • [10] Practical and Easy-to-Understand Card-Based Implementation of Yao's Millionaire Protocol
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. COMBINATORIAL OPTIMIZATION AND APPLICATIONS (COCOA 2018), 2018, 11346 : 246 - 261