Extended Addition Protocol and Efficient Voting Protocols Using Regular Polygon Cards

被引:0
作者
Takahashi, Yoshihiro [1 ]
Shinagawa, Kazumasa [1 ,2 ]
机构
[1] Ibaraki Univ, Hitachi, Ibaraki 3168511, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
基金
日本学术振兴会;
关键词
Card-based cryptography; Regular polygon cards; Addition protocol; Voting protocol;
D O I
10.1007/s00354-024-00275-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography is a research field for realizing cryptographic protocols using a deck of physical cards. Shinagawa et al. proposed a regular n-sided polygon card, which can hold a value from 0 to n - 1, and constructed an addition protocol over Z/nZ and a voting protocol with v voters and c candidates when v < n. In this paper, we propose an addition protocol over Z/mnZ using regular n-sided polygon cards. Technically, we introduce a cyclic integer encoding and a rot-and-shift shuffle to extend the modulus from n to mn. In addition, we construct two voting protocols with v voters and c candidates using regular n-sided polygon cards. Our first voting protocol requires c([v+1/n] + v + 1) cards and v + 1 shuffles without restriction. Our second voting protocol reduces the number of cards to [v+1/n] n + v + 1 when v < n and c <= n.
引用
收藏
页码:479 / 496
页数:18
相关论文
共 27 条
  • [11] A formalization of card-based cryptographic protocols via abstract machine
    Mizuki, Takaaki
    Shizuya, Hiroki
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 15 - 23
  • [12] Mizuki T, 2013, LECT NOTES COMPUT SC, V7956, P162, DOI 10.1007/978-3-642-39074-6_16
  • [13] How to Solve Millionaires' Problem with Two Kinds of Cards
    Nakai, Takeshi
    Misawa, Yuto
    Tokushige, Yuuki
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. NEW GENERATION COMPUTING, 2021, 39 (01) : 73 - 96
  • [14] Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations
    Nakai, Takeshi
    Tokushige, Yuuki
    Misawa, Yuto
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 500 - 517
  • [15] Nishida T, 2013, LECT NOTES COMPUT SC, V8273, P193, DOI 10.1007/978-3-642-45008-2_16
  • [16] Nuida Koji, 2023, Advances in Information and Computer Security: 18th International Workshop on Security, IWSEC 2023, Proceedings. Lecture Notes in Computer Science (14128), P237, DOI 10.1007/978-3-031-41326-1_13
  • [17] Efficient Card-based Cryptographic Protocols for the Millionaires' Problem Using Private Input Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    [J]. 2018 13TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2018), 2018, : 23 - 28
  • [18] Securely Computing the n-Variable Equality Function with 2n Cards
    Ruangwises, Suthee
    Itoh, Toshiya
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, TAMC 2020, 2020, 12337 : 25 - 36
  • [19] Shinagawa K., 2018, FUN WITH ALGORITHMS, P1
  • [20] Card-Based Protocols Using Regular Polygon Cards
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Schuldt, Jacob C. N.
    Nuida, Koji
    Kanayama, Naoki
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1900 - 1909