Card-Based Protocols for Any Boolean Function

被引:41
作者
Nishida, Takuya [1 ]
Hayashi, Yu-ichi [1 ]
Mizuki, Takaaki [2 ]
Sone, Hideaki [2 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Cybersci Ctr, Aoba Ku, Sendai, Miyagi 9808578, Japan
来源
THEORY AND APPLICATIONS OF MODELS OF COMPUTATION (TAMC 2015) | 2015年 / 9076卷
关键词
COMPUTATIONS; SECURE;
D O I
10.1007/978-3-319-17142-5_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for computing any function has not been revealed thus far. In this paper, we propose a general approach to constructing an efficient protocol so that six additional cards are sufficient for any function to be securely computed. Further, we prove that two additional cards are sufficient for any symmetric function.
引用
收藏
页码:110 / 121
页数:12
相关论文
共 16 条
[1]   A colouring protocol for the generalized Russian cards problem [J].
Cordon-Franco, Andres ;
van Ditmarsch, Hans ;
Fernandez-Duque, David ;
Soler-Toscano, Fernando .
THEORETICAL COMPUTER SCIENCE, 2013, 495 :81-95
[2]  
Crepeau C., 1993, ADV CRYPTOLOGY CRYPT, P319, DOI DOI 10.1007/3-540-48329-2_27
[3]  
DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
[4]   Unconditional secure communication: a Russian Cards protocol [J].
Duan, Zhenhua ;
Yang, Chen .
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2010, 19 (04) :501-530
[5]   Bounds on secret key exchange using a random deal of cards [J].
Fischer, MJ ;
Wright, RN .
JOURNAL OF CRYPTOLOGY, 1996, 9 (02) :71-99
[6]  
Mizuki T, 2014, LECT NOTES COMPUT SC, V8496, P313, DOI 10.1007/978-3-319-07890-8_27
[7]   A formalization of card-based cryptographic protocols via abstract machine [J].
Mizuki, Takaaki ;
Shizuya, Hiroki .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) :15-23
[8]  
Mizuki T, 2013, LECT NOTES COMPUT SC, V7956, P162, DOI 10.1007/978-3-642-39074-6_16
[9]  
Mizuki T, 2012, LECT NOTES COMPUT SC, V7658, P598, DOI 10.1007/978-3-642-34961-4_36
[10]  
Mizuki T, 2006, AUSTRALAS J COMB, V36, P279