Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations

被引:32
作者
Nakai, Takeshi [1 ]
Tokushige, Yuuki [1 ]
Misawa, Yuto [2 ]
Iwamoto, Mitsugu [1 ]
Ohta, Kazuo [1 ]
机构
[1] Univ Electrocommun, Dept Informat, 1-5-1 Chofugaoka, Chofu, Tokyo 1828585, Japan
[2] Toshiba Co Ltd, Smart Card Syst Dept, Saiwai Ku, 1 Komukai,Toshiba Cho, Kawasaki, Kanagawa 2128583, Japan
来源
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016 | 2016年 / 10052卷
关键词
SECURE;
D O I
10.1007/978-3-319-48965-0_30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We propose several efficient card-based cryptographic protocols for the millionaires' problem by introducing a new operation called Private Permutation (PP) instead of the shuffle used in existing card-based cryptographic protocols. Shuffles are useful randomization techniques for designing card-based cryptographic protocols for logical gates, and this approach seems to be almost optimal. This fact, however, implies that there is room for improvements if we do not use logical gates as building blocks for secure computing, and we show that such an improvement is actually possible for the millionaires' problem. Our key technique, PP, is a natural randomization operation for permuting a set of cards behind the player's back, and hence, a shuffle can be decomposed into two PPs with one communication between them. Thus PP not only allows us to transform Yao's seminal protocol into a card-based cryptographic protocol, but also enables us to propose entirely novel and efficient protocols by securely updating bitwise comparisons between two numbers. Furthermore, it is interesting to remark that one of the proposed protocols has a remarkably deep connection to the well-known logical puzzle known as "The fork in the road".
引用
收藏
页码:500 / 517
页数:18
相关论文
共 11 条
[1]  
Boer B, 1990, LNCS, V434, P208, DOI [10.1007/3-540-46885-4_23, DOI 10.1007/3-540-46885-4_23]
[2]   Security and composition of multiparty cryptographic protocols [J].
Canetti, R .
JOURNAL OF CRYPTOLOGY, 2000, 13 (01) :143-202
[3]  
Cramer R., 2015, SECURE MULTIPARTY CO
[4]  
Crepeau C., 1993, CRYPTO, P319, DOI DOI 10.1007/3-540-48329-2_27
[5]  
Gardner M, 1956, HEXAFLEXAGONS OTHER
[6]   Card-Based Cryptographic Protocols Using a Minimal Number of Cards [J].
Koch, Alexander ;
Walzer, Stefan ;
Haertel, Kevin .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 :783-807
[7]   A formalization of card-based cryptographic protocols via abstract machine [J].
Mizuki, Takaaki ;
Shizuya, Hiroki .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) :15-23
[8]  
Mizuki T, 2009, LECT NOTES COMPUT SC, V5598, P358, DOI 10.1007/978-3-642-02270-8_36
[9]   Secure multiparty computations without computers [J].
Niemi, V ;
Renvall, A .
THEORETICAL COMPUTER SCIENCE, 1998, 191 (1-2) :173-183
[10]   Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards [J].
Shinagawa, Kazumasa ;
Mizuki, Takaaki ;
Schuldt, Jacob C. N. ;
Nuida, Koji ;
Kanayama, Naoki ;
Nishide, Takashi ;
Hanaoka, Goichiro ;
Okamoto, Eiji .
PROVABLE SECURITY, PROVSEC 2015, 2015, 9451 :127-146