Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations

被引:9
作者
Ono, Hibiki [1 ]
Manabe, Yoshifumi [1 ]
机构
[1] Kogakuin Univ, Shinjuku Ku, Tokyo 1638677, Japan
来源
DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY | 2019年 / 11737卷
关键词
Multi-party secure computation; Card-based cryptographic protocols; Private operations; Logical computations; Copy; Round; SECURE; COMPUTATIONS; DECK;
D O I
10.1007/978-3-030-31500-9_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper shows new card-based cryptographic protocols with the minimum number of rounds using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers. Operations that a player executes in a place where the other players cannot see are called private operations. Using three private operations called private random bisection cuts, private reverse cuts, and private reveals, calculations of two variable boolean functions and copy operations were realized with the minimum number of cards. Though the number of cards has been discussed, the efficiency of these protocols has not been discussed. This paper defines the number of rounds to evaluate the efficiency of the protocols using private operations. Most of the meaningful calculations using private operations need at least two rounds. This paper shows a new two-round committed-input, committed-output logical XOR protocol using four cards. Then we show new two-round committed-input, committed-output logical AND and copy protocols using six cards. This paper then shows the relationship between the number of rounds and available private operations. Even if private reveal operations are not used, logical XOR can be executed with the minimum number of cards in two rounds. On the other hand, logical AND and copy operations can be executed with the minimum number of cards in three rounds without private reveal operations. Protocols that preserves an input are also shown.
引用
收藏
页码:156 / 173
页数:18
相关论文
共 41 条
[1]   Five-Card AND Protocol in Committed Format Using Only Practical Shuffles [J].
Abe, Yuta ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2018, :3-8
[2]   Physical Zero-Knowledge Proof for Makaro [J].
Bultel, Xavier ;
Dreier, Jannik ;
Dumas, Jean-Guillaume ;
Lafourcade, Pascal ;
Miyahara, Daiki ;
Mizuki, Takaaki ;
Nagao, Atsuki ;
Sasaki, Tatsuya ;
Shinagawa, Kazumasa ;
Sone, Hideaki .
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2018, 2018, 11201 :111-125
[3]  
Crepeau C., 1993, LNCS, V773, P319, DOI DOI 10.1007/3-540-48329-2_27
[4]  
DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
[5]   Interactive Physical Zero-Knowledge Proof for Norinori [J].
Dumas, Jean-Guillaume ;
Lafourcade, Pascal ;
Miyahara, Daiki ;
Mizuki, Takaaki ;
Sasaki, Tatsuya ;
Sone, Hideaki .
COMPUTING AND COMBINATORICS, COCOON 2019, 2019, 11653 :166-177
[6]   Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions [J].
Francis, Danny ;
Aljunid, Syarifah Ruqayyah ;
Nishida, Takuya ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 :193-211
[7]   Secure Grouping Protocol Using a Deck of Cards [J].
Hashimoto, Yuji ;
Shinagawa, Kazumasa ;
Nuida, Koji ;
Inamura, Masaki ;
Hanaoka, Goichiro .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1512-1524
[8]   Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points [J].
Hashimoto, Yuji ;
Nuida, Koji ;
Shinagawa, Kazumasa ;
Inamura, Masaki ;
Hanaoka, Goichiro .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1503-1511
[9]  
Ibaraki T, 2016, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI 2016), P252, DOI [10.1109/MCSI.2016.23, 10.1109/MCSI.2016.054]
[10]  
Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16