Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

被引:13
作者
Manabe, Yoshifumi [1 ]
Ono, Hibiki [1 ]
机构
[1] Kogakuin Univ, Fac Informat, Shinjuku Ku, 1-24-2,Nishisinjuku, Tokyo 1638677, Japan
关键词
Multi-party secure computation; Card-based cryptographic protocols; Private operations; Logical computations; Copy; Malicious model; ZERO-KNOWLEDGE PROOF; 3-INPUT FUNCTIONS; SECURE;
D O I
10.1007/s00354-021-00148-w
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers. Operations that a player executes in a place where the other players cannot see are called private operations. Using several private operations, calculations of two variable Boolean functions and copy operations were realized with the minimum number of cards. Though private operations are very powerful in card-based cryptographic protocols, there is a problem that it is very hard to prevent malicious actions during private operations. Though most card-based protocols are discussed in the semi-honest model, there might be cases when the semi-honest model is not enough. Thus, this paper shows new protocols that are secure against malicious players. We show logical XOR, logical AND, n-variable Boolean function, and copy protocols. We can execute any logical computations with a combination of these protocols. We use envelopes as an additional tool that can be easily prepared and used by people.
引用
收藏
页码:67 / 93
页数:27
相关论文
共 68 条
[1]   Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles [J].
Abe, Yuta ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
NEW GENERATION COMPUTING, 2021, 39 (01) :97-114
[2]   Physical Zero-Knowledge Proof for Makaro [J].
Bultel, Xavier ;
Dreier, Jannik ;
Dumas, Jean-Guillaume ;
Lafourcade, Pascal ;
Miyahara, Daiki ;
Mizuki, Takaaki ;
Nagao, Atsuki ;
Sasaki, Tatsuya ;
Shinagawa, Kazumasa ;
Sone, Hideaki .
STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2018, 2018, 11201 :111-125
[3]  
Cheung E., 2013, 758 CS
[4]  
DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
[5]   Interactive Physical Zero-Knowledge Proof for Norinori [J].
Dumas, Jean-Guillaume ;
Lafourcade, Pascal ;
Miyahara, Daiki ;
Mizuki, Takaaki ;
Sasaki, Tatsuya ;
Sone, Hideaki .
COMPUTING AND COMBINATORICS, COCOON 2019, 2019, 11653 :166-177
[6]  
Dvorak P., 2020, ARXIV PREPRINT ARXIV
[7]   Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions [J].
Francis, Danny ;
Aljunid, Syarifah Ruqayyah ;
Nishida, Takuya ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 :193-211
[8]   Secure Grouping Protocol Using a Deck of Cards [J].
Hashimoto, Yuji ;
Shinagawa, Kazumasa ;
Nuida, Koji ;
Inamura, Masaki ;
Hanaoka, Goichiro .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1512-1524
[9]   Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points [J].
Hashimoto, Yuji ;
Nuida, Koji ;
Shinagawa, Kazumasa ;
Inamura, Masaki ;
Hanaoka, Goichiro .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09) :1503-1511
[10]  
Ibaraki T, 2016, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI 2016), P252, DOI [10.1109/MCSI.2016.23, 10.1109/MCSI.2016.054]