Minimum Round Card-Based Cryptographic Protocols Using Private Operations

被引:6
作者
Ono, Hibiki [1 ]
Manabe, Yoshifumi [1 ]
机构
[1] Kogakuin Univ, Fac Informat, Shinjuku Ku, Tokyo 1638677, Japan
关键词
multiparty secure computation; card-based cryptographic protocols; private operations; logical computations; copy; round; ZERO-KNOWLEDGE PROOF; SECURE; COMPUTATIONS; DECK;
D O I
10.3390/cryptography5030017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using private operations under the semi-honest model. Physical cards are used in card-based cryptographic protocols instead of computers to achieve secure multiparty computation. Operations that a player executes in a place where the other players cannot see are called private operations. Using three private operations-private random bisection cuts, private reverse cuts, and private reveals-the calculations of two variable Boolean functions and copy operations were realized with the minimum number of cards. Though the number of cards has been discussed, the efficiency of these protocols has not been discussed. This paper defines the number of rounds to evaluate the efficiency of the protocols, using private operations. Most of the meaningful calculations using private operations need at least two rounds. This paper presents a new two-round committed-input, committed-output logical XOR protocol, using four cards. Then, we show new two-round committed-input, committed-output logical AND and copy protocols, using six cards. Even if private reveal operations are not used, logical XOR, logical AND, and copy operations can be executed with the minimum number of rounds. Protocols for general n-variable Boolean functions and protocols that preserve an input are also shown. Lastly, protocols with asymmetric cards are shown.
引用
收藏
页数:22
相关论文
共 64 条
  • [1] Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles
    Abe, Yuta
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. NEW GENERATION COMPUTING, 2021, 39 (01) : 97 - 114
  • [2] Physical Zero-Knowledge Proof for Makaro
    Bultel, Xavier
    Dreier, Jannik
    Dumas, Jean-Guillaume
    Lafourcade, Pascal
    Miyahara, Daiki
    Mizuki, Takaaki
    Nagao, Atsuki
    Sasaki, Tatsuya
    Shinagawa, Kazumasa
    Sone, Hideaki
    [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS, SSS 2018, 2018, 11201 : 111 - 125
  • [3] Cheung E., 2013, CS 758 PROJECT SECUR
  • [4] Crepeau C, 1994, LNCS, V773, P319, DOI [DOI 10.1007/3-540-48329-2_27, 10.1007/3-540-48329-227, DOI 10.1007/3-540-48329-227]
  • [5] DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
  • [6] Interactive Physical Zero-Knowledge Proof for Norinori
    Dumas, Jean-Guillaume
    Lafourcade, Pascal
    Miyahara, Daiki
    Mizuki, Takaaki
    Sasaki, Tatsuya
    Sone, Hideaki
    [J]. COMPUTING AND COMBINATORICS, COCOON 2019, 2019, 11653 : 166 - 177
  • [7] Dvorak P., 2020, ARXIV201008445
  • [8] Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions
    Francis, Danny
    Aljunid, Syarifah Ruqayyah
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 : 193 - 211
  • [9] Secure Grouping Protocol Using a Deck of Cards
    Hashimoto, Yuji
    Shinagawa, Kazumasa
    Nuida, Koji
    Inamura, Masaki
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1512 - 1524
  • [10] Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points
    Hashimoto, Yuji
    Nuida, Koji
    Shinagawa, Kazumasa
    Inamura, Masaki
    Hanaoka, Goichiro
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1503 - 1511