Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations

被引:7
作者
Ono, Hibiki [1 ]
Manabe, Yoshifumi [1 ]
机构
[1] Kogakuin Univ, Tokyo 1638677, Japan
来源
FOUNDATIONS AND PRACTICE OF SECURITY, FPS 2018 | 2019年 / 11358卷
关键词
Multi-party secure computation; Card-based cryptographic protocols; Private operations; Logical computations; Copy; COMPUTATIONS; SECURE;
D O I
10.1007/978-3-030-18419-3_13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper proposes new card-based cryptographic protocols with the minimum number of cards using private operations under the semi-honest model. Though various card-based cryptographic protocols were shown, the minimum number of cards used in the protocol has not been achieved yet for many problems. Operations executed by a player where the other players cannot see are called private operations. Private operations have been introduced in some protocols to solve a particular problem or to input private values. However, the effectiveness of introducing private operations to the calculation of general logic functions has not been considered. This paper introduces three new private operations: private random bisection cuts, private reverse cuts, and private reveals. With these three new operations, we show that all of logical and, logical xor, and copy protocols are achieved with the minimum number of cards by simple three round protocols. This paper, then shows a protocol to calculate any logical functions using these private operations.
引用
收藏
页码:193 / 207
页数:15
相关论文
共 30 条
[1]   Five-Card AND Protocol in Committed Format Using Only Practical Shuffles [J].
Abe, Yuta ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
APKC'18: PROCEEDINGS OF THE 5TH ACM ASIA PUBLIC-KEY CRYPTOGRAPHY WORKSHOP, 2018, :3-8
[2]  
Crepeau C., 1993, LNCS, V773, P319, DOI DOI 10.1007/3-540-48329-2_27
[3]  
DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
[4]   Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions [J].
Francis, Danny ;
Aljunid, Syarifah Ruqayyah ;
Nishida, Takuya ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 :193-211
[5]   Secure Grouping Protocol Using a Deck of Cards [J].
Hashimoto, Yuji ;
Shinagawa, Kazumasa ;
Nuida, Koji ;
Inamura, Masaki ;
Hanaoka, Goichiro .
INFORMATION THEORETIC SECURITY, ICITS 2017, 2017, 10681 :135-152
[6]  
Ibaraki T, 2016, PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MATHEMATICS AND COMPUTERS IN SCIENCES AND IN INDUSTRY (MCSI 2016), P252, DOI [10.1109/MCSI.2016.23, 10.1109/MCSI.2016.054]
[7]  
Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16
[8]   The Minimum Number of Cards in Practical Card-Based Protocols [J].
Kastner, Julia ;
Koch, Alexander ;
Walzer, Stefan ;
Miyahara, Daiki ;
Hayashi, Yu-ichi ;
Mizuki, Takaaki ;
Sone, Hideaki .
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 :126-155
[9]  
Koch A., 2017, 2017423 CRYPT EPRINT
[10]  
Koch A., 2018, 2018951 IACR CRYPT E