Computational Model of Card-Based Cryptographic Protocols and Its Applications

被引:42
作者
Mizuki, Takaaki [1 ]
Shizuya, Hiroki [2 ]
机构
[1] Tohoku Univ, Cybersci Ctr, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Ctr Informat Technol Educ, Sendai, Miyagi 9808578, Japan
关键词
card-based protocols; card games; cryptography without computers; real-life hands-on cryptography; secure multiparty computations; MULTIPARTY COMPUTATION; SECURE;
D O I
10.1587/transfun.E100.A.3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based protocols enable us to easily perform cryptographic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of somewhat intuitive and verbal descriptions, such as "turn over this card," "shuffle these two cards," "apply a random cut to these five cards," and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.
引用
收藏
页码:3 / 11
页数:9
相关论文
共 32 条
[1]   Private computation using a PEZ dispenser [J].
Balogh, J ;
Csirik, JA ;
Ishai, Y ;
Kushilevitz, E .
THEORETICAL COMPUTER SCIENCE, 2003, 306 (1-3) :69-84
[2]  
Crepeau C., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P319
[3]  
DENBOER B, 1990, LECT NOTES COMPUT SC, V434, P208
[4]   Unconditional secure communication: a Russian Cards protocol [J].
Duan, Zhenhua ;
Yang, Chen .
JOURNAL OF COMBINATORIAL OPTIMIZATION, 2010, 19 (04) :501-530
[5]   Comparing information without leaking it [J].
Fagin, R ;
Naor, M ;
Winkler, P .
COMMUNICATIONS OF THE ACM, 1996, 39 (05) :77-85
[6]  
Fisch B, 2014, LECT NOTES COMPUT SC, V8617, P313, DOI 10.1007/978-3-662-44381-1_18
[7]  
Fischer M.J., 1989, DIMACS SERIES DISCRE, V2, P173
[8]   Bounds on secret key exchange using a random deal of cards [J].
Fischer, MJ ;
Wright, RN .
JOURNAL OF CRYPTOLOGY, 1996, 9 (02) :71-99
[9]   A zero-knowledge protocol for nuclear warhead verification [J].
Glaser, Alexander ;
Barak, Boaz ;
Goldston, Robert J. .
NATURE, 2014, 510 (7506) :497-502
[10]  
Ishikawa Rie, 2015, Unconventional Computation and Natural Computation. 14th International Conference, UCNC 2015. Proceedings, P215, DOI 10.1007/978-3-319-21819-9_16