Computational Model of Card-Based Cryptographic Protocols and Its Applications

被引:40
|
作者
Mizuki, Takaaki [1 ]
Shizuya, Hiroki [2 ]
机构
[1] Tohoku Univ, Cybersci Ctr, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Ctr Informat Technol Educ, Sendai, Miyagi 9808578, Japan
关键词
card-based protocols; card games; cryptography without computers; real-life hands-on cryptography; secure multiparty computations; MULTIPARTY COMPUTATION; SECURE;
D O I
10.1587/transfun.E100.A.3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based protocols enable us to easily perform cryptographic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of somewhat intuitive and verbal descriptions, such as "turn over this card," "shuffle these two cards," "apply a random cut to these five cards," and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.
引用
收藏
页码:3 / 11
页数:9
相关论文
共 50 条
  • [1] A formalization of card-based cryptographic protocols via abstract machine
    Mizuki, Takaaki
    Shizuya, Hiroki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 15 - 23
  • [2] A formalization of card-based cryptographic protocols via abstract machine
    Takaaki Mizuki
    Hiroki Shizuya
    International Journal of Information Security, 2014, 13 : 15 - 23
  • [3] Pile-Shifting Scramble for Card-Based Protocols
    Nishimura, Akihiro
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1494 - 1502
  • [4] Card-Based Cryptographic Protocols Using a Minimal Number of Cards
    Koch, Alexander
    Walzer, Stefan
    Haertel, Kevin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 783 - 807
  • [5] Card-based protocols using unequal division shuffles
    Nishimura, Akihiro
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    SOFT COMPUTING, 2018, 22 (02) : 361 - 371
  • [6] Card-based protocols using unequal division shuffles
    Akihiro Nishimura
    Takuya Nishida
    Yu-ichi Hayashi
    Takaaki Mizuki
    Hideaki Sone
    Soft Computing, 2018, 22 : 361 - 371
  • [7] Analyzing Execution Time of Card-Based Protocols
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
  • [8] Card-based protocols for securely computing the conjunction of multiple variables
    Mizuki, Takaaki
    THEORETICAL COMPUTER SCIENCE, 2016, 622 : 34 - 44
  • [9] Evaluating card-based protocols in terms of execution time
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2021, 20 (05) : 729 - 740
  • [10] Minimum Round Card-Based Cryptographic Protocols Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    CRYPTOGRAPHY, 2021, 5 (03)