Card-Based Protocols for Any Boolean Function

被引:39
|
作者
Nishida, Takuya [1 ]
Hayashi, Yu-ichi [1 ]
Mizuki, Takaaki [2 ]
Sone, Hideaki [2 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Cybersci Ctr, Aoba Ku, Sendai, Miyagi 9808578, Japan
关键词
COMPUTATIONS; SECURE;
D O I
10.1007/978-3-319-17142-5_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for computing any function has not been revealed thus far. In this paper, we propose a general approach to constructing an efficient protocol so that six additional cards are sufficient for any function to be securely computed. Further, we prove that two additional cards are sufficient for any symmetric function.
引用
收藏
页码:110 / 121
页数:12
相关论文
共 50 条
  • [1] A single shuffle is enough for secure card-based computation of any Boolean circuit
    Shinagawa, Kazumasa
    Nuida, Koji
    [J]. DISCRETE APPLIED MATHEMATICS, 2021, 289 : 248 - 261
  • [2] Actively revealing card attack on card-based protocols
    Ken Takashima
    Daiki Miyahara
    Takaaki Mizuki
    Hideaki Sone
    [J]. Natural Computing, 2022, 21 : 615 - 628
  • [3] Actively revealing card attack on card-based protocols
    Takashima, Ken
    Miyahara, Daiki
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. NATURAL COMPUTING, 2022, 21 (04) : 615 - 628
  • [4] Analyzing Execution Time of Card-Based Protocols
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
  • [5] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
  • [6] Efficient Card-Based Majority Voting Protocols
    Yoshiki Abe
    Takeshi Nakai
    Yoshihisa Kuroki
    Shinnosuke Suzuki
    Yuta Koga
    Yohei Watanabe
    Mitsugu Iwamoto
    Kazuo Ohta
    [J]. New Generation Computing, 2022, 40 : 173 - 198
  • [7] Card-based protocols for secure ranking computations
    Takashima, Ken
    Abe, Yuta
    Sasaki, Tatsuya
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135
  • [8] Pile-Shifting Scramble for Card-Based Protocols
    Nishimura, Akihiro
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1494 - 1502
  • [9] The Minimum Number of Cards in Practical Card-Based Protocols
    Kastner, Julia
    Koch, Alexander
    Walzer, Stefan
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 126 - 155
  • [10] Card-based protocols using unequal division shuffles
    Nishimura, Akihiro
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. SOFT COMPUTING, 2018, 22 (02) : 361 - 371