Card-Based Protocols for Any Boolean Function

被引:39
|
作者
Nishida, Takuya [1 ]
Hayashi, Yu-ichi [1 ]
Mizuki, Takaaki [2 ]
Sone, Hideaki [2 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Cybersci Ctr, Aoba Ku, Sendai, Miyagi 9808578, Japan
关键词
COMPUTATIONS; SECURE;
D O I
10.1007/978-3-319-17142-5_11
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for computing any function has not been revealed thus far. In this paper, we propose a general approach to constructing an efficient protocol so that six additional cards are sufficient for any function to be securely computed. Further, we prove that two additional cards are sufficient for any symmetric function.
引用
收藏
页码:110 / 121
页数:12
相关论文
共 50 条
  • [21] A formalization of card-based cryptographic protocols via abstract machine
    Takaaki Mizuki
    Hiroki Shizuya
    [J]. International Journal of Information Security, 2014, 13 : 15 - 23
  • [22] Card-based protocols for securely computing the conjunction of multiple variables
    Mizuki, Takaaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 622 : 34 - 44
  • [23] The Asymmetric five-card trick: working with variable encoding in card-based protocols
    Guillen, Luis
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2023, 14 (2) : 181 - 192
  • [24] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
    Yoshifumi Manabe
    Hibiki Ono
    [J]. New Generation Computing, 2022, 40 : 67 - 93
  • [25] Minimum Round Card-Based Cryptographic Protocols Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    [J]. CRYPTOGRAPHY, 2021, 5 (03)
  • [26] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 67 - 93
  • [27] Analysis of Information Leakage Due to Operative Errors in Card-Based Protocols
    Mizuki, Takaaki
    Komano, Yuichi
    [J]. COMBINATORIAL ALGORITHMS, IWOCA 2018, 2018, 10979 : 250 - 262
  • [28] Provable analysis and improvement of smart card-based anonymous authentication protocols
    Far, Saeed Banaeian
    Alagheband, Mahdi R.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (10)
  • [29] Card-Based Overwriting Protocol for Equality Function and Applications
    Ruangwises, Suthee
    Ono, Tomoki
    Abe, Yoshiki
    Hatsugai, Yosuke
    Iwamotol, Mitsugu
    [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2024, 2024, 14776 : 18 - 27
  • [30] Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
    Watanabe, Yohei
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 218 - 222