Card-based protocols using unequal division shuffles

被引:20
|
作者
Nishimura, Akihiro [1 ]
Nishida, Takuya [1 ]
Hayashi, Yu-ichi [2 ]
Mizuki, Takaaki [3 ]
Sone, Hideaki [3 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Sone Mizuki Lab, 6-3 Aramaki Aza Aoba, Sendai, Miyagi 9808578, Japan
[2] Nara Inst Sci & Technol, Grad Sch Informat Sci, 8916-5 Takayama, Nara 6300192, Japan
[3] Tohoku Univ, Cybersci Ctr, 6-3 Aramaki Aza Aoba, Sendai, Miyagi 9808578, Japan
关键词
Cryptography; Card-based protocols; Card games; Cryptography without computers; Real-life hands-on cryptography; Secure multi-party computations; COMPUTATIONS; SECURE;
D O I
10.1007/s00500-017-2858-2
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and a three-card portion, these two portions are randomly switched so that nobody knows which is which. In this paper, we first show that the protocol proposed by Cheung et al. securely produces not only a hidden AND value but also a hidden OR value (with a probability of 1/2). We then modify their protocol such that, even when it fails, we can still evaluate the AND value in the clear. Furthermore, we present two five-card copy protocols (which can duplicate a hidden value) using unequal division shuffle. Because the most efficient copy protocol currently known requires six cards, our new protocols improve upon the existing results. We also design a general copy protocol that produces multiple copies using an unequal division shuffle. Furthermore, we show feasible implementations of unequal division shuffles by the use of card cases.
引用
收藏
页码:361 / 371
页数:11
相关论文
共 50 条
  • [1] Card-based protocols using unequal division shuffles
    Akihiro Nishimura
    Takuya Nishida
    Yu-ichi Hayashi
    Takaaki Mizuki
    Hideaki Sone
    [J]. Soft Computing, 2018, 22 : 361 - 371
  • [2] Card-Based Protocols Using Regular Polygon Cards
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Schuldt, Jacob C. N.
    Nuida, Koji
    Kanayama, Naoki
    Nishide, Takashi
    Hanaoka, Goichiro
    Okamoto, Eiji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (09): : 1900 - 1909
  • [3] Actively revealing card attack on card-based protocols
    Ken Takashima
    Daiki Miyahara
    Takaaki Mizuki
    Hideaki Sone
    [J]. Natural Computing, 2022, 21 : 615 - 628
  • [4] Actively revealing card attack on card-based protocols
    Takashima, Ken
    Miyahara, Daiki
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. NATURAL COMPUTING, 2022, 21 (04) : 615 - 628
  • [5] Card-Based Cryptographic Protocols Using a Minimal Number of Cards
    Koch, Alexander
    Walzer, Stefan
    Haertel, Kevin
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 783 - 807
  • [6] Analyzing Execution Time of Card-Based Protocols
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
  • [7] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
  • [8] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
    Yoshifumi Manabe
    Hibiki Ono
    [J]. New Generation Computing, 2022, 40 : 67 - 93
  • [9] Efficient Card-Based Majority Voting Protocols
    Yoshiki Abe
    Takeshi Nakai
    Yoshihisa Kuroki
    Shinnosuke Suzuki
    Yuta Koga
    Yohei Watanabe
    Mitsugu Iwamoto
    Kazuo Ohta
    [J]. New Generation Computing, 2022, 40 : 173 - 198
  • [10] Card-based protocols for secure ranking computations
    Takashima, Ken
    Abe, Yuta
    Sasaki, Tatsuya
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135