Card-Based Protocol Against Actively Revealing Card Attack

被引:2
|
作者
Takashima, Ken [1 ]
Miyahara, Daiki [1 ,2 ]
Mizuki, Takaaki [3 ]
Sone, Hideaki [3 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, 6-3-09 Aramaki Aza Aoba, Sendai, Miyagi 9808579, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, 2-3-26 Aomi, Tokyo 1350064, Japan
[3] Tohoku Univ, Cybersci Ctr, Aoba Ku, 6-3 Aramaki Aza Aoba, Sendai, Miyagi 9808578, Japan
关键词
Cryptography; Card-based protocols; Active Security; Secure multiparty computations;
D O I
10.1007/978-3-030-34500-6_6
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 1989, den Boer presented the first card-based protocol, called the "five-card trick" that securely computes the AND function using a deck of physical cards via a series of actions such as shuffling and turning over cards. This protocol enables a couple to confirm their mutual love without revealing their individual feelings. During such a secure computation protocol, it is important to keep any information about the inputs secret. Almost all existing card-based protocols are secure under the assumption that all players participating in a protocol are semi-honest or covert, i.e., they do not deviate from the protocol if there is a chance that they will be caught when cheating. In this paper, we consider a more malicious attack in which a player as an active adversary can reveal cards illegally without any hesitation. Against such an actively revealing card attack, we define the t-secureness, meaning that no information about the inputs leaks even if at most t cards are revealed illegally. Subsequently, we design a 1-secure AND protocol. Thus, our contribution is the construction of the first formal framework to handle actively revealing card attacks and their countermeasures.
引用
收藏
页码:95 / 106
页数:12
相关论文
共 50 条
  • [1] Actively revealing card attack on card-based protocols
    Ken Takashima
    Daiki Miyahara
    Takaaki Mizuki
    Hideaki Sone
    [J]. Natural Computing, 2022, 21 : 615 - 628
  • [2] Actively revealing card attack on card-based protocols
    Takashima, Ken
    Miyahara, Daiki
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. NATURAL COMPUTING, 2022, 21 (04) : 615 - 628
  • [3] Card-Based Secure Sorting Protocol
    Haga, Rikuo
    Toyoda, Kodai
    Shinoda, Yuto
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Hayashi, Yuichi
    Mizuki, Takaaki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2022, 2022, 13504 : 224 - 240
  • [4] Card-Based ZKP Protocol for Nurimisaki
    Robert, Leo
    Miyahara, Daiki
    Lafourcade, Pascal
    Mizuki, Takaaki
    [J]. STABILIZATION, SAFETY, AND SECURITY OF DISTRIBUTED SYSTEMS (SSS 2022), 2022, 13751 : 285 - 298
  • [5] Hide a Liar: Card-Based ZKP Protocol for Usowan
    Robert, Leo
    Miyabara, Daiki
    Lafourcade, Pascal
    Mizuki, Takaaki
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION, TAMC 2022, 2022, 13571 : 201 - 217
  • [6] Card-Based Overwriting Protocol for Equality Function and Applications
    Ruangwises, Suthee
    Ono, Tomoki
    Abe, Yoshiki
    Hatsugai, Yosuke
    Iwamotol, Mitsugu
    [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2024, 2024, 14776 : 18 - 27
  • [7] Practical Card-Based Cryptography
    Mizuki, Takaaki
    Shizuya, Hiroki
    [J]. FUN WITH ALGORITHMS, 2014, 8496 : 313 - 324
  • [8] Card-Based Covert Lottery
    Graduate School of Information Sciences, Tohoku University, Sendai, Japan
    不详
    不详
    不详
    [J]. Lect. Notes Comput. Sci., 1600, (257-270):
  • [9] Practical Card-Based Protocol for Three-Input Majority
    Yasunaga, Kenji
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2020, E103A (11) : 1296 - 1298
  • [10] Practical card-based implementations of Yao's millionaire protocol
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 803 : 207 - 221