Computational Model of Card-Based Cryptographic Protocols and Its Applications

被引:40
|
作者
Mizuki, Takaaki [1 ]
Shizuya, Hiroki [2 ]
机构
[1] Tohoku Univ, Cybersci Ctr, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Ctr Informat Technol Educ, Sendai, Miyagi 9808578, Japan
关键词
card-based protocols; card games; cryptography without computers; real-life hands-on cryptography; secure multiparty computations; MULTIPARTY COMPUTATION; SECURE;
D O I
10.1587/transfun.E100.A.3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based protocols enable us to easily perform cryptographic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of somewhat intuitive and verbal descriptions, such as "turn over this card," "shuffle these two cards," "apply a random cut to these five cards," and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.
引用
收藏
页码:3 / 11
页数:9
相关论文
共 50 条
  • [1] Card-based Cryptographic Protocols for Private Set Intersection
    Doi, Anastasiia
    Ono, Tomoki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    2022 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, ISITA, 2022, : 239 - 243
  • [2] A formalization of card-based cryptographic protocols via abstract machine
    Mizuki, Takaaki
    Shizuya, Hiroki
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (01) : 15 - 23
  • [3] Card-Based Cryptographic Protocols Using a Minimal Number of Cards
    Koch, Alexander
    Walzer, Stefan
    Haertel, Kevin
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 783 - 807
  • [4] A formalization of card-based cryptographic protocols via abstract machine
    Takaaki Mizuki
    Hiroki Shizuya
    International Journal of Information Security, 2014, 13 : 15 - 23
  • [5] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
    Yoshifumi Manabe
    Hibiki Ono
    New Generation Computing, 2022, 40 : 67 - 93
  • [6] Minimum Round Card-Based Cryptographic Protocols Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    CRYPTOGRAPHY, 2021, 5 (03)
  • [7] Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    NEW GENERATION COMPUTING, 2022, 40 (01) : 67 - 93
  • [8] Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    THEORETICAL ASPECTS OF COMPUTING, ICTAC 2021, 2021, 12819 : 256 - 274
  • [9] Efficient Card-Based Cryptographic Protocols for Millionaires' Problem Utilizing Private Permutations
    Nakai, Takeshi
    Tokushige, Yuuki
    Misawa, Yuto
    Iwamoto, Mitsugu
    Ohta, Kazuo
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 : 500 - 517
  • [10] Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 156 - 173