Computational Model of Card-Based Cryptographic Protocols and Its Applications

被引:40
|
作者
Mizuki, Takaaki [1 ]
Shizuya, Hiroki [2 ]
机构
[1] Tohoku Univ, Cybersci Ctr, Sendai, Miyagi 9808578, Japan
[2] Tohoku Univ, Ctr Informat Technol Educ, Sendai, Miyagi 9808578, Japan
关键词
card-based protocols; card games; cryptography without computers; real-life hands-on cryptography; secure multiparty computations; MULTIPARTY COMPUTATION; SECURE;
D O I
10.1587/transfun.E100.A.3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based protocols enable us to easily perform cryptographic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of somewhat intuitive and verbal descriptions, such as "turn over this card," "shuffle these two cards," "apply a random cut to these five cards," and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.
引用
收藏
页码:3 / 11
页数:9
相关论文
共 50 条
  • [21] Efficient Card-Based Majority Voting Protocols
    Yoshiki Abe
    Takeshi Nakai
    Yoshihisa Kuroki
    Shinnosuke Suzuki
    Yuta Koga
    Yohei Watanabe
    Mitsugu Iwamoto
    Kazuo Ohta
    New Generation Computing, 2022, 40 : 173 - 198
  • [22] Card-Based Protocols for Any Boolean Function
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    THEORY AND APPLICATIONS OF MODELS OF COMPUTATION (TAMC 2015), 2015, 9076 : 110 - 121
  • [23] Card-based protocols for secure ranking computations
    Takashima, Ken
    Abe, Yuta
    Sasaki, Tatsuya
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Sone, Hideaki
    THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135
  • [24] Card-Based Cryptographic Logical Computations Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    NEW GENERATION COMPUTING, 2021, 39 (01) : 19 - 40
  • [25] Card-Based Cryptographic Logical Computations Using Private Operations
    Hibiki Ono
    Yoshifumi Manabe
    New Generation Computing, 2021, 39 : 19 - 40
  • [26] Pile-Shifting Scramble for Card-Based Protocols
    Nishimura, Akihiro
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1494 - 1502
  • [27] The Minimum Number of Cards in Practical Card-Based Protocols
    Kastner, Julia
    Koch, Alexander
    Walzer, Stefan
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 126 - 155
  • [28] Card-Based Protocols for Private Set Intersection and Union
    Doi, Anastasiia
    Ono, Tomoki
    Abe, Yoshiki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    NEW GENERATION COMPUTING, 2024, 42 (03) : 359 - 380
  • [29] Card-based protocols using unequal division shuffles
    Nishimura, Akihiro
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    SOFT COMPUTING, 2018, 22 (02) : 361 - 371
  • [30] Evaluating card-based protocols in terms of execution time
    Daiki Miyahara
    Itaru Ueda
    Yu-ichi Hayashi
    Takaaki Mizuki
    Hideaki Sone
    International Journal of Information Security, 2021, 20 : 729 - 740