Card-Based Cryptography Meets Formal Verification

被引:14
|
作者
Koch, Alexander [1 ]
Schrempp, Michael [1 ]
Kirsten, Michael [1 ]
机构
[1] Karlsruhe Inst Technol KIT, Karlsruhe, Germany
关键词
Secure multiparty computation; Card-based cryptography; Formal verification; Bounded model checking; Standard decks; Two-color decks; PROTOCOLS;
D O I
10.1007/s00354-020-00120-0
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the sake of simplicity, this is often done using cards with only two symbols, e.g.,. and.. Within this paper, we also target the setting where all cards carry distinct symbols, catering for use-cases with commonly available standard decks and aweaker indistinguishability assumption. As of yet, the literature provides for only three protocols and no proofs for non-trivial lower bounds on the number of cards. As such complex proofs (handling very large combinatorial state spaces) tend to be involved and error-prone, we propose using formal verification for finding protocols and proving lower bounds. In this paper, we employ the technique of software bounded model checking (SBMC), which reduces the problem to a bounded state space, which is automatically searched exhaustively using a SAT solver as a backend. Our contribution is threefold: (a) we identify two protocols for converting between different bit encodings with overlapping bases, and then show them to be card-minimal. This completes the picture of tight lower bounds on the number of cards with respect to runtime behavior and shuffle properties of conversion protocols. For computing AND, we show that there is no protocol with finite runtime using four cards with distinguishable symbols and fixed output encoding, and give a four-card protocol with an expected finite runtime using only random cuts. (b) We provide a general translation of proofs for lower bounds to a bounded model checking framework for automatically finding card- and run-minimal (i.e., the protocol has a run of minimal length) protocols and to give additional confidence in lower bounds. We apply this to validate our method and, as an example, confirm our new AND protocol to have its shortest run for protocols using this number of cards. (c) We extend our method to also handle the case of decks on symbols. and., where we show run-minimality for two AND protocols from the literature.
引用
收藏
页码:115 / 158
页数:44
相关论文
共 50 条
  • [31] Developing smart card-based applications using Java']Java Card
    Vandewalle, JJ
    Vétillard, E
    [J]. SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 105 - 124
  • [32] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
  • [33] Card-based security protects remote access
    不详
    [J]. COMMUNICATIONS NEWS, 1996, 33 (04): : 54 - 54
  • [34] Provably Unlinkable Smart Card-based Payments
    Bursuc, Sergiu
    Horne, Ross
    Mauw, Sjouke
    Yurkov, Semen
    [J]. PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1392 - 1406
  • [35] Efficient Card-Based Majority Voting Protocols
    Yoshiki Abe
    Takeshi Nakai
    Yoshihisa Kuroki
    Shinnosuke Suzuki
    Yuta Koga
    Yohei Watanabe
    Mitsugu Iwamoto
    Kazuo Ohta
    [J]. New Generation Computing, 2022, 40 : 173 - 198
  • [36] Card-Based Methods in Interactive Narrative Prototyping
    Koenitz, Hartmut
    Dubbelman, Teun
    Knoller, Noam
    Roth, Christian
    Haahr, Mads
    Sezen, Digdem
    Sezen, Tonguc Ibrahim
    [J]. INTERACTIVE STORYTELLING, ICIDS 2018, 2018, 11318 : 552 - 555
  • [37] Card-based protocols for secure ranking computations
    Takashima, Ken
    Abe, Yuta
    Sasaki, Tatsuya
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135
  • [38] Card-Based Protocols for Any Boolean Function
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION (TAMC 2015), 2015, 9076 : 110 - 121
  • [39] A smart card-based mental poker system
    Castella-Roca, Jordi
    Domingo-Ferrer, Josep
    Sebe, Francesc
    [J]. SMART CARD RESEARCH AND ADVANCED APPLICATIONS, PROCEEDINGS, 2006, 3928 : 48 - 61
  • [40] Dynamic card number adjusting strategy in card-based production system
    Liu, Qing
    Huang, Dao
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION RESEARCH, 2009, 47 (21) : 6037 - 6050