Actively revealing card attack on card-based protocols

被引:7
|
作者
Takashima, Ken [1 ]
Miyahara, Daiki [1 ,2 ]
Mizuki, Takaaki [3 ]
Sone, Hideaki [3 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, 6-3-09 Aramaki Aza Aoba, Sendai, Miyagi 9808579, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, 2-3-26 Aomi, Tokyo 1350064, Japan
[3] Tohoku Univ, Cybersci Ctr, Aoba Ku, 6-3 Aramaki Aza Aoba, Sendai, Miyagi 9808578, Japan
关键词
Cryptography; Card-based protocols; Active security; Secure multiparty computations;
D O I
10.1007/s11047-020-09838-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1989, den Boer presented the first card-based protocol, called the "five-card trick," that securely computes the AND function using a deck of physical cards via a series of actions such as shuffling and turning over cards. This protocol enables a couple to confirm their mutual love without revealing their individual feelings. During such a secure computation protocol, it is important to keep any information about the inputs secret. Almost all existing card-based protocols are secure under the assumption that all players participating in a protocol are semi-honest or covert, i.e., they do not deviate from the protocol if there is a chance that they will be caught when cheating. In this paper, we consider a more malicious attack in which a player as an active adversary can reveal cards illegally without any hesitation. Against such an actively revealing card attack, we define the t-secureness, meaning that no information about the inputs leaks even if at most t cards are revealed illegally. We then actually design t-secure AND protocols. Thus, our contribution is the construction of the first formal framework to handle actively revealing card attacks as well as their countermeasures.
引用
收藏
页码:615 / 628
页数:14
相关论文
共 50 条
  • [1] Actively revealing card attack on card-based protocols
    Ken Takashima
    Daiki Miyahara
    Takaaki Mizuki
    Hideaki Sone
    [J]. Natural Computing, 2022, 21 : 615 - 628
  • [2] Card-Based Protocol Against Actively Revealing Card Attack
    Takashima, Ken
    Miyahara, Daiki
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORY AND PRACTICE OF NATURAL COMPUTING, TPNC 2019, 2019, 11934 : 95 - 106
  • [3] Analyzing Execution Time of Card-Based Protocols
    Miyahara, Daiki
    Ueda, Itaru
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. UNCONVENTIONAL COMPUTATION AND NATURAL COMPUTATION, UCNC 2018, 2018, 10867 : 145 - 158
  • [4] Efficient Card-Based Majority Voting Protocols
    Abe, Yoshiki
    Nakai, Takeshi
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Watanabe, Yohei
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. NEW GENERATION COMPUTING, 2022, 40 (01) : 173 - 198
  • [5] Efficient Card-Based Majority Voting Protocols
    Yoshiki Abe
    Takeshi Nakai
    Yoshihisa Kuroki
    Shinnosuke Suzuki
    Yuta Koga
    Yohei Watanabe
    Mitsugu Iwamoto
    Kazuo Ohta
    [J]. New Generation Computing, 2022, 40 : 173 - 198
  • [6] Card-based protocols for secure ranking computations
    Takashima, Ken
    Abe, Yuta
    Sasaki, Tatsuya
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 845 : 122 - 135
  • [7] Card-Based Protocols for Any Boolean Function
    Nishida, Takuya
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. THEORY AND APPLICATIONS OF MODELS OF COMPUTATION (TAMC 2015), 2015, 9076 : 110 - 121
  • [8] Pile-Shifting Scramble for Card-Based Protocols
    Nishimura, Akihiro
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (09): : 1494 - 1502
  • [9] The Minimum Number of Cards in Practical Card-Based Protocols
    Kastner, Julia
    Koch, Alexander
    Walzer, Stefan
    Miyahara, Daiki
    Hayashi, Yu-ichi
    Mizuki, Takaaki
    Sone, Hideaki
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2017, PT III, 2017, 10626 : 126 - 155
  • [10] Card-Based Protocols for Private Set Intersection and Union
    Doi, Anastasiia
    Ono, Tomoki
    Abe, Yoshiki
    Nakai, Takeshi
    Shinagawa, Kazumasa
    Watanabe, Yohei
    Nuida, Koji
    Iwamoto, Mitsugu
    [J]. NEW GENERATION COMPUTING, 2024, 42 (03) : 359 - 380