Actively revealing card attack on card-based protocols

被引:7
|
作者
Takashima, Ken [1 ]
Miyahara, Daiki [1 ,2 ]
Mizuki, Takaaki [3 ]
Sone, Hideaki [3 ]
机构
[1] Tohoku Univ, Grad Sch Informat Sci, Aoba Ku, 6-3-09 Aramaki Aza Aoba, Sendai, Miyagi 9808579, Japan
[2] Natl Inst Adv Ind Sci & Technol, Koto Ku, 2-3-26 Aomi, Tokyo 1350064, Japan
[3] Tohoku Univ, Cybersci Ctr, Aoba Ku, 6-3 Aramaki Aza Aoba, Sendai, Miyagi 9808578, Japan
关键词
Cryptography; Card-based protocols; Active security; Secure multiparty computations;
D O I
10.1007/s11047-020-09838-8
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1989, den Boer presented the first card-based protocol, called the "five-card trick," that securely computes the AND function using a deck of physical cards via a series of actions such as shuffling and turning over cards. This protocol enables a couple to confirm their mutual love without revealing their individual feelings. During such a secure computation protocol, it is important to keep any information about the inputs secret. Almost all existing card-based protocols are secure under the assumption that all players participating in a protocol are semi-honest or covert, i.e., they do not deviate from the protocol if there is a chance that they will be caught when cheating. In this paper, we consider a more malicious attack in which a player as an active adversary can reveal cards illegally without any hesitation. Against such an actively revealing card attack, we define the t-secureness, meaning that no information about the inputs leaks even if at most t cards are revealed illegally. We then actually design t-secure AND protocols. Thus, our contribution is the construction of the first formal framework to handle actively revealing card attacks as well as their countermeasures.
引用
收藏
页码:615 / 628
页数:14
相关论文
共 50 条
  • [31] Cobacabana (control of balance by card-based navigation): A card-based system for job shop control
    Land, Martin J.
    [J]. INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2009, 117 (01) : 97 - 103
  • [32] Card-Based Secure Sorting Protocol
    Haga, Rikuo
    Toyoda, Kodai
    Shinoda, Yuto
    Miyahara, Daiki
    Shinagawa, Kazumasa
    Hayashi, Yuichi
    Mizuki, Takaaki
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2022, 2022, 13504 : 224 - 240
  • [33] A security framework for card-based systems
    Tsiounis, Y
    [J]. FINANCIAL CRYTOGRAPHY, PROCEEDINGS, 2002, 2339 : 210 - 231
  • [34] Card-Based Majority Voting Protocols with Three Inputs Using Three Cards
    Watanabe, Yohei
    Kuroki, Yoshihisa
    Suzuki, Shinnosuke
    Koga, Yuta
    Iwamoto, Mitsugu
    Ohta, Kazuo
    [J]. PROCEEDINGS OF 2018 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA2018), 2018, : 218 - 222
  • [35] Method Card Design Dimensions: A Survey of Card-Based Design Tools
    Woelfel, Christiane
    Merritt, Timothy
    [J]. HUMAN-COMPUTER INTERACTION - INTERACT 2013, PT I, 2013, 8117 : 479 - 486
  • [36] Raman microspectroscopy with a card-based spectrograph
    Sommer, AJ
    Stewart, SA
    [J]. APPLIED SPECTROSCOPY, 1999, 53 (04) : 483 - 488
  • [37] Card-based Cryptography with Dihedral Symmetry
    Shinagawa, Kazumasa
    [J]. NEW GENERATION COMPUTING, 2021, 39 (01) : 41 - 71
  • [38] Developing smart card-based applications using Java']Java Card
    Vandewalle, JJ
    Vétillard, E
    [J]. SMART CARD RESEARCH AND APPLICATIONS, PROCEEDINGS, 2000, 1820 : 105 - 124
  • [39] Card-Based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
    Manabe, Yoshifumi
    Ono, Hibiki
    [J]. THEORETICAL ASPECTS OF COMPUTING, ICTAC 2021, 2021, 12819 : 256 - 274
  • [40] Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations
    Ono, Hibiki
    Manabe, Yoshifumi
    [J]. DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, 2019, 11737 : 156 - 173