Card-based Cryptography with a Standard Deck of Cards, Revisited: Efficient Protocols in the Private Model
-
Published:2024-06-21
Issue:3
Volume:42
Page:345-358
-
ISSN:0288-3635
-
Container-title:New Generation Computing
-
language:en
-
Short-container-title:New Gener. Comput.
Author:
Nakai TakeshiORCID, Iwanari Keita, Ono Tomoki, Abe Yoshiki, Watanabe Yohei, Iwamoto Mitsugu
Abstract
AbstractCard-based cryptography is a secure computation protocol realized by using physical cards. There are two models on card-based cryptography: public and private models. We adopt private one that allows players to handle cards privately. While much of the existing works for card-based cryptography use two-colored cards, it is also a vital task to construct an efficient protocol with playing cards. In the public model, 2n cards are necessary for any n-bit input protocol since at least two cards are required to express a Boolean value. It holds true for both two-colored and playing-card settings. On the other hand, the private model enables us to construct a protocol with fewer than 2n cards. However, all existing protocols that achieve such properties are only in the two-colored setting. This paper shows that the private model enables us to construct a protocol with fewer than 2n cards using the playing cards. We first show two-bit input protocols with fewer than four cards for logical operations, AND, OR, and XOR. Furthermore, we show a three-input majority voting protocol using only three cards, which is constructed by combining our AND and OR protocols. Notably, our proposed protocols require no randomness. All operations are deterministic and depend only on players’ private inputs.
Funder
Japan Society for the Promotion of Science Core Research for Evolutional Science and Technology
Publisher
Springer Science and Business Media LLC
Reference29 articles.
1. Abe, Y., Iwamoto, M., Ohta, K.: How to detect malicious behaviors in a card-based majority voting protocol with three inputs. In: 2020 International Symposium on Information Theory and Its Applications (ISITA), pp. 377–381 (2020) 2. Abe, Y., Nakai, T., Kuroki, Y., Suzuki, S., Koga, Y., Watanabe, Y., Iwamoto, M., Ohta, K.: Efficient card-based majority voting protocols. New Gen. Comput. 40(1), 173–198 (2022) 3. Abe, Y., Nakai, T., Watanabe, Y., Iwamoto, M., Ohta, K.: A computationally efficient card-based majority voting protocol with fewer cards in the private model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E106.A(3), 315–324 (2023) 4. Crépeau, C., Kilian, J.: Discreet solitary games. In: Advances in Cryptology—CRYPTO ’93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22–26, 1993, Proceedings, pp. 319–330 (1993) 5. den Boer, B.: More efficient match-making and satisfiability: the five card trick. In: Advances in Cryptology—EUROCRYPT ’89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10–13, 1989, Proceedings, pp. 208–217 (1989)
|
|