Abstract
AbstractRecently, card-based protocols have been extensively explored to illustrate relatively complex cryptographic concepts, such as Secure Multiparty Computations, so that even non-specialists can understand them. These protocols rely on three elements: a given alphabet with a set number of physical cards, encoding those cards, and shuffling operations. However, the execution is becoming over-complicated, as most follow the same encoding: fixed uniform disclosed encoding, which constrains other elements and decreases their expressiveness. This paper introduces the asymmetric five-card trick, a generalization of the five-card trick (a seminal work in the field of card-based cryptography) with the added feature of allowing variable encoding. To do so, we propose a pre-process called “handshake” that allows protocols to adapt operations based on players’ encoding. The protocol handshake is included as part of the protocol’s production phase in the proposed general framework, which is negotiated before its execution. Finally, this paper also introduces the notion of time and space complexity in card-based protocols to assess their production and execution’s lower bounds.
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Software
Reference30 articles.
1. den Boer, B.: More efficient match-making and satisfiability the five card trick. In: Quisquater, J.J., Vandewalle, J. (eds.) Advances in Cryptology – EUROCRYPT ’89, pp. 208–217. Springer, Berlin (1990)
2. Shamir, A., Rivest, R.L., Adleman, L.M.: Mental poker. Tech. Rep. MIT/LCS/TM-125, Massachusetts Institute of Technology, 545 Technology Square, Cambridge, Massachusetts 02139 (1979)
3. Murata, S., Miyahara, D., Mizuki, T., Sone, H.: Public-pez cryptography. In: Susilo, W., Deng, R.H., Guo, F., Li, Y., Intan, R. (eds.) Information Security, pp. 59–74. Springer, Cham (2020)
4. Crépeau, C., Kilian, J.: Discreet solitary games. In: Stinson, D.R. (ed.) Advances in Cryptology – CRYPTO’ 93, pp. 319–330. Springer, Berlin (1994)
5. Niemi, V., Renvall, A.: Secure multiparty computations without computers. Theor Comput Sci 191(1), 173–183 (1998). https://doi.org/10.1016/S0304-3975(97)00107-2