Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/978-981-97-7737-2_5guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening

Published: 17 September 2024 Publication History

Abstract

Card-based protocols are cryptographic protocols that use a deck of physical cards. In this paper, we deal with card-based protocols using a standard deck of playing cards, which are commonly available commercially. For finite-runtime committed-format protocols, Mizuki (CANS 2016) proposed an eight-card AND protocol with four random bisection cuts and a six-card COPY protocol with one random bisection cut. In this paper, we propose a partial-open action, which reveals any position of the face of cards, by generalizing the half-open action introduced by Miyahara and Mizuki (IJTCS-FAW 2022). Using the partial-open action, we propose a four-card AND protocol with three random cuts and a four-card COPY protocol with three random cuts. We note that, without partial-open actions, these protocols are known to be impossible to construct. Therefore, the partial-open actions are inherently necessary to obtain our results.

References

[1]
Boer BD Quisquater J-J and Vandewalle J More efficient match-making and satisfiability the five card trick EUROCRYPT 1989 1990 Heidelberg Springer 208-217
[2]
Crépeau C and Kilian J Stinson DR Discreet solitary games Advances in Cryptology–CRYPTO’ 93 1994 Heidelberg Springer 319-330
[3]
Haga R, Hayashi Y, Miyahara D, and Mizuki T Batina L and Daemen J Card-minimal protocols for three-input functions with standard playing cards AFRICACRYPT 2022 2022 Cham Springer 448-468
[4]
Kastner J, Koch A, Walzer S, Miyahara D, Hayashi Y, Mizuki T, and Sone H Takagi T and Peyrin T The minimum number of cards in practical card-based protocols Advances in Cryptology–ASIACRYPT 2017 2017 Cham Springer 126-155
[5]
Koch A, Schrempp M, and Kirsten M Galbraith SD and Moriai S Card-based cryptography meets formal verification Advances in Cryptology-ASIACRYPT 2019 2019 Cham Springer 488-517
[6]
Koyama H, Miyahara D, Mizuki T, and Sone H Santhanam R and Musatov D A secure three-input AND protocol with a standard deck of minimal cards Computer Science - Theory and Applications 2021 Cham Springer 242-256
[7]
Koyama, H., Toyoda, K., Miyahara, D., Mizuki, T.: New card-based copy protocols using only random cuts. In: ASIA Public-Key Cryptography Workshop, pp. 13–22. ACM (2021)
[8]
Manabe Y and Ono H Cerone A and Ölveczky PC Card-based cryptographic protocols with a standard deck of cards using private operations Theoretical Aspects of Computing - ICTAC 2021 2021 Cham Springer 256-274
[9]
Miyahara D, Hayashi Y, Mizuki T, and Sone H Practical card-based implementations of Yao’s millionaire protocol Theor. Comput. Sci. 2020 803 207-221
[10]
Miyahara D and Mizuki T Li M and Sun X Secure computations through checking suits of playing cards Frontiers in Algorithmics 2023 Cham Springer 110-128
[11]
Mizuki T Foresti S and Persiano G Efficient and secure multiparty computations using a standard deck of playing cards Cryptology and Network Security 2016 Cham Springer 484-499
[12]
Morooka T, Manabe Y, and Shinagawa K Meng W, Yan Z, and Piuri V Malicious player card-based cryptographic protocols with a standard deck of cards using private operations ISPEC 2023 2023 Heidelberg Springer 332-346
[13]
Niemi, V., Renvall, A.: Solitaire zero-knowledge. Fund. Inf. 38(1,2), 181–188 (1999)
[14]
Ruangwises S Chen C-Y, Hon W-K, Hung L-J, and Lee C-W Two standard decks of playing cards are sufficient for a ZKP for Sudoku Computing and Combinatorics 2021 Cham Springer 631-642
[15]
Ruangwises S Two standard decks of playing cards are sufficient for a ZKP for Sudoku New Gener. Comput. 2022 40 49-65

Index Terms

  1. Efficient Card-Based Protocols with a Standard Deck of Playing Cards Using Partial Opening
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image Guide Proceedings
            Advances in Information and Computer Security: 19th International Workshop on Security, IWSEC 2024, Kyoto, Japan, September 17–19, 2024, Proceedings
            Sep 2024
            309 pages
            ISBN:978-981-97-7736-5
            DOI:10.1007/978-981-97-7737-2

            Publisher

            Springer-Verlag

            Berlin, Heidelberg

            Publication History

            Published: 17 September 2024

            Author Tags

            1. Card-based cryptography
            2. Playing cards
            3. Committed-format
            4. Finite-runtime
            5. Random cut
            6. Half-open action
            7. Partial-open action

            Qualifiers

            • Article

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • 0
              Total Citations
            • 0
              Total Downloads
            • Downloads (Last 12 months)0
            • Downloads (Last 6 weeks)0
            Reflects downloads up to 19 Feb 2025

            Other Metrics

            Citations

            View Options

            View options

            Figures

            Tables

            Media

            Share

            Share

            Share this Publication link

            Share on social media