TY - JOUR
T1 - A formalization of card-based cryptographic protocols via abstract machine
AU - Mizuki, Takaaki
AU - Shizuya, Hiroki
N1 - Funding Information:
This work was supported by JSPS KAKENHI Grant Number 23700007.
PY - 2014/2
Y1 - 2014/2
N2 - Consider a face-down card lying on the table such that we do not know whether its suit color is black or red. Then, how do we make identical copies of the card while keeping its color secret? A partial solution has been devised: using a number of additional black and red cards, Niemi and Renvall proposed an excellent protocol which can copy a face-down card while allowing only a small probability of revealing its color. In contrast, this paper shows the nonexistence of a perfect solution, namely, the impossibility of copying a face-down card with perfect secrecy. To prove such an impossibility result, we construct a rigorous mathematical model of card-based cryptographic protocols; giving this general computational model is the main result of this paper.
AB - Consider a face-down card lying on the table such that we do not know whether its suit color is black or red. Then, how do we make identical copies of the card while keeping its color secret? A partial solution has been devised: using a number of additional black and red cards, Niemi and Renvall proposed an excellent protocol which can copy a face-down card while allowing only a small probability of revealing its color. In contrast, this paper shows the nonexistence of a perfect solution, namely, the impossibility of copying a face-down card with perfect secrecy. To prove such an impossibility result, we construct a rigorous mathematical model of card-based cryptographic protocols; giving this general computational model is the main result of this paper.
KW - Card games
KW - Card-based protocols
KW - Cryptography without computers
KW - Recreational cryptography
KW - Secure computations
UR - http://www.scopus.com/inward/record.url?scp=84893647951&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84893647951&partnerID=8YFLogxK
U2 - 10.1007/s10207-013-0219-4
DO - 10.1007/s10207-013-0219-4
M3 - Article
AN - SCOPUS:84893647951
SN - 1615-5262
VL - 13
SP - 15
EP - 23
JO - International Journal of Information Security
JF - International Journal of Information Security
IS - 1
ER -