TY - GEN
T1 - Analysis of information leakage due to operative errors in card-based protocols
AU - Mizuki, Takaaki
AU - Komano, Yuichi
N1 - Funding Information:
This work was supported by JSPS KAKENHI Grant Number JP17K00001.
Publisher Copyright:
© Springer International Publishing AG, part of Springer Nature 2018.
PY - 2018
Y1 - 2018
N2 - Card-based protocols provide secure multi-party computation using a deck of physical cards, via a series of operations such as shuffling and turning over cards, which are supposed to be executed by humans. Although almost all existing protocols have been designed to be perfectly secure, operative errors by humans would cause information leakage. In this paper, we propose a technique for analyzing information leakage due to operative errors in card-based protocols. To be specific, we introduce a concept, which we call a “probability trace,” and propose a new diagram for displaying how much information leaks, by enhancing the KWH diagram proposed by Koch, Walzer, and Härtel. By applying our diagram to a card-based protocol with an operative error, we can precisely reveal the leakage of players’ inputs from the protocol output. We also discuss an application of the diagram to human-error-free implementations of the existing six-card AND protocol.
AB - Card-based protocols provide secure multi-party computation using a deck of physical cards, via a series of operations such as shuffling and turning over cards, which are supposed to be executed by humans. Although almost all existing protocols have been designed to be perfectly secure, operative errors by humans would cause information leakage. In this paper, we propose a technique for analyzing information leakage due to operative errors in card-based protocols. To be specific, we introduce a concept, which we call a “probability trace,” and propose a new diagram for displaying how much information leaks, by enhancing the KWH diagram proposed by Koch, Walzer, and Härtel. By applying our diagram to a card-based protocol with an operative error, we can precisely reveal the leakage of players’ inputs from the protocol output. We also discuss an application of the diagram to human-error-free implementations of the existing six-card AND protocol.
UR - http://www.scopus.com/inward/record.url?scp=85049879654&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85049879654&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-94667-2_21
DO - 10.1007/978-3-319-94667-2_21
M3 - Conference contribution
AN - SCOPUS:85049879654
SN - 9783319946665
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 250
EP - 262
BT - Combinatorial Algorithms - 29th International Workshop, IWOCA 2018, Proceedings
A2 - Leong, Hon Wai
A2 - Iliopoulos, Costas
A2 - Sung, Wing-Kin
PB - Springer Verlag
T2 - 29th International Workshop on Combinatorial Algorithms, IWOCA 2018
Y2 - 16 July 2018 through 19 July 2018
ER -