Analysis of information leakage due to operative errors in card-based protocols

Takaaki Mizuki, Yuichi Komano

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Citations (Scopus)

Abstract

Card-based protocols provide secure multi-party computation using a deck of physical cards, via a series of operations such as shuffling and turning over cards, which are supposed to be executed by humans. Although almost all existing protocols have been designed to be perfectly secure, operative errors by humans would cause information leakage. In this paper, we propose a technique for analyzing information leakage due to operative errors in card-based protocols. To be specific, we introduce a concept, which we call a “probability trace,” and propose a new diagram for displaying how much information leaks, by enhancing the KWH diagram proposed by Koch, Walzer, and Härtel. By applying our diagram to a card-based protocol with an operative error, we can precisely reveal the leakage of players’ inputs from the protocol output. We also discuss an application of the diagram to human-error-free implementations of the existing six-card AND protocol.

Original languageEnglish
Title of host publicationCombinatorial Algorithms - 29th International Workshop, IWOCA 2018, Proceedings
EditorsHon Wai Leong, Costas Iliopoulos, Wing-Kin Sung
PublisherSpringer Verlag
Pages250-262
Number of pages13
ISBN (Print)9783319946665
DOIs
Publication statusPublished - 2018
Event29th International Workshop on Combinatorial Algorithms, IWOCA 2018 - Singapore, Singapore
Duration: 2018 Jul 162018 Jul 19

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10979 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other29th International Workshop on Combinatorial Algorithms, IWOCA 2018
Country/TerritorySingapore
CitySingapore
Period18/7/1618/7/19

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'Analysis of information leakage due to operative errors in card-based protocols'. Together they form a unique fingerprint.

Cite this