Analyzing execution time of card-based protocols

Daiki Miyahara, Itaru Ueda, Yu ichi Hayashi, Takaaki Mizuki, Hideaki Sone

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Card-based cryptography is an attractive and unconventional computation model; it provides secure computing methods using a deck of physical cards. It is noteworthy that a card-based protocol can be easily executed by non-experts such as high school students without the use of any electric device. One of the main goals in this discipline is to develop efficient protocols. The efficiency has been evaluated by the number of required cards, the number of colors, and the average number of protocol trials. Although these evaluation metrics are simple and reasonable, it is difficult to estimate the total number of operations or execution time of protocols based only on these three metrics. Therefore, in this paper, we consider adding other metrics to estimate the execution time of protocols more precisely. Furthermore, we actually evaluate some of the important existing protocols using our new criteria.

Original languageEnglish
Title of host publicationUnconventional Computation and Natural Computation - 17th International Conference, UCNC 2018, Proceedings
EditorsSusan Stepney, Sergey Verlan
PublisherSpringer Verlag
Pages145-158
Number of pages14
ISBN (Print)9783319924342
DOIs
Publication statusPublished - 2018
Event17th International Conference on Unconventional Computation and Natural Computation, UCNC 2018 - Fontainebleau, France
Duration: 2018 Jun 252018 Jun 29

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10867 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference17th International Conference on Unconventional Computation and Natural Computation, UCNC 2018
Country/TerritoryFrance
CityFontainebleau
Period18/6/2518/6/29

Keywords

  • Card-based protocols
  • Cryptography
  • Real-life hands-on cryptography
  • Secure multi-party computations

Fingerprint

Dive into the research topics of 'Analyzing execution time of card-based protocols'. Together they form a unique fingerprint.

Cite this