TY - GEN
T1 - Card-Based Cryptography Meets 3D Printer
AU - Ito, Yuki
AU - Shikata, Hayato
AU - Suganuma, Takuo
AU - Mizuki, Takaaki
N1 - Publisher Copyright:
© The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.
PY - 2024
Y1 - 2024
N2 - Card-based protocols perform cryptographic functionalities, such as secure computations, using a deck of cards. Basically, these protocols are supposed to be implemented by humans’ manipulating physical cards. This paper is the first attempt to make use of a 3D printer for better physical implementations of card-based protocols: we have designed and fabricated a couple of physical devices using a 3D printer that are useful for humans to implement protocols. The first device we created is the “five-card-trick turner,” which can turn over five cards simultaneously in an amusing manner; this operation appears in the final step of the five-card trick, which is the most famous card-based protocol. The second device we created is a special card box for storing a pile of cards, whose concept was proposed in 2015 but the device had not been created in reality thus far. The special boxes can be used for implementing complex shuffles that seem difficult to implement only by hand. Furthermore, we propose another use of these special boxes so that we can efficiently perform secure computations of symmetric functions.
AB - Card-based protocols perform cryptographic functionalities, such as secure computations, using a deck of cards. Basically, these protocols are supposed to be implemented by humans’ manipulating physical cards. This paper is the first attempt to make use of a 3D printer for better physical implementations of card-based protocols: we have designed and fabricated a couple of physical devices using a 3D printer that are useful for humans to implement protocols. The first device we created is the “five-card-trick turner,” which can turn over five cards simultaneously in an amusing manner; this operation appears in the final step of the five-card trick, which is the most famous card-based protocol. The second device we created is a special card box for storing a pile of cards, whose concept was proposed in 2015 but the device had not been created in reality thus far. The special boxes can be used for implementing complex shuffles that seem difficult to implement only by hand. Furthermore, we propose another use of these special boxes so that we can efficiently perform secure computations of symmetric functions.
KW - 3D printer
KW - Card-based cryptography
KW - Secure computation
KW - Symmetric function
UR - http://www.scopus.com/inward/record.url?scp=85197364668&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85197364668&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-63742-1_6
DO - 10.1007/978-3-031-63742-1_6
M3 - Conference contribution
AN - SCOPUS:85197364668
SN - 9783031637414
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 74
EP - 88
BT - Unconventional Computation and Natural Computation - 21st International Conference, UCNC 2024, Proceedings
A2 - Cho, Da-Jung
A2 - Kim, Jongmin
PB - Springer Science and Business Media Deutschland GmbH
T2 - 21st International Conference on Unconventional Computation and Natural Computation, UCNC 2024
Y2 - 17 June 2024 through 21 June 2024
ER -