TY - JOUR
T1 - Card-based protocols for secure ranking computations
AU - Takashima, Ken
AU - Abe, Yuta
AU - Sasaki, Tatsuya
AU - Miyahara, Daiki
AU - Shinagawa, Kazumasa
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
We thank the anonymous referees, whose comments have helped us to improve the presentation of the paper. This work was supported in part by JSPS KAKENHI Grant Numbers JP17K00001 , JP17J01169 , and JP19J21153 .
Publisher Copyright:
© 2020 The Author(s)
PY - 2020/12/12
Y1 - 2020/12/12
N2 - Consider a group of people who want to know the “rich list” among them, namely the ranking in terms of their total assets, without revealing any information about the actual value of their assets. This can be achieved by a “secure ranking computation,” which was first considered by Jiang and Gong (2006) [2]; they constructed a secure ranking computation protocol based on a public-key cryptosystem. In this paper, instead of using a public-key cryptosystem, we use a deck of physical cards to provide secure ranking computation protocols. Therefore, our card-based protocols do not rely on computers, and they are simple and easy for humans to implement. Specifically, we design four protocols considering tradeoffs between the number of cards and the number of shuffles required to execute the protocols. We also present a guide to choose an appropriate protocol according to the number of people participating in the protocol and the size of the input range. To be precise, whereas our protocols make all players know the rich list, the Jiang–Gong scheme makes each player know his/her rank only; to achieve the same task (as the Jiang–Gong scheme) using a deck of cards is an intriguing open problem.
AB - Consider a group of people who want to know the “rich list” among them, namely the ranking in terms of their total assets, without revealing any information about the actual value of their assets. This can be achieved by a “secure ranking computation,” which was first considered by Jiang and Gong (2006) [2]; they constructed a secure ranking computation protocol based on a public-key cryptosystem. In this paper, instead of using a public-key cryptosystem, we use a deck of physical cards to provide secure ranking computation protocols. Therefore, our card-based protocols do not rely on computers, and they are simple and easy for humans to implement. Specifically, we design four protocols considering tradeoffs between the number of cards and the number of shuffles required to execute the protocols. We also present a guide to choose an appropriate protocol according to the number of people participating in the protocol and the size of the input range. To be precise, whereas our protocols make all players know the rich list, the Jiang–Gong scheme makes each player know his/her rank only; to achieve the same task (as the Jiang–Gong scheme) using a deck of cards is an intriguing open problem.
KW - Card-based protocols
KW - Deck of cards
KW - Secure multi-party computations
KW - Secure ranking computation
KW - Yao's millionaire protocol
UR - http://www.scopus.com/inward/record.url?scp=85091119187&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85091119187&partnerID=8YFLogxK
U2 - 10.1016/j.tcs.2020.09.008
DO - 10.1016/j.tcs.2020.09.008
M3 - Article
AN - SCOPUS:85091119187
SN - 0304-3975
VL - 845
SP - 122
EP - 135
JO - Theoretical Computer Science
JF - Theoretical Computer Science
ER -