TY - JOUR
T1 - Card-based protocols using unequal division shuffles
AU - Nishimura, Akihiro
AU - Nishida, Takuya
AU - Hayashi, Yu ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
Acknowledgements We thank the anonymous referees, whose comments have helped us to improve the presentation of the paper. This work was supported by JSPS KAKENHI Grant Nos. 25289068, 26330001, and 17K00001.
Publisher Copyright:
© 2017, Springer-Verlag GmbH Germany.
PY - 2018/1/1
Y1 - 2018/1/1
N2 - Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and a three-card portion, these two portions are randomly switched so that nobody knows which is which. In this paper, we first show that the protocol proposed by Cheung et al. securely produces not only a hidden AND value but also a hidden OR value (with a probability of 1/2). We then modify their protocol such that, even when it fails, we can still evaluate the AND value in the clear. Furthermore, we present two five-card copy protocols (which can duplicate a hidden value) using unequal division shuffle. Because the most efficient copy protocol currently known requires six cards, our new protocols improve upon the existing results. We also design a general copy protocol that produces multiple copies using an unequal division shuffle. Furthermore, we show feasible implementations of unequal division shuffles by the use of card cases.
AB - Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and a three-card portion, these two portions are randomly switched so that nobody knows which is which. In this paper, we first show that the protocol proposed by Cheung et al. securely produces not only a hidden AND value but also a hidden OR value (with a probability of 1/2). We then modify their protocol such that, even when it fails, we can still evaluate the AND value in the clear. Furthermore, we present two five-card copy protocols (which can duplicate a hidden value) using unequal division shuffle. Because the most efficient copy protocol currently known requires six cards, our new protocols improve upon the existing results. We also design a general copy protocol that produces multiple copies using an unequal division shuffle. Furthermore, we show feasible implementations of unequal division shuffles by the use of card cases.
KW - Card games
KW - Card-based protocols
KW - Cryptography
KW - Cryptography without computers
KW - Real-life hands-on cryptography
KW - Secure multi-party computations
UR - http://www.scopus.com/inward/record.url?scp=85030536716&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85030536716&partnerID=8YFLogxK
U2 - 10.1007/s00500-017-2858-2
DO - 10.1007/s00500-017-2858-2
M3 - Article
AN - SCOPUS:85030536716
SN - 1432-7643
VL - 22
SP - 361
EP - 371
JO - Soft Computing
JF - Soft Computing
IS - 2
ER -