TY - JOUR
T1 - Coin-based Secure Computations
AU - Komano, Yuichi
AU - Mizuki, Takaaki
N1 - Funding Information:
This work was supported by JSPS KAKENHI Grant Numbers JP17K00001 and JP18H05289. We would like to thank the reviewers for their invaluable comments.
Publisher Copyright:
© 2022, The Author(s).
PY - 2022/8
Y1 - 2022/8
N2 - In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, the coins themselves have never been in the spotlight. Therefore, we would like to make physical coins rise to the level of cryptography, just as a deck of physical playing cards has been used to perform a secure multi-party computation. Such a card-based protocol is known to be helpful both to perform a secure computation without any black-box computers and to understand the principles of secure protocols. In this paper, we propose a new framework of secure multi-party computation using physical coins, named a coin-based protocol. One advantage of the use of coins is that they are more ubiquitous than cards. Whereas a face-down card can conceal the information about its face side, one side of a coin reveals the information of its other side. Hence, more careful design is required for a secure coin-based protocol than for a card-based one. We formalize a computational model of the coin-based protocol and explicitly give protocols for NOT, AND, COPY, OR, and XOR computations. We also discuss the composability of the extended protocols and how to implement them in practice.
AB - In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, the coins themselves have never been in the spotlight. Therefore, we would like to make physical coins rise to the level of cryptography, just as a deck of physical playing cards has been used to perform a secure multi-party computation. Such a card-based protocol is known to be helpful both to perform a secure computation without any black-box computers and to understand the principles of secure protocols. In this paper, we propose a new framework of secure multi-party computation using physical coins, named a coin-based protocol. One advantage of the use of coins is that they are more ubiquitous than cards. Whereas a face-down card can conceal the information about its face side, one side of a coin reveals the information of its other side. Hence, more careful design is required for a secure coin-based protocol than for a card-based one. We formalize a computational model of the coin-based protocol and explicitly give protocols for NOT, AND, COPY, OR, and XOR computations. We also discuss the composability of the extended protocols and how to implement them in practice.
KW - Card-based protocol
KW - Multi-party computation
KW - Physical coin
UR - http://www.scopus.com/inward/record.url?scp=85127708295&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85127708295&partnerID=8YFLogxK
U2 - 10.1007/s10207-022-00585-8
DO - 10.1007/s10207-022-00585-8
M3 - Article
AN - SCOPUS:85127708295
SN - 1615-5262
VL - 21
SP - 833
EP - 846
JO - International Journal of Information Security
JF - International Journal of Information Security
IS - 4
ER -