TY - JOUR
T1 - Information leakage due to operative errors in card-based protocols
AU - Mizuki, Takaaki
AU - Komano, Yuichi
N1 - Funding Information:
We would like to thank the anonymous reviewers for their fruitful comments. This work was supported by JSPS KAKENHI Grant Numbers JP17K00001 , JP18H05289 , and JP21K11881 .
Publisher Copyright:
© 2022 The Author(s)
PY - 2022/5
Y1 - 2022/5
N2 - Card-based protocols provide secure multi-party computation using a deck of physical cards via a series of operations, such as shuffling and turning over cards, that are executed by humans. Although almost all existing protocols have been designed to be perfectly secure, operative errors by humans can lead to information leakage. In this paper, we propose a technique for analyzing information leakage due to operative errors in card-based protocols. In particular, we introduce a concept, which we call a “probability trace,” and by enhancing the KWH diagram proposed by Koch, Walzer, and Härtel, we propose a diagrammatic representation for displaying the amount of information leaked. By applying our diagram to a card-based protocol with an operative error, we can precisely reveal the leakage of players' inputs from the protocol output. In addition, we discuss how to detect human errors when people execute the existing six-card AND protocol.
AB - Card-based protocols provide secure multi-party computation using a deck of physical cards via a series of operations, such as shuffling and turning over cards, that are executed by humans. Although almost all existing protocols have been designed to be perfectly secure, operative errors by humans can lead to information leakage. In this paper, we propose a technique for analyzing information leakage due to operative errors in card-based protocols. In particular, we introduce a concept, which we call a “probability trace,” and by enhancing the KWH diagram proposed by Koch, Walzer, and Härtel, we propose a diagrammatic representation for displaying the amount of information leaked. By applying our diagram to a card-based protocol with an operative error, we can precisely reveal the leakage of players' inputs from the protocol output. In addition, we discuss how to detect human errors when people execute the existing six-card AND protocol.
KW - Card-based cryptography
KW - Cryptography
KW - Deck of cards
KW - Secure multi-party computations
UR - http://www.scopus.com/inward/record.url?scp=85129528789&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85129528789&partnerID=8YFLogxK
U2 - 10.1016/j.ic.2022.104910
DO - 10.1016/j.ic.2022.104910
M3 - Article
AN - SCOPUS:85129528789
SN - 0890-5401
VL - 285
JO - Information and Computation
JF - Information and Computation
M1 - 104910
ER -