TY - GEN
T1 - Practical and easy-to-understand card-based implementation of Yao’s millionaire protocol
AU - Miyahara, Daiki
AU - Hayashi, Yu Ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
Acknowledgments. We thank the anonymous referees, whose comments have helped us to improve the presentation of the paper. This work was supported by JSPS KAK-ENHI Grant Number JP17K00001.
Publisher Copyright:
© 2018, Springer Nature Switzerland AG.
PY - 2018
Y1 - 2018
N2 - Yao’s millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the actual amounts of their properties. In this paper, we present a simple and practical implementation of Yao’s millionaire protocol using a deck of playing cards; we straightforwardly implement the idea behind Yao’s millionaire protocol so that even non-experts can easily understand its correctness and secrecy. Our implementation is based partially on the previous card-based scheme proposed by Nakai, Tokushige, Misawa, Iwamoto, and Ohta; their scheme admits players’ private actions on a sequence of cards called Private Permutation (PP), implying that a malicious player could make an active attack (for example, he/she could exchange some of the cards stealthily when doing such a private action). In contrast, our implementation relies on a familiar shuffling operation called a random cut, and hence, it can be conducted completely publicly so as to avoid any active attack.
AB - Yao’s millionaire protocol enables Alice and Bob to know whether or not Bob is richer than Alice by using a public-key cryptosystem without revealing the actual amounts of their properties. In this paper, we present a simple and practical implementation of Yao’s millionaire protocol using a deck of playing cards; we straightforwardly implement the idea behind Yao’s millionaire protocol so that even non-experts can easily understand its correctness and secrecy. Our implementation is based partially on the previous card-based scheme proposed by Nakai, Tokushige, Misawa, Iwamoto, and Ohta; their scheme admits players’ private actions on a sequence of cards called Private Permutation (PP), implying that a malicious player could make an active attack (for example, he/she could exchange some of the cards stealthily when doing such a private action). In contrast, our implementation relies on a familiar shuffling operation called a random cut, and hence, it can be conducted completely publicly so as to avoid any active attack.
KW - Card-based protocols
KW - Deck of cards
KW - Real-life hands-on cryptography
KW - Secure multi-party computations
KW - Yao’s millionaire protocol
UR - http://www.scopus.com/inward/record.url?scp=85058540724&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85058540724&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-04651-4_17
DO - 10.1007/978-3-030-04651-4_17
M3 - Conference contribution
AN - SCOPUS:85058540724
SN - 9783030046507
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 246
EP - 261
BT - Combinatorial Optimization and Applications - 12th International Conference, COCOA 2018, Proceedings
A2 - Zelikovsky, Alexander
A2 - Kim, Donghyun
A2 - Uma, R.N.
PB - Springer Verlag
T2 - 12th Annual International Conference on Combinatorial Optimization and Applications, COCOA 2018
Y2 - 15 December 2018 through 17 December 2018
ER -