TY - GEN
T1 - Public-PEZ Cryptography
AU - Murata, Soma
AU - Miyahara, Daiki
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
Acknowledgement. We thank the anonymous referees, whose comments have helped us to improve the presentation of the paper. This work was supported in part by JSPS KAKENHI Grant Number JP19J21153.
Publisher Copyright:
© 2020, Springer Nature Switzerland AG.
PY - 2020
Y1 - 2020
N2 - Secure multiparty computation (MPC) is a cryptographic technique that enables us to evaluate a predetermined function over players’ private inputs while hiding information about the inputs. MPC can be conducted using a “private PEZ protocol,” that uses PEZ candies and a dispenser. Specifically, in a private PEZ protocol, players first fill a predetermined sequence of candies in a dispenser. Then, each player in turn privately pops out a number of candies, wherein the number depends on their private input (without anybody else knowing how many candies pop out). The next candy to be popped out of the dispenser indicates the output value of the function. Thus, private PEZ protocols are fun and useful. One drawback would be that every player must pop out candies from the dispenser secretly, implying that a private PEZ protocol is vulnerable to dishonest players, for example, a player could peep the candies inside the dispenser. To overcome this drawback, we herein propose MPC protocols that do not need private actions such as secretly popping out candies after the setup (although each player rearranges the candies secretly in a setup phase, any illegal actions can be caught). That is, we construct a computational model of “public-PEZ cryptography,” where any protocol within the model can be publicly executed. Especially, the proposed public-PEZ AND protocol, which uses only five candies and two dispensers, is simple and easy for conducting a secure computation of the AND function.
AB - Secure multiparty computation (MPC) is a cryptographic technique that enables us to evaluate a predetermined function over players’ private inputs while hiding information about the inputs. MPC can be conducted using a “private PEZ protocol,” that uses PEZ candies and a dispenser. Specifically, in a private PEZ protocol, players first fill a predetermined sequence of candies in a dispenser. Then, each player in turn privately pops out a number of candies, wherein the number depends on their private input (without anybody else knowing how many candies pop out). The next candy to be popped out of the dispenser indicates the output value of the function. Thus, private PEZ protocols are fun and useful. One drawback would be that every player must pop out candies from the dispenser secretly, implying that a private PEZ protocol is vulnerable to dishonest players, for example, a player could peep the candies inside the dispenser. To overcome this drawback, we herein propose MPC protocols that do not need private actions such as secretly popping out candies after the setup (although each player rearranges the candies secretly in a setup phase, any illegal actions can be caught). That is, we construct a computational model of “public-PEZ cryptography,” where any protocol within the model can be publicly executed. Especially, the proposed public-PEZ AND protocol, which uses only five candies and two dispensers, is simple and easy for conducting a secure computation of the AND function.
KW - Card-based cryptography
KW - Private PEZ protocols
KW - Recreational cryptography
KW - Secure multiparty computations
UR - http://www.scopus.com/inward/record.url?scp=85097572544&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85097572544&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-62974-8_4
DO - 10.1007/978-3-030-62974-8_4
M3 - Conference contribution
AN - SCOPUS:85097572544
SN - 9783030629731
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 59
EP - 74
BT - Information Security - 23rd International Conference, ISC 2020, Proceedings
A2 - Susilo, Willy
A2 - Deng, Robert H.
A2 - Guo, Fuchun
A2 - Li, Yannan
A2 - Intan, Rolly
PB - Springer Science and Business Media Deutschland GmbH
T2 - 23rd International Conference on Information Security, ISC 2020
Y2 - 16 December 2020 through 18 December 2020
ER -