TY - GEN
T1 - The minimum number of cards in practical card-based protocols
AU - Kastner, Julia
AU - Koch, Alexander
AU - Walzer, Stefan
AU - Miyahara, Daiki
AU - Hayashi, Yu ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
This study was supported by Tedec-Meiji Farma, S.A., Madrid, Spain.
Publisher Copyright:
© International Association for Cryptologic Research 2017.
PY - 2017
Y1 - 2017
N2 - The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a logical AND of two private bits, using five playing cards of symbols ♥ and ♣. Since then, card-based protocols have been successfully put to use in classroom environments, vividly illustrating secure multiparty computation - and evoked research on the minimum number of cards needed for several functionalities. Securely computing arbitrary circuits needs protocols for negation, AND and bit copy in committed-format, where outputs are commitments again. Negation just swaps the bit’s cards, computing AND and copying a bit n times can be done with six and 2n+2 cards, respectively, using the simple protocols of Mizuki and Sone (FAW 2009). Koch et al. (ASIACRYPT 2015) showed that five cards suffice for computing AND in finite runtime, albeit using relatively complex and unpractical shuffle operations. In this paper, we show that if we restrict shuffling to closed permutation sets, the six-card protocol is optimal in the finite-runtime setting. If we additionally assume a uniform distribution on the permutations in a shuffle, we show that restart-free four-card AND protocols are impossible. These shuffles are easy to perform even in an actively secure manner (Koch and Walzer, ePrint 2017). For copying bit commitments, the protocol of Nishimura et al. (ePrint 2017) needs only 2n + 1 cards, but performs a number of complex shuffling steps that is only finite in expectation.We show that it is impossible to go with less cards. If we require an a priori bound on the runtime, we show that the (2n + 2)-card protocol is card-minimal.
AB - The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a logical AND of two private bits, using five playing cards of symbols ♥ and ♣. Since then, card-based protocols have been successfully put to use in classroom environments, vividly illustrating secure multiparty computation - and evoked research on the minimum number of cards needed for several functionalities. Securely computing arbitrary circuits needs protocols for negation, AND and bit copy in committed-format, where outputs are commitments again. Negation just swaps the bit’s cards, computing AND and copying a bit n times can be done with six and 2n+2 cards, respectively, using the simple protocols of Mizuki and Sone (FAW 2009). Koch et al. (ASIACRYPT 2015) showed that five cards suffice for computing AND in finite runtime, albeit using relatively complex and unpractical shuffle operations. In this paper, we show that if we restrict shuffling to closed permutation sets, the six-card protocol is optimal in the finite-runtime setting. If we additionally assume a uniform distribution on the permutations in a shuffle, we show that restart-free four-card AND protocols are impossible. These shuffles are easy to perform even in an actively secure manner (Koch and Walzer, ePrint 2017). For copying bit commitments, the protocol of Nishimura et al. (ePrint 2017) needs only 2n + 1 cards, but performs a number of complex shuffling steps that is only finite in expectation.We show that it is impossible to go with less cards. If we require an a priori bound on the runtime, we show that the (2n + 2)-card protocol is card-minimal.
KW - Boolean AND
KW - COPY
KW - Card-based protocols
KW - Committed format
KW - Cryptography without computers
KW - Secure computation
UR - http://www.scopus.com/inward/record.url?scp=85037827397&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85037827397&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-70700-6_5
DO - 10.1007/978-3-319-70700-6_5
M3 - Conference contribution
AN - SCOPUS:85037827397
SN - 9783319706993
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 126
EP - 155
BT - Advances in Cryptology – ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Proceedings
A2 - Takagi, Tsuyoshi
A2 - Peyrin, Thomas
PB - Springer Verlag
T2 - 23rd Annual International Conference on Theory and Application of Cryptology and Information Security, ASIACRYPT 2017
Y2 - 3 December 2017 through 7 December 2017
ER -