TY - GEN
T1 - An implementation of non-uniform shuffle for secure multi-party computation
AU - Nishimura, Akihiro
AU - Hayashi, Yu-Ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
PY - 2016/5/30
Y1 - 2016/5/30
N2 - Card-based cryptographic protocols provide secure multi-party computation using a deck of physical cards. The most important primitive of those protocols is the shuffling operation, and most known protocols rely on uniform shuffles (such as the random cut and random bisection cut) in which each possible outcome is equally likely. However, several protocols with non-uniform shuffles have recently been proposed by Koch et al. Compared to other protocols, their protocols require fewer cards to securely produce a hidden AND value, although implementation of the non-uniform shuffle appearing in their protocols remains an open problem. This paper presents a secure implementation of their non-uniform shuffle. To implement the shuffle, we utilize physical cases that can store piles of cards, such as boxes and envelopes. Therefore, humans are able to perform the non-uniform shuffle using these everyday objects.
AB - Card-based cryptographic protocols provide secure multi-party computation using a deck of physical cards. The most important primitive of those protocols is the shuffling operation, and most known protocols rely on uniform shuffles (such as the random cut and random bisection cut) in which each possible outcome is equally likely. However, several protocols with non-uniform shuffles have recently been proposed by Koch et al. Compared to other protocols, their protocols require fewer cards to securely produce a hidden AND value, although implementation of the non-uniform shuffle appearing in their protocols remains an open problem. This paper presents a secure implementation of their non-uniform shuffle. To implement the shuffle, we utilize physical cases that can store piles of cards, such as boxes and envelopes. Therefore, humans are able to perform the non-uniform shuffle using these everyday objects.
KW - Card-based cryptographic protocols
KW - Real-life hand-on cryptography
KW - Secure multi-party computations
UR - http://www.scopus.com/inward/record.url?scp=84978394020&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84978394020&partnerID=8YFLogxK
U2 - 10.1145/2898420.2898425
DO - 10.1145/2898420.2898425
M3 - Conference contribution
AN - SCOPUS:84978394020
T3 - AsiaPKC 2016 - Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, Co-located with Asia CCS 2016
SP - 49
EP - 55
BT - AsiaPKC 2016 - Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, Co-located with Asia CCS 2016
PB - Association for Computing Machinery, Inc
T2 - 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016
Y2 - 30 May 2016
ER -