Presentation 2017-09-04
Card-based Cryptographic Protocols Using Private Operations
Hibiki Ono, Yoshifumi Manabe,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper proposes new card-based cryptographic protocols using private operations. Randomization is the key operation in card-based cryptographic protocols. If the value used in a randomization is disclosed, the secret value is also disclosed. Thus the randomization must be executed in a secure manner. Executing secure randomization in a completely public space is difficult to realize without some additional cards, thus private operations were considered, in which the operations are executed where the other players cannot see. Some protocols were shown for some special cases when one of the input values is a private value for a player. This paper shows new protocols using private operations which realize logical and, logical or, logical xor, and copy protocols. The number of cards used in these protocols is the minimum.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) multi-party secure computation / card-based cryptographic protocols / private operations / logical computations / copy
Paper # ISEC2017-42
Date of Issue 2017-08-28 (ISEC)

Conference Information
Committee ISEC
Conference Date 2017/9/4(1days)
Place (in Japanese) (See Japanese page)
Place (in English) Kikai-Shinko-Kaikan Bldg.
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair Kazuto Ogawa(NHK)
Vice Chair Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT)
Secretary Atsushi Fujioka(Tohoku Univ.) / Shiho Moriai(Tokai Univ.)
Assistant Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ)

Paper Information
Registration To Technical Committee on Information Security
Language ENG-JTITLE
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Card-based Cryptographic Protocols Using Private Operations
Sub Title (in English)
Keyword(1) multi-party secure computation
Keyword(2) card-based cryptographic protocols
Keyword(3) private operations
Keyword(4) logical computations
Keyword(5) copy
1st Author's Name Hibiki Ono
1st Author's Affiliation Kogakuin University(Kogakuin Univ.)
2nd Author's Name Yoshifumi Manabe
2nd Author's Affiliation Kogakuin University(Kogakuin Univ.)
Date 2017-09-04
Paper # ISEC2017-42
Volume (vol) vol.117
Number (no) ISEC-202
Page pp.pp.7-14(ISEC),
#Pages 8
Date of Issue 2017-08-28 (ISEC)