Presentation | 2018-03-08 Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | This paper considers malicious behaviors in card-based cryptographic protocols with private operations. Most of card-based cryptographic protocols are run under a model called the semi-honest model where players perform the operations according to the protocols. Therefore, there is a problem that a protocol would be insecure in the case where a player behaves maliciously. In this research, we extend the semi-honest model. This paper introduces a model that a player may perform malicious behaviors, and proposes a card-based cryptographic protocol with private operations which can prevent the malicious behaviors under the model. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Multi-party secure computation / card-based cryptographic protocols / private operations |
Paper # | IT2017-125,ISEC2017-113,WBS2017-106 |
Date of Issue | 2018-03-01 (IT, ISEC, WBS) |
Conference Information | |
Committee | WBS / IT / ISEC |
---|---|
Conference Date | 2018/3/8(2days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | Katsusika Campas, Tokyo University of Science |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | joint meeting of IT, ISEC, and WBS |
Chair | Fumiaki Maehara(Waseda Univ.) / Masayoshi Ohashi(Fukuoka Univ.) / Kazuto Ogawa(NHK) |
Vice Chair | Masanori Hamamura(Kochi Univ. of Tech.) / Fumie Ono(NICT) / Jun Muramatsu(NTT) / Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT) |
Secretary | Masanori Hamamura(Mitsubishi Electric) / Fumie Ono(Ibaraki Univ.) / Jun Muramatsu(Yokohama College of Commerce) / Atsushi Fujioka(UEC) / Shiho Moriai(Tohoku Univ.) |
Assistant | Akira Nakamura(Tokyo Univ. of Science) / Ryohei Nakamura(National Defense Academy) / Sigeaki Kuzuoka(wakayama univ.) / Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ) |
Paper Information | |
Registration To | Technical Committee on Wideband System / Technical Committee on Information Theory / Technical Committee on Information Security |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors |
Sub Title (in English) | |
Keyword(1) | Multi-party secure computation |
Keyword(2) | card-based cryptographic protocols |
Keyword(3) | private operations |
1st Author's Name | Youhei Shimizu |
1st Author's Affiliation | Kanagawa University(Kanagawa Univ) |
2nd Author's Name | Yuki Kishi |
2nd Author's Affiliation | Kanagawa University(Kanagawa Univ) |
3rd Author's Name | Taroh Sasaki |
3rd Author's Affiliation | Kanagawa University(Kanagawa Univ) |
4th Author's Name | Atsushi Fujioka |
4th Author's Affiliation | Kanagawa University(Kanagawa Univ) |
Date | 2018-03-08 |
Paper # | IT2017-125,ISEC2017-113,WBS2017-106 |
Volume (vol) | vol.117 |
Number (no) | IT-487,ISEC-488,WBS-489 |
Page | pp.pp.129-135(IT), pp.129-135(ISEC), pp.129-135(WBS), |
#Pages | 7 |
Date of Issue | 2018-03-01 (IT, ISEC, WBS) |