Presentation 2018-03-08
Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Youhei Shimizu, Yuki Kishi, Taroh Sasaki, Atsushi Fujioka,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) This paper considers malicious behaviors in card-based cryptographic protocols with private operations. Most of card-based cryptographic protocols are run under a model called the semi-honest model where players perform the operations according to the protocols. Therefore, there is a problem that a protocol would be insecure in the case where a player behaves maliciously. In this research, we extend the semi-honest model. This paper introduces a model that a player may perform malicious behaviors, and proposes a card-based cryptographic protocol with private operations which can prevent the malicious behaviors under the model.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Multi-party secure computation / card-based cryptographic protocols / private operations
Paper # IT2017-125,ISEC2017-113,WBS2017-106
Date of Issue 2018-03-01 (IT, ISEC, WBS)

Conference Information
Committee WBS / IT / ISEC
Conference Date 2018/3/8(2days)
Place (in Japanese) (See Japanese page)
Place (in English) Katsusika Campas, Tokyo University of Science
Topics (in Japanese) (See Japanese page)
Topics (in English) joint meeting of IT, ISEC, and WBS
Chair Fumiaki Maehara(Waseda Univ.) / Masayoshi Ohashi(Fukuoka Univ.) / Kazuto Ogawa(NHK)
Vice Chair Masanori Hamamura(Kochi Univ. of Tech.) / Fumie Ono(NICT) / Jun Muramatsu(NTT) / Atsushi Fujioka(Kanagawa Univ.) / Shiho Moriai(NICT)
Secretary Masanori Hamamura(Mitsubishi Electric) / Fumie Ono(Ibaraki Univ.) / Jun Muramatsu(Yokohama College of Commerce) / Atsushi Fujioka(UEC) / Shiho Moriai(Tohoku Univ.)
Assistant Akira Nakamura(Tokyo Univ. of Science) / Ryohei Nakamura(National Defense Academy) / Sigeaki Kuzuoka(wakayama univ.) / Keita Emura(NICT) / Yuichi Komano(TOSHIBA) / Yuuji Suga(IIJ)

Paper Information
Registration To Technical Committee on Wideband System / Technical Committee on Information Theory / Technical Committee on Information Security
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Card-Based Cryptographic Protocols with Private Operations which can Prevent Malicious Behaviors
Sub Title (in English)
Keyword(1) Multi-party secure computation
Keyword(2) card-based cryptographic protocols
Keyword(3) private operations
1st Author's Name Youhei Shimizu
1st Author's Affiliation Kanagawa University(Kanagawa Univ)
2nd Author's Name Yuki Kishi
2nd Author's Affiliation Kanagawa University(Kanagawa Univ)
3rd Author's Name Taroh Sasaki
3rd Author's Affiliation Kanagawa University(Kanagawa Univ)
4th Author's Name Atsushi Fujioka
4th Author's Affiliation Kanagawa University(Kanagawa Univ)
Date 2018-03-08
Paper # IT2017-125,ISEC2017-113,WBS2017-106
Volume (vol) vol.117
Number (no) IT-487,ISEC-488,WBS-489
Page pp.pp.129-135(IT), pp.129-135(ISEC), pp.129-135(WBS),
#Pages 7
Date of Issue 2018-03-01 (IT, ISEC, WBS)