Presentation 2013-11-28
A Note on Attacks against Card-Based Cryptographic Protocols
Takaaki MIZUKI, Hiroki SHIZUYA,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) It has been known that Secure Multi-Party Computations can be conducted using a number of black and red physical cards (with identical backs). During such a card-based cryptographic protocol, all players manipulate the cards on a table publicly, and hence they are typically assumed to be semi-honest in the literature. In this paper, we even consider a possible case where some players act maliciously, and then propose a countermeasure. We also deal with secret information leakage due to physical properties of the cards, and discuss their countermeasures.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) Card-based protocols / Card games / Cryptography without computers / Recreational cryptography / Secure computations
Paper # ISEC2013-62,LOIS2013-28
Date of Issue

Conference Information
Committee ISEC
Conference Date 2013/11/21(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) A Note on Attacks against Card-Based Cryptographic Protocols
Sub Title (in English)
Keyword(1) Card-based protocols
Keyword(2) Card games
Keyword(3) Cryptography without computers
Keyword(4) Recreational cryptography
Keyword(5) Secure computations
1st Author's Name Takaaki MIZUKI
1st Author's Affiliation Cyberscience Center, Tohoku University()
2nd Author's Name Hiroki SHIZUYA
2nd Author's Affiliation Center for Information Technology in Education, Tohoku University
Date 2013-11-28
Paper # ISEC2013-62,LOIS2013-28
Volume (vol) vol.113
Number (no) 326
Page pp.pp.-
#Pages 8
Date of Issue