2017
DOI: 10.1587/transfun.e100.a.1900
|View full text |Cite
|
Sign up to set email alerts
|

Card-Based Protocols Using Regular Polygon Cards

Abstract: SUMMARY Cryptographic protocols enable participating parties to compute any function of their inputs without leaking any information beyond the output. A card-based protocol is a cryptographic protocol implemented by physical cards. In this paper, for constructing protocols with small numbers of shuffles, we introduce a new type of cards, regular polygon cards, and a new protocol, oblivious conversion. Using our cards, we construct an addition protocol on non-binary inputs with only one shuffle and two cards. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
2

Relationship

5
3

Authors

Journals

citations
Cited by 41 publications
(12 citation statements)
references
References 15 publications
0
12
0
Order By: Relevance
“…Intriguing future work involves applying our new criteria to other existing protocols using different types of cards (e.g., [21,22]) or those using private operations (e.g., [14,[17][18][19]). Table 5 The experimental result of measuring the execution time of adding, turning over, and permuting cards, which was mainly conducted by the second author, who is familiar with playing cards.…”
Section: Resultsmentioning
confidence: 99%
“…Intriguing future work involves applying our new criteria to other existing protocols using different types of cards (e.g., [21,22]) or those using private operations (e.g., [14,[17][18][19]). Table 5 The experimental result of measuring the execution time of adding, turning over, and permuting cards, which was mainly conducted by the second author, who is familiar with playing cards.…”
Section: Resultsmentioning
confidence: 99%
“…We construct an efficient protocol for computing interesting predicates: a carry of addition " x + y ≥ n ", equality with zero " x = 0 ", equality " x = y ", and greater than " x ≥ y ". Table 1 shows a comparison between our protocols and the previous protocols [15] with regular polygon cards (RPC). Somewhat surprisingly, our protocols with dihedral cards (DC) for these predicates requires only two cards while all existing RPC-based protocols for the same predicates requires a large number of cards depending on the modulus n.…”
Section: Our Contributionmentioning
confidence: 99%
“…It captures a wide class of protocols not only our dihedral cards but also other type of cards. For example, our model also captures regular polygon cards [14,15]. See Appendix for the definition of regular polygon cards in our model.…”
Section: Our Contributionmentioning
confidence: 99%
See 1 more Smart Citation
“…Works on implementing cryptographic protocols using physical objects are numerous, such as in [21]; or in [8] where a physical secure auction protocol was proposed. Other implementations have been studied using cards in [4,15], polarising plates [37], polygon cards [38], a standard deck of playing cards [18], using a PEZ dispenser [2,3], using a dial lock [19], using a 15 puzzle [20], or using a tamper-evident seals [23][24][25]. ZKP's for several other puzzles have been studied such as Sudoku [30,36], Akari [5], Takuzu [5,16], Kakuro [5,17], KenKen [5], Makaro [6,35], Norinori [9], Nonogram [7,29], Slitherlink [15], Suguru [27], Nurikabe [28], Ripple Effect [32], Numberlink [31], Bridges [33], and Cryptarithmetic [12].…”
Section: Introductionmentioning
confidence: 99%