2021
DOI: 10.1007/s00354-020-00110-2
|View full text |Cite
|
Sign up to set email alerts
|

Five-Card AND Computations in Committed Format Using Only Uniform Cyclic Shuffles

Abstract: In card-based cryptography, designing AND protocols in committed format is a major research topic. The state-of-the-art AND protocol proposed by Koch, Walzer, and Härtel in ASIACRYPT 2015 uses only four cards, which is the minimum permissible number. The minimality of their protocol relies on somewhat complicated shuffles having non-uniform probabilities of possible outcomes. Restricting the allowed shuffles to uniform closed ones entails that, to the best of our knowledge, six cards are sufficient: the six-c… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”
Section: Introductionmentioning
confidence: 99%
“…Section 5 concludes the paper. The difference from the conference version [22] is as follows: (1) We updated all protocols to clarify the procedure to detect malicious actions. (2) We added a new protocol to calculate any n-variable Boolean functions.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, most card-based protocols are constructed with these shuffles only 1 (cf. protocols with RCs only [2,6,7,12,15,17,22,23,32,34,35,40,41,44,48,52], protocols with RBCs only [27-29, 31, 36-38, 45], protocols with PSSs only [3,10,14,33,39,42,43,46], protocols with RCs and RBCs only [1,16,24,51], protocols with RCs and PSSs only [4,8,18,49,50], and protocols with RBCs and PSSs only [11,13,26,47]). With this background, it is essential to study further what can be done by these shuffles.…”
mentioning
confidence: 99%