Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography 2020
DOI: 10.1145/3384940.3388961
|View full text |Cite
|
Sign up to set email alerts
|

Six-Card Finite-Runtime XOR Protocol with Only Random Cut

Abstract: Executing a card-based cryptographic protocol is an attractive way to perform secure multiparty computation (MPC) with a deck of physical cards. Crèpeau and Kilian at CRYPTO 1993 proposed cardbased AND and XOR protocols that can deal with a logical conjunction and exclusive-or of variables. Their protocols use a familiar shuffling action called a random cut that can be easily implemented by humans, while the numbers of required cards and shuffles are not small enough to be efficient and the protocols are Las V… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”
Section: Introductionmentioning
confidence: 99%
“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”
Section: Introductionmentioning
confidence: 99%
“…Indeed, most card-based protocols are constructed with these shuffles only 1 (cf. protocols with RCs only [2,6,7,12,15,17,22,23,32,34,35,40,41,44,48,52], protocols with RBCs only [27-29, 31, 36-38, 45], protocols with PSSs only [3,10,14,33,39,42,43,46], protocols with RCs and RBCs only [1,16,24,51], protocols with RCs and PSSs only [4,8,18,49,50], and protocols with RBCs and PSSs only [11,13,26,47]). With this background, it is essential to study further what can be done by these shuffles.…”
mentioning
confidence: 99%