Card-Based Cryptographic Protocols with Malicious Players Using Private Operations
نویسندگان
چکیده
Abstract This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards used in instead of computers. Operations a player executes place where the other players cannot see called operations. Using several operations, calculations two variable Boolean functions and copy were realized with minimum number cards. Though very powerful protocols, there is problem it hard to prevent actions during most discussed semi-honest model, might be cases when model not enough. Thus, this We show logical XOR, AND, n -variable function, protocols. can execute any computations combination these use envelopes as an additional tool easily prepared by people.
منابع مشابه
Card-Based Cryptographic Protocols Using a Minimal Number of Cards
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROCRYPT ’89) devised his famous “five-card trick”, which is a secure two-party AND protocol using five cards. However, the output of the protocol is revealed in the process and it is therefore not suitable for general circuits with hidden intermediate results. To overcome this limitation, protocols ...
متن کاملA Framework for Private Location-based Queries using Cryptographic Protocols
An important privacy issue in Location Based Services (LBS) is to hide a user’s identity and location while still providing quality service. A user’s identity can be easily hidden through anonymous web browsing services, however, a user’s location can reveal a user’s identity. For example, if a user at home asks queries such as “Find the nearest hospital around me” to a LBS server, then based o...
متن کاملCard-based protocols using unequal division shuffles
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and ...
متن کاملVerification of Cryptographic Protocols Implemented in Java Card
Cryptographic protocols are used to ensure secure communications in a hostile environment, when the decisions taken by the principals depend crucially on the authenticity and integrity of messages that they receive. Typically, when a message is received, a principal wants to be sure that this message has been created recently and in good faith for a particular purpose by the principal who claim...
متن کاملLinear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Private Set Intersection (PSI) protocols allow one party (“client”) to compute an intersection of its input set with that of another party (“server”), such that the client learns nothing other than the set intersection and the server learns nothing beyond client input size. Prior work yielded a range of PSI protocols secure under different cryptographic assumptions. Protocols operating in the s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Generation Computing
سال: 2022
ISSN: ['0288-3635', '1882-7055']
DOI: https://doi.org/10.1007/s00354-021-00148-w