Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

نویسندگان

چکیده

Abstract This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards used in instead of computers. Operations a player executes place where the other players cannot see called operations. Using several operations, calculations two variable Boolean functions and copy were realized with minimum number cards. Though very powerful protocols, there is problem it hard to prevent actions during most discussed semi-honest model, might be cases when model not enough. Thus, this We show logical XOR, AND, n -variable function, protocols. can execute any computations combination these use envelopes as an additional tool easily prepared by people.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Card-Based Cryptographic Protocols Using a Minimal Number of Cards

Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROCRYPT ’89) devised his famous “five-card trick”, which is a secure two-party AND protocol using five cards. However, the output of the protocol is revealed in the process and it is therefore not suitable for general circuits with hidden intermediate results. To overcome this limitation, protocols ...

متن کامل

A Framework for Private Location-based Queries using Cryptographic Protocols

An important privacy issue in Location Based Services (LBS) is to hide a user’s identity and location while still providing quality service. A user’s identity can be easily hidden through anonymous web browsing services, however, a user’s location can reveal a user’s identity. For example, if a user at home asks queries such as “Find the nearest hospital around me” to a LBS server, then based o...

متن کامل

Card-based protocols using unequal division shuffles

Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and ...

متن کامل

Verification of Cryptographic Protocols Implemented in Java Card

Cryptographic protocols are used to ensure secure communications in a hostile environment, when the decisions taken by the principals depend crucially on the authenticity and integrity of messages that they receive. Typically, when a message is received, a principal wants to be sure that this message has been created recently and in good faith for a particular purpose by the principal who claim...

متن کامل

Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model

Private Set Intersection (PSI) protocols allow one party (“client”) to compute an intersection of its input set with that of another party (“server”), such that the client learns nothing other than the set intersection and the server learns nothing beyond client input size. Prior work yielded a range of PSI protocols secure under different cryptographic assumptions. Protocols operating in the s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: New Generation Computing

سال: 2022

ISSN: ['0288-3635', '1882-7055']

DOI: https://doi.org/10.1007/s00354-021-00148-w