Practical Card-Based Cryptography
نویسندگان
چکیده
It is known that secure multi-party computations can be achieved using a number of black and red physical cards (with identical backs). In previous studies on such card-based cryptographic protocols, typically an ideal situation where all players are semi-honest and all cards of the same suit are indistinguishable from one another was assumed. In this paper, we consider more realistic situations where, for example, some players possibly act maliciously, or some cards possibly have scuff marks, so that they are distinguishable, and propose methods to maintain the secrecy of players’ private inputs even under such severe conditions.
منابع مشابه
Proxy Smart Card Systems
The established legal value of digital signatures and the growing availability of identity-based digital services are progressively extending the use of smart cards to all citizens, opening new challenging scenarios. Among them, motivated by concrete applications, secure and practical delegation of digital signatures is becoming more and more critical. Unfortunately, secure delegation systems p...
متن کاملApplication of Biometric Key in Practical Secret Sharing for DNSsec
Secret sharing is one of the branches of threshold cryptography. Secret sharing is intended to secure a secret key s among a group G with n participants. Thus, the secret key s can be reconstructed by collecting shares of t or more participants. Recently, the secret sharing concept has been applied in securing DNSsec root key. However, the idea of DNSsec root key security is based on Shamir’s (...
متن کاملAn efficient biometrics-based authentication scheme for telecare medicine information systems
The telecare medical information system enables the patients gain health monitoring and access healthcare-related services over internet or mobile networks. Due to the open environment, the mutual authentication between the user and the telecare server will thus be in demand. Many smart card based authentication schemes for telecare medicine information systems have been proposed for the goals....
متن کاملOn Similarities between SOA-Based Web Service and Smart Card Application for Ease of Understanding and Securing the Former
This paper is to leverage familiarity with smart card application, i.e. understanding and practical experiences of implementing trustworthy smart card application, to uncover secret veil surrounding the SOA-Based Web Services, and further develop and implement effective strategies for achieving trustworthy Web Services. Aspects being compared, of smart card application and SOA-Based Web Service...
متن کاملSecurity Analysis of a Practical \ on the y " Authentication and
In response to the current need for fast, secure and cheap public-key cryptography, we study an interactive zero-knowledge identi-cation scheme and a derived signature scheme that combine provable security based on the general problem of computing discrete logarithms modulo any number, short identity-based keys, very short transmission and minimal on-line computation. This leads to both eecient...
متن کامل