Card-Based Cryptography Meets Formal Verification
نویسندگان
چکیده
Abstract Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation with just a deck of cards. For the sake simplicity, this is often done using cards only two symbols, e.g., $$\clubsuit $$ ♣ $$\heartsuit ♡ . Within paper, we also target setting where all carry distinct catering use-cases commonly available standard decks weaker indistinguishability assumption. As yet, literature three no proofs non-trivial lower bounds on number such complex (handling very large combinatorial state spaces) tend to be involved error-prone, propose formal verification finding proving bounds. In employ technique software bounded model checking (SBMC), which reduces problem space, automatically searched exhaustively SAT solver as backend. Our contribution threefold: (a) identify converting between different bit encodings overlapping bases, then show them card-minimal. This completes picture tight respect runtime behavior shuffle properties conversion protocols. computing AND, that there protocol finite four distinguishable symbols fixed output encoding, give four-card an expected random cuts. (b) We provide general translation framework card- run-minimal (i.e., has run minimal length) additional confidence in apply validate our method and, example, confirm new AND have its shortest (c) extend handle case , run-minimality from literature.
منابع مشابه
Practical Card-Based Cryptography
It is known that secure multi-party computations can be achieved using a number of black and red physical cards (with identical backs). In previous studies on such card-based cryptographic protocols, typically an ideal situation where all players are semi-honest and all cards of the same suit are indistinguishable from one another was assumed. In this paper, we consider more realistic situation...
متن کاملDesign and formal verification of DZMBE+
In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense that no cheater is able to gain an unfair advantage over other users. Another important feature...
متن کاملFoundations for Actively Secure Card-based Cryptography
Card-based cryptography allows to do secure multiparty computation in simple and elegant ways, using only a deck of playing cards, as first proposed by den Boer (EUROCRYPT 1989). Many protocols as of yet come with an “honest-but-curious” disclaimer. However, a central goal of modern cryptography is to provide security also in the presence of malicious attackers. At the few places where authors ...
متن کاملCryptography meets voting
We survey the contributions of the entire theoretical computer science/cryptography community during 1975-2002 that impact the question of how to run verifiable elections with secret ballots. The approach based on homomorphic encryptions is the most successful; one such scheme is sketched in detail and argued to be feasible to implement. It is explained precisely what these ideas accomplish but...
متن کاملAnalog Simulation Meets Digital Verification – A Formal Assertion Approach for Mixed-Signal Verification
Functional and formal verification are important methodologies for complex mixed-signal designs. But there exists a verification gap between the analog and digital blocks of a mixed-signal system. Our approach improves the verification process by creating mixed-signal assertions which are described by a combination of digital assertions and analog properties. The proposed method is a new assert...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Generation Computing
سال: 2021
ISSN: ['0288-3635', '1882-7055']
DOI: https://doi.org/10.1007/s00354-020-00120-0