Card-Based Protocols for Any Boolean Function

نویسندگان

  • Takuya Nishida
  • Yu-ichi Hayashi
  • Takaaki Mizuki
  • Hideaki Sone
چکیده

Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for computing any function has not been revealed thus far. In this paper, we propose a general approach to constructing an efficient protocol so that six additional cards are sufficient for any function to be securely computed. Further, we prove that two additional cards are sufficient for any symmetric function.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Card-Based Cryptographic Protocols Using a Minimal Number of Cards

Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROCRYPT ’89) devised his famous “five-card trick”, which is a secure two-party AND protocol using five cards. However, the output of the protocol is revealed in the process and it is therefore not suitable for general circuits with hidden intermediate results. To overcome this limitation, protocols ...

متن کامل

Secure Two-party Computation and Communication

Secure Two-party Computation and Communication Vladimir Kolesnikov Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2006 We address several issues that arise in protecting parties’ communication, and in the area of secure function evaluation. Intuitively, the notion of secure function evaluation is natural: several parties wish to compute some function of their...

متن کامل

Vladimir Kolesnikov A thesis submitted in conformity with the requirements

Secure Two-party Computation and Communication Vladimir Kolesnikov Doctor of Philosophy Graduate Department of Computer Science University of Toronto 2006 We address several issues that arise in protecting parties’ communication, and in the area of secure function evaluation. Intuitively, the notion of secure function evaluation is natural: several parties wish to compute some function of their...

متن کامل

Card-based protocols using unequal division shuffles

Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and ...

متن کامل

Improved Skips for Faster Postings List Intersection

Information retrieval can be achieved through computerized processes by generating a list of relevant responses to a query. The document processor, matching function and query analyzer are the main components of an information retrieval system. Document retrieval system is fundamentally based on: Boolean, vector-space, probabilistic, and language models. In this paper, a new methodology for mat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015