Paper Abstract and Keywords |
Presentation |
2018-03-08 13:00
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations Hibiki Ono, Yoshifumi Manabe (Kogakuin Univ.) IT2017-124 ISEC2017-112 WBS2017-105 |
Abstract |
(in Japanese) |
(See Japanese page) |
(in English) |
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations that a player executes where the other players cannot see are called private operations. Using private operations, xor, logical and, logical or, and copy operations can be realized with the minimum number of cards.
Though the number of cards is discussed, efficiency of these protocols
is not discussed. The number of rounds is used to evaluate the efficiency of the protocols using private operations. Most of meaningful calculations
using private operations need at least two rounds.
This paper shows two round xor protocol using four cards.
Then we show two round logical and, logical or, and copy protocols
using six cards.
This paper then shows that if the private operations are restricted to private random bisection cuts and private reverse cuts,
logical and, logical or, xor, and copy operations can be executed with the minimum number of cards in three rounds. |
Keyword |
(in Japanese) |
(See Japanese page) |
(in English) |
multi-party secure computation / card-based cryptographic protocols / private operations / logical computations / copy / round / / |
Reference Info. |
IEICE Tech. Rep., vol. 117, no. 488, ISEC2017-112, pp. 121-128, March 2018. |
Paper # |
ISEC2017-112 |
Date of Issue |
2018-03-01 (IT, ISEC, WBS) |
ISSN |
Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380 |
Copyright and reproduction |
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034) |
Download PDF |
IT2017-124 ISEC2017-112 WBS2017-105 |
Conference Information |
Committee |
WBS IT ISEC |
Conference Date |
2018-03-08 - 2018-03-09 |
Place (in Japanese) |
(See Japanese page) |
Place (in English) |
Katsusika Campas, Tokyo University of Science |
Topics (in Japanese) |
(See Japanese page) |
Topics (in English) |
joint meeting of IT, ISEC, and WBS |
Paper Information |
Registration To |
ISEC |
Conference Code |
2018-03-WBS-IT-ISEC |
Language |
English (Japanese title is available) |
Title (in Japanese) |
(See Japanese page) |
Sub Title (in Japanese) |
(See Japanese page) |
Title (in English) |
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations |
Sub Title (in English) |
|
Keyword(1) |
multi-party secure computation |
Keyword(2) |
card-based cryptographic protocols |
Keyword(3) |
private operations |
Keyword(4) |
logical computations |
Keyword(5) |
copy |
Keyword(6) |
round |
Keyword(7) |
|
Keyword(8) |
|
1st Author's Name |
Hibiki Ono |
1st Author's Affiliation |
Kogakuin University (Kogakuin Univ.) |
2nd Author's Name |
Yoshifumi Manabe |
2nd Author's Affiliation |
Kogakuin University (Kogakuin Univ.) |
3rd Author's Name |
|
3rd Author's Affiliation |
() |
4th Author's Name |
|
4th Author's Affiliation |
() |
5th Author's Name |
|
5th Author's Affiliation |
() |
6th Author's Name |
|
6th Author's Affiliation |
() |
7th Author's Name |
|
7th Author's Affiliation |
() |
8th Author's Name |
|
8th Author's Affiliation |
() |
9th Author's Name |
|
9th Author's Affiliation |
() |
10th Author's Name |
|
10th Author's Affiliation |
() |
11th Author's Name |
|
11th Author's Affiliation |
() |
12th Author's Name |
|
12th Author's Affiliation |
() |
13th Author's Name |
|
13th Author's Affiliation |
() |
14th Author's Name |
|
14th Author's Affiliation |
() |
15th Author's Name |
|
15th Author's Affiliation |
() |
16th Author's Name |
|
16th Author's Affiliation |
() |
17th Author's Name |
|
17th Author's Affiliation |
() |
18th Author's Name |
|
18th Author's Affiliation |
() |
19th Author's Name |
|
19th Author's Affiliation |
() |
20th Author's Name |
|
20th Author's Affiliation |
() |
Speaker |
Author-2 |
Date Time |
2018-03-08 13:00:00 |
Presentation Time |
25 minutes |
Registration for |
ISEC |
Paper # |
IT2017-124, ISEC2017-112, WBS2017-105 |
Volume (vol) |
vol.117 |
Number (no) |
no.487(IT), no.488(ISEC), no.489(WBS) |
Page |
pp.121-128 |
#Pages |
8 |
Date of Issue |
2018-03-01 (IT, ISEC, WBS) |
|