Abstract
Consider a face-down card lying on the table such that we do not know whether its suit color is black or red. Then, how do we make identical copies of the card while keeping its color secret? A partial solution has been devised: using a number of additional black and red cards, Niemi and Renvall proposed an excellent protocol which can copy a face-down card while allowing only a small probability of revealing its color. In contrast, this paper shows the nonexistence of a perfect solution, namely, the impossibility of copying a face-down card with perfect secrecy. To prove such an impossibility result, we construct a rigorous mathematical model of card-based cryptographic protocols; giving this general computational model is the main result of this paper.
Original language | English |
---|---|
Pages (from-to) | 15-23 |
Number of pages | 9 |
Journal | International Journal of Information Security |
Volume | 13 |
Issue number | 1 |
DOIs | |
Publication status | Published - 2014 Feb |
Keywords
- Card games
- Card-based protocols
- Cryptography without computers
- Recreational cryptography
- Secure computations
ASJC Scopus subject areas
- Software
- Information Systems
- Safety, Risk, Reliability and Quality
- Computer Networks and Communications