An implementation of non-uniform shuffle for secure multi-party computation

Akihiro Nishimura, Yu-Ichi Hayashi, Takaaki Mizuki, Hideaki Sone

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Citations (Scopus)

Abstract

Card-based cryptographic protocols provide secure multi-party computation using a deck of physical cards. The most important primitive of those protocols is the shuffling operation, and most known protocols rely on uniform shuffles (such as the random cut and random bisection cut) in which each possible outcome is equally likely. However, several protocols with non-uniform shuffles have recently been proposed by Koch et al. Compared to other protocols, their protocols require fewer cards to securely produce a hidden AND value, although implementation of the non-uniform shuffle appearing in their protocols remains an open problem. This paper presents a secure implementation of their non-uniform shuffle. To implement the shuffle, we utilize physical cases that can store piles of cards, such as boxes and envelopes. Therefore, humans are able to perform the non-uniform shuffle using these everyday objects.

Original languageEnglish
Title of host publicationAsiaPKC 2016 - Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, Co-located with Asia CCS 2016
PublisherAssociation for Computing Machinery, Inc
Pages49-55
Number of pages7
ISBN (Electronic)9781450342865
DOIs
Publication statusPublished - 2016 May 30
Event3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016 - Xi'an, China
Duration: 2016 May 30 → …

Publication series

NameAsiaPKC 2016 - Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, Co-located with Asia CCS 2016

Other

Other3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC 2016
CountryChina
CityXi'an
Period16/5/30 → …

Keywords

  • Card-based cryptographic protocols
  • Real-life hand-on cryptography
  • Secure multi-party computations

ASJC Scopus subject areas

  • Software
  • Computer Science Applications

Fingerprint Dive into the research topics of 'An implementation of non-uniform shuffle for secure multi-party computation'. Together they form a unique fingerprint.

Cite this