TY - GEN
T1 - Eulerian secret key exchange
AU - Mizuki, Takaaki
AU - Shizuya, Hiroki
AU - Nishizeki, Takao
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1998.
PY - 1998
Y1 - 1998
N2 - Designing a protocol to exchange a secret key is one of the most fundamental subjects in cryptography. Using a random deal of cards, pairs of card players (agents) can share information-theoretically secure keys that are secret from an eavesdropper. In this paper we first introduce the notion of an Eulerian secret key exchange, in which the pairs of players sharing secret keys form an Eulerian circuit passing through all players. Along the Eulerian circuit any designated player can send a message to the rest of players and the message can be finally returned to the sender. Checking whether the returned message is the same as the original one, the sender can know whether the message circulation has been completed without any false alteration. We then give three efficient protocols to realize such an Eulerian secret key exchange. Each of the three protocols is optimal in a sense. The first protocol requires the minimum number of cards under a natural assumption that the same number of cards are dealt to each player. The second requires the minimum number of cards dealt to all players when one does not make the assumption. The third forms the shortest Eulerian circuit, and hence the time required to send the message to all players and acknowledge the secure receipt is minimum in this case.
AB - Designing a protocol to exchange a secret key is one of the most fundamental subjects in cryptography. Using a random deal of cards, pairs of card players (agents) can share information-theoretically secure keys that are secret from an eavesdropper. In this paper we first introduce the notion of an Eulerian secret key exchange, in which the pairs of players sharing secret keys form an Eulerian circuit passing through all players. Along the Eulerian circuit any designated player can send a message to the rest of players and the message can be finally returned to the sender. Checking whether the returned message is the same as the original one, the sender can know whether the message circulation has been completed without any false alteration. We then give three efficient protocols to realize such an Eulerian secret key exchange. Each of the three protocols is optimal in a sense. The first protocol requires the minimum number of cards under a natural assumption that the same number of cards are dealt to each player. The second requires the minimum number of cards dealt to all players when one does not make the assumption. The third forms the shortest Eulerian circuit, and hence the time required to send the message to all players and acknowledge the secure receipt is minimum in this case.
UR - http://www.scopus.com/inward/record.url?scp=33746662022&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=33746662022&partnerID=8YFLogxK
U2 - 10.1007/3-540-68535-9_39
DO - 10.1007/3-540-68535-9_39
M3 - Conference contribution
AN - SCOPUS:33746662022
SN - 3540648240
SN - 9783540648246
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 349
EP - 360
BT - Computing and Combinatorics - 4th Annual International Conference COCOON 1998, Proceedings
A2 - Hsu, Wen-Lian
A2 - Kao, Ming-Yang
PB - Springer Verlag
T2 - 4th Annual International Computing and Combinatorics Conference, COCOON 1998
Y2 - 12 August 1998 through 14 August 1998
ER -