TY - JOUR
T1 - Secure implementations of a random bisection cut
AU - Ueda, Itaru
AU - Miyahara, Daiki
AU - Nishimura, Akihiro
AU - Hayashi, Yu-Ichi
AU - Mizuki, Takaaki
AU - Sone, Hideaki
N1 - Funding Information:
This work was supported by JSPS KAKENHI Grant No. JP17K00001.
Publisher Copyright:
© 2019, Springer-Verlag GmbH Germany, part of Springer Nature.
PY - 2020/8/1
Y1 - 2020/8/1
N2 - By using a deck of cards, it is possible to realize a secure multiparty computation. In particular, since a new shuffling operation, called a random bisection cut, was devised in 2009, many efficient card-based protocols have been designed. The random bisection cut functions in the following manner. A sequence of cards is bisected, and the two halves are shuffled. This results in two possible cases depending on whether the two halves of the card sequence are swapped. As only two possibilities exist when a random bisection cut is performed, it has been suggested that information regarding the outcome of the shuffle could sometimes be leaked visually. Thus, in this paper we propose some methods for securely implementing a random bisection cut without leaking such information.
AB - By using a deck of cards, it is possible to realize a secure multiparty computation. In particular, since a new shuffling operation, called a random bisection cut, was devised in 2009, many efficient card-based protocols have been designed. The random bisection cut functions in the following manner. A sequence of cards is bisected, and the two halves are shuffled. This results in two possible cases depending on whether the two halves of the card sequence are swapped. As only two possibilities exist when a random bisection cut is performed, it has been suggested that information regarding the outcome of the shuffle could sometimes be leaked visually. Thus, in this paper we propose some methods for securely implementing a random bisection cut without leaking such information.
KW - Card-based protocols
KW - Cryptography
KW - Real-life hands-on cryptography
KW - Secure multiparty computations
UR - http://www.scopus.com/inward/record.url?scp=85071294801&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85071294801&partnerID=8YFLogxK
U2 - 10.1007/s10207-019-00463-w
DO - 10.1007/s10207-019-00463-w
M3 - Article
AN - SCOPUS:85071294801
VL - 19
SP - 445
EP - 452
JO - International Journal of Information Security
JF - International Journal of Information Security
SN - 1615-5262
IS - 4
ER -