TY - JOUR
T1 - Computational model of card-based cryptographic protocols and its applications
AU - MIZUKIy, Takaaki
AU - Shizuya, Hiroki
N1 - Publisher Copyright:
© Copyright 2017 The Institute of Electronics, Information and Communication Engineers.
PY - 2017/1
Y1 - 2017/1
N2 - Card-based protocols enable us to easily perform crypto- graphic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of some- what intuitive and verbal descriptions, such as "turn over this card," "shuffle these two cards," "apply a random cut to these five cards," and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.
AB - Card-based protocols enable us to easily perform crypto- graphic tasks such as secure multiparty computation using a deck of physical cards. Since the first card-based protocol appeared in 1989, many protocols have been designed. A protocol is usually described with a series of some- what intuitive and verbal descriptions, such as "turn over this card," "shuffle these two cards," "apply a random cut to these five cards," and so on. On the other hand, a formal computational model of card-based protocols via abstract machine was constructed in 2014. By virtue of the formalization, card-based protocols can be treated more rigorously; for example, it enables one to discuss the lower bounds on the number of cards required for secure computations. In this paper, an overview of the computational model with its applications to designing protocols and a survey of the recent progress in card-based protocols are presented.
KW - Card games
KW - Card-based protocols
KW - Cryptography without com- puters
KW - Real-life hands-on cryptography
KW - Secure multiparty computations
UR - http://www.scopus.com/inward/record.url?scp=85008315298&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85008315298&partnerID=8YFLogxK
U2 - 10.1587/transfun.E100.A.3
DO - 10.1587/transfun.E100.A.3
M3 - Article
AN - SCOPUS:85008315298
SN - 0916-8508
VL - E100A
SP - 3
EP - 11
JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
IS - 1
ER -