Securely computing the n-variable equality function with 2n cards

Research in the area of secure multi-party computation using a deck of playing cards, often called card-based cryptography, started from the introduction of the five-card trick protocol to compute the logical AND function by den Boer in 1989. Since then, many card-based protocols to compute various...

Full description

Saved in:
Bibliographic Details
Published inTheoretical computer science Vol. 887; pp. 99 - 110
Main Authors Ruangwises, Suthee, Itoh, Toshiya
Format Journal Article
LanguageEnglish
Published Elsevier B.V 02.10.2021
Subjects
Online AccessGet full text
ISSN0304-3975
1879-2294
1879-2294
DOI10.1016/j.tcs.2021.07.007

Cover

More Information
Summary:Research in the area of secure multi-party computation using a deck of playing cards, often called card-based cryptography, started from the introduction of the five-card trick protocol to compute the logical AND function by den Boer in 1989. Since then, many card-based protocols to compute various functions have been developed. In this paper, we propose two new protocols that securely compute the n-variable equality function (determining whether all inputs are equal) E:{0,1}n→{0,1} using 2n cards. The first protocol can be generalized to compute any doubly symmetric functionf:{0,1}n→Z using 2n cards, and any symmetric function f:{0,1}n→Z using 2n+2 cards. The second protocol can be generalized to compute the k-candidate n-variable equality function E:(Z/kZ)n→{0,1} using 2⌈lg⁡k⌉n cards.
ISSN:0304-3975
1879-2294
1879-2294
DOI:10.1016/j.tcs.2021.07.007