Card-Based Cryptographic Protocols for Three-Input Functions Using Private Operations

This paper shows card-based cryptographic protocols to calculate several Boolean functions using private operations under the semi-honest model. Private operations, introduced by Nakai et al. are the most powerful operations for card-based protocols. We showed that copy, logical AND, and logical XOR...

Full description

Saved in:
Bibliographic Details
Published inCombinatorial Algorithms Vol. 12757; pp. 469 - 484
Main Authors Manabe, Yoshifumi, Ono, Hibiki
Format Book Chapter
LanguageEnglish
Published Switzerland Springer International Publishing AG 2021
Springer International Publishing
SeriesLecture Notes in Computer Science
Subjects
Online AccessGet full text
ISBN9783030799861
3030799867
ISSN0302-9743
1611-3349
DOI10.1007/978-3-030-79987-8_33

Cover

More Information
Summary:This paper shows card-based cryptographic protocols to calculate several Boolean functions using private operations under the semi-honest model. Private operations, introduced by Nakai et al. are the most powerful operations for card-based protocols. We showed that copy, logical AND, and logical XOR can be calculated with the minimum number of cards using three private operations, private random bisection cuts, private reverse cuts, and private reveals. This paper shows that by using these private operations, all of the following Boolean functions can be calculated without additional cards other than the input cards: (1) Any three input Boolean functions, (2) Half adder and full adder, and (3) Any n-input symmetric Boolean functions. The numbers of cards used in these protocols are smaller than the ones without private operations.
ISBN:9783030799861
3030799867
ISSN:0302-9743
1611-3349
DOI:10.1007/978-3-030-79987-8_33