Committed and protocol using three cards with more handy shuffle

Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

A card-based protocol enables parties to securely compute a desired function by using physical cards instead of computer devices. Most of the previous works have aimed to achieve protocols with a smaller number of cards for elementary functions (e.g., AND/XOR/COPY). Mizuki and Shizuya's protocols achieve the smallest numbers of cards among the existing protocols. Their XOR and COPY protocols can be done easily, however, their AND protocol does not have an easy physical implementation due to the complicated underlying shuffle. We propose a new shuffle, tornado shuffle, which has an easy physical implementation and is also sufficient to construct three-card AND protocol.

Original languageEnglish
Title of host publicationProceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages700-702
Number of pages3
ISBN (Electronic)9784885523090
Publication statusPublished - Feb 2 2017
Externally publishedYes
Event3rd International Symposium on Information Theory and Its Applications, ISITA 2016 - Monterey, United States
Duration: Oct 30 2016Nov 2 2016

Publication series

NameProceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016

Other

Other3rd International Symposium on Information Theory and Its Applications, ISITA 2016
CountryUnited States
CityMonterey
Period10/30/1611/2/16

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Hardware and Architecture
  • Information Systems
  • Signal Processing
  • Library and Information Sciences

Fingerprint Dive into the research topics of 'Committed and protocol using three cards with more handy shuffle'. Together they form a unique fingerprint.

Cite this