Secure implementations of a random bisection cut

I Ueda, D Miyahara, A Nishimura, Y Hayashi… - International journal of …, 2020 - Springer
By using a deck of cards, it is possible to realize a secure multiparty computation. In
particular, since a new shuffling operation, called a random bisection cut, was devised in …

Card-based cryptographic logical computations using private operations

H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …

[HTML][HTML] Practical card-based implementations of Yao's millionaire protocol

D Miyahara, Y Hayashi, T Mizuki, H Sone - Theoretical computer science, 2020 - Elsevier
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than
Alice by using a public-key cryptosystem without revealing the actual amounts of their …

Foundations for actively secure card-based cryptography

A Koch, S Walzer - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …

Card-based cryptographic protocols with malicious players using private operations

Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …

Secure computation for threshold functions with physical cards: power of private permutations

T Nakai, S Shirouchi, Y Tokushige, M Iwamoto… - New Generation …, 2022 - Springer
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …

Five-card AND computations in committed format using only uniform cyclic shuffles

Y Abe, Y Hayashi, T Mizuki, H Sone - New Generation Computing, 2021 - Springer
In card-based cryptography, designing AND protocols in committed format is a major
research topic. The state-of-the-art AND protocol proposed by Koch, Walzer, and Härtel in …

Efficient card-based cryptographic protocols for the millionaires' problem using private input operations

H Ono, Y Manabe - 2018 13th Asia joint conference on …, 2018 - ieeexplore.ieee.org
This paper proposes new efficient card-based cryptographic protocols for the millionaires'
problem using private input operations. The millionaires' problem is one of the fundamental …

Another use of the five-card trick: card-minimal secure three-input majority function evaluation

K Toyoda, D Miyahara, T Mizuki - … on Cryptology in India, Jaipur, India …, 2021 - Springer
Starting from the five-card trick proposed by Den Boer (EUROCRYPT'89), many card-based
protocols performing secure multiparty computations with a deck of physical cards have …

The six-card trick: secure computation of three-input equality

K Shinagawa, T Mizuki - International Conference on Information Security …, 2018 - Springer
Secure computation enables parties having secret inputs to compute some function of their
inputs without revealing inputs beyond the output. It is known that secure computation can …