Card-based cryptographic logical computations using private operations

H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …

[PDF][PDF] Cryptographic protocols from physical assumptions

A Koch - 2019 - core.ac.uk
Modern cryptography does not only enable to protect your personal data on the Internet, or
to authenticate for certain services, but also evaluate a function on private inputs of multiple …

A secure three-input AND protocol with a standard deck of minimal cards

H Koyama, D Miyahara, T Mizuki, H Sone - … Computer Science Symposium …, 2021 - Springer
Card-based protocols are used to perform cryptographic tasks such as secure multiparty
computation using a deck of physical cards. While most of the existing protocols use a two …

Card-based cryptographic protocols with a standard deck of cards using private operations

Y Manabe, H Ono - New Generation Computing, 2024 - Springer
This paper shows new kinds of card-based cryptographic protocols with a standard deck of
cards using private operations. They are multi-party secure computations executed by …

Coin-based cryptographic protocols without hand operations

Y Minamikawa, K Shinagawa - IEICE Transactions on …, 2024 - search.ieice.org
Secure computation is a kind of cryptographic techniques that enables to compute a function
while keeping input data secret. Komano and Mizuki (International Journal of Information …

Information leakage due to operative errors in card-based protocols

T Mizuki, Y Komano - Information and Computation, 2022 - Elsevier
Card-based protocols provide secure multi-party computation using a deck of physical cards
via a series of operations, such as shuffling and turning over cards, that are executed by …

Coin-based secure computations

Y Komano, T Mizuki - International Journal of Information Security, 2022 - Springer
In the history of cryptography, many cryptographic protocols have relied on random coin
tosses to prove their security. Although flipping coins is indispensable in this manner, the …

Actively revealing card attack on card-based protocols

K Takashima, D Miyahara, T Mizuki, H Sone - Natural Computing, 2022 - Springer
In 1989, den Boer presented the first card-based protocol, called the “five-card trick,” that
securely computes the AND function using a deck of physical cards via a series of actions …

Cooking cryptographers: secure multiparty computation based on balls and bags

D Miyahara, Y Komano, T Mizuki… - 2021 IEEE 34th …, 2021 - ieeexplore.ieee.org
Imagine two cryptographers wishing to securely compute the AND value of their secret input
bits. They are in the kitchen, where all they have are three saucepans with Borscht soup and …

Multi-party computation based on physical coins

Y Komano, T Mizuki - Theory and Practice of Natural Computing: 7th …, 2018 - Springer
In the history of cryptography, many cryptographic protocols rely on random coin tosses to
discuss their provable security. Although flipping coins is indispensable in this manner, the …