首页
文献服务
文献资源
外文期刊
外文会议
中文期刊
专业机构
智能制造
高级检索
版权声明
使用帮助
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
     
  
  
刊名:
電子情報通信学会技術研究報告
作者:
Hibiki ONO
(Faculty of Informatics, Kogakuin University)
Yoshifumi MANABE
(Faculty of Informatics, Kogakuin University)
刊号:
734D0133-44
ISSN:
0913-5685
出版年:
2017
年卷期:
2017, vol.117, no.489
页码:
121-128
总页数:
8
分类号:
TN91
关键词:
Multi-party secure computation
;
Card-based cryptographic protocols
;
Private operations
;
Logical computations
;
Copy
;
Round
参考中译:
语种:
eng
文摘:
This paper discusses the number of rounds by card-based cryptographic protocols using private operations. Operations that a player executes where the other players cannot see are called private operations. Using private operations, xor, logical and, logical or, and copy operations can be realized with the minimum number of cards. Though the number of cards is discussed, efficiency of these protocols is not discussed. The number of rounds is used to evaluate the efficiency of the protocols using private operations. Most of meaningful calculations using private operations need at least two rounds. This paper shows two round xor protocol using four cards. Then we show two round logical and, logical or, and copy protocols using six cards. This paper then shows that if the private operations are restricted to private random bisection cuts and private reverse cuts, logical and, logical or, xor, and copy operations can be executed with the minimum number of cards in three rounds.
相关文献:
Efficient Card-based Cryptographic Protocols the Millionaires' Problem Using Private Input Operations
Card-Based Cryptographic Protocols with the Minimum Number of Cards Using Private Operations
Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations
Secure Card-Based Cryptographic Protocols Using Private Operations Against Malicious Players
Card-Based Cryptographic Protocols for Three-Input Functions Using Private Operations
Card-based Cryptographic Protocols Using Private Operations
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
On the Number of Rounds by Card-based Cryptographic Protocols Using Private Operations
Card-based Cryptographic Protocols with a Standard Deck of Cards Using Private Operations
©2016机械工业出版社(机械工业信息研究院) 京ICP备05055788号-35