IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Coin-based Cryptographic Protocols without Hand Operations
Yuta MINAMIKAWAKazumasa SHINAGAWA
Author information
JOURNAL FREE ACCESS Advance online publication

Article ID: 2023EAP1082

Details
Abstract

Secure computation is a kind of cryptographic techniques that enables to compute a function while keeping input data secret. Komano and Mizuki (International Journal of Information Security 2022) proposed a model of coin-based protocols, which are secure computation protocols using physical coins. They designed AND,XOR, and COPY protocols using so-called hand operations, which move coins from one player's palm to the other palm. However, hand operations cannot be executed when all players' hands are occupied. In this paper, we propose coin-based protocols without hand operations. In particular, we design a three-coin NOT protocol, a seven-coin AND protocol, a six-coin XOR protocol, and a five-coin COPY protocol without hand operations. Our protocols use random flips only as shuffle operations and are enough to compute any function since they have the same format of input and output, i.e., committed-format protocols.

Content from these authors
© 2023 The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top