Session Time & Room : 5D (Aug.25, 15:30-17:10) @A206
Type : Proposal of Minisymposium
Abstract : Secure computation protocols enable distrustful parties, each holding secret input, to compute a function of their inputs without revealing their inputs beyond the function value. Zero-knowledge protocols allow a prover to convince a verifier that there exists a solution to the puzzle without revealing the solution itself. While these cryptographic protocols are usually implemented on electronic computers, there is another line of research on cryptography using everyday physical objects instead of electronic devices. This mini-symposium will be devoted to so-called card-based protocols and PEZ protocols, which establish cryptographic tasks using a deck of physical cards and a PEZ dispenser, respectively.
[04248] Physical ZKPs for Logic Puzzles Using a Standard Deck of Cards
Author(s) :
Suthee Ruangwises (The University of Electro-Communications)
Abstract : Recently, many researchers have been focusing on constructing physical zero-knowledge proof (ZKP) protocols for logic puzzles using a deck of cards. However, all of the developed protocols so far require several identical copies of some cards, making them impractical. In this talk, we introduce more practical ZKP protocols for two of the most famous logic puzzles: Sudoku and Makaro, that can be implemented using a standard deck (a deck consisting of all different cards).
[05000] Open Problems in Card-Based Cryptography
Author(s) :
Alexander Koch (CNRS, IRIF)
Abstract : Card-based cryptographic protocols for secure multiparty computation allow to jointly compute a function, without giving anything away about someone's input that is not obvious from the output, using only a deck of cards. Since the five-card AND protocol of den Boer (EUROCRYPT 1989), this topic has developed into a full-blown research area. The talks identifies some open problems in card-based cryptography, with a focus on lower bounds on protocol parameters for different functions and models.
[05052] Recent Progress in Card-Based Cryptography
Author(s) :
Daiki Miyahara (The University of Electro-Communications / AIST)
Abstract : Research on card-based cryptography began with the five-card trick, invented in 1989, which computes the two-input logical AND function using a deck of five cards without revealing any information other than necessary. In this talk, I will first introduce it and provide an overview of the major trends in this line of research. Subsequently, I present recent work published in 2021 that deals with the three-input majority function employing the five-card trick.
[05471] Introduction to Private PEZ Protocol
Author(s) :
Yoshiki Abe (The University of Electro-Communications)
Abstract : A PEZ dispenser is a stack-like physical device. We explain the model and construction of the multiparty computation using a PEZ dispenser called private PEZ protocols. First, we will discuss the security requirements for private PEZ protocols by comparing secure and insecure protocols for computing the logical AND function. Then, we show the recursive structure in private PEZ protocols through an example of a three-input majority voting protocol.