Secure multiparty computation can be done with a deck of playing cards. For example, den Boer EUROCRYPTi¾?'89 devised his famous "five-card trick", which is a secure two-party AND protocol using five cards. However, the output of the protocol is revealed in the process and it is therefore not suitable for general circuits with hidden intermediate results. To overcome this limitation, protocols in committed format, i.e., with concealed output, have been introduced, among them the six-card AND protocol of Mizuki and Sone, FAWi¾?2009. In their paper, the authors ask whether six cards are minimal for committed format AND protocols.
We give a comprehensive answer to this problem: there is a four-card AND protocol with a runtime that is finite in expectation i.e., a Las Vegas protocol, but no protocol with finite runtime. Moreover, we show that five cards are sufficient for finite runtime. In other words, improving on Mizuki, Kumamoto and Sone, ASIACRYPTi¾?2012 "The Five-Card Trick can be done with four cards", our results can be stated as "The Five-Card Trick can be done in committed format" and furthermore it "can be done with four cards in Las Vegas committed format".
By devising a Las Vegas protocol for any $$k$$-ary boolean function using 2k cards, we address the open question posed by Nishida et al., TAMCi¾?2015 on whether $$2k+6$$ cards are necessary for computing any $$k$$-ary boolean function. For this we use the shuffle abstraction as introduced in the computational model of card-based protocols in Mizuki and Shizuya, Int.i¾?J.i¾?Inf.i¾?Secur., 2014. We augment this result by a discussion on implementing such general shuffle operations.
[1]
Takaaki Mizuki,et al.
The Five-Card Trick Can Be Done with Four Cards
,
2012,
ASIACRYPT.
[2]
Valtteri Niemi,et al.
Secure Multiparty Computations Without Computers
,
1998,
Theor. Comput. Sci..
[3]
Joe Kilian,et al.
Discreet Solitary Games
,
1994,
CRYPTO.
[4]
Takaaki Mizuki,et al.
Practical Card-Based Cryptography
,
2014,
FUN.
[5]
Anton Stiglic.
Computations with a deck of cards
,
2001,
Theor. Comput. Sci..
[6]
Bert den Boer.
More Efficient Match-Making and Satisfiability: The Five Card Trick
,
1990,
EUROCRYPT.
[7]
Takaaki Mizuki,et al.
Six-Card Secure AND and Four-Card Secure XOR
,
2009,
FAW.
[8]
Yu-ichi Hayashi,et al.
Card-Based Protocols for Any Boolean Function
,
2015,
TAMC.
[9]
Takaaki Mizuki,et al.
A formalization of card-based cryptographic protocols via abstract machine
,
2014,
International Journal of Information Security.