Information leakage due to operative errors in card-based protocols

Information and Computation - Tập 285 - Trang 104910 - 2022
Takaaki Mizuki1, Yuichi Komano2
1Tohoku University, Sendai, Japan
2Toshiba Corporation, Kawasaki, Japan

Tài liệu tham khảo

Mizuki, 2018, Analysis of information leakage due to operative errors in card-based protocols, vol. 10979, 250 Mizuki, 2017, Computational model of card-based cryptographic protocols and its applications, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., E100.A, 3, 10.1587/transfun.E100.A.3 Mizuki, 2009, Six-card secure AND and four-card secure XOR, vol. 5598, 358 Mizuki, 2016, Card-based protocols for securely computing the conjunction of multiple variables, Theor. Comput. Sci., 622, 34, 10.1016/j.tcs.2016.01.039 Nakai, 2017, Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations, vol. 10681, 153 Ibaraki, 2016, A more efficient card-based protocol for generating a random permutation without fixed points, 252 Koch, 2019 Shinagawa, 2020 Nakai, 2021, How to solve millionaires’ problem with two kinds of cards, New Gener. Comput., 39, 73, 10.1007/s00354-020-00118-8 Ono, 2021, Card-based cryptographic logical computations using private operations, New Gener. Comput., 39, 19, 10.1007/s00354-020-00113-z Ueda, 2016, How to implement a random bisection cut, 58 Koch, 2015, Card-based cryptographic protocols using a minimal number of cards, vol. 9452, 783 Mizuki, 2014, A formalization of card-based cryptographic protocols via abstract machine, Int. J. Inf. Secur., 13, 15, 10.1007/s10207-013-0219-4