TY - GEN
T1 - Efficient Card-Based Millionaires’ Protocols via Non-binary Input Encoding
AU - Nuida, Koji
N1 - Publisher Copyright:
© 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
PY - 2023
Y1 - 2023
N2 - Comparison of integers, a traditional topic in secure multiparty computation since Yao’s pioneering work on “Millionaires’ Problem” (FOCS 1982), is also well studied in card-based cryptography. For the problem, Miyahara et al. (Theoretical Computer Science, 2020) proposed a protocol using binary cards (i.e., cards with two kinds of symbols) that is highly efficient in terms of numbers of cards and shuffles, and its extension to number cards (i.e., cards with distinct symbols). In this paper, with a different design strategy which we name “Tug-of-War Technique”, we propose new protocols based on binary cards and on number cards. For binary cards, our protocol improves the previous protocol asymptotically (in bit lengths of input integers) in terms of numbers of cards and shuffles when adopting ternary encoding of input integers. For number cards, at the cost of increasing the number of cards, our protocol improves the number of shuffles of the previous protocol even with binary encoding, and more with q-ary encoding where q> 2.
AB - Comparison of integers, a traditional topic in secure multiparty computation since Yao’s pioneering work on “Millionaires’ Problem” (FOCS 1982), is also well studied in card-based cryptography. For the problem, Miyahara et al. (Theoretical Computer Science, 2020) proposed a protocol using binary cards (i.e., cards with two kinds of symbols) that is highly efficient in terms of numbers of cards and shuffles, and its extension to number cards (i.e., cards with distinct symbols). In this paper, with a different design strategy which we name “Tug-of-War Technique”, we propose new protocols based on binary cards and on number cards. For binary cards, our protocol improves the previous protocol asymptotically (in bit lengths of input integers) in terms of numbers of cards and shuffles when adopting ternary encoding of input integers. For number cards, at the cost of increasing the number of cards, our protocol improves the number of shuffles of the previous protocol even with binary encoding, and more with q-ary encoding where q> 2.
UR - http://www.scopus.com/inward/record.url?scp=85171583701&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85171583701&partnerID=8YFLogxK
U2 - 10.1007/978-3-031-41326-1_13
DO - 10.1007/978-3-031-41326-1_13
M3 - Conference contribution
AN - SCOPUS:85171583701
SN - 9783031413254
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 237
EP - 254
BT - Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Proceedings
A2 - Shikata, Junji
A2 - Kuzuno, Hiroki
PB - Springer Science and Business Media Deutschland GmbH
T2 - 18th International Workshop on Security, IWSEC 2023
Y2 - 29 August 2023 through 31 August 2023
ER -