Secure Grouping Protocol Using a Deck of Cards

Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

26 Citations (Scopus)

Abstract

We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined constraints, such as the number of parties in each group). In this paper, we construct an information-theoretically secure protocol using a deck of physical cards to solve the problem, which is jointly executable by the parties themselves without a trusted third party. Despite the non-triviality and the potential usefulness of the secure grouping, our proposed protocol is fairly simple to describe and execute. Our protocol is based on algebraic properties of conjugate permutations. A key ingredient of our protocol is our new techniques to apply multiplication and inverse operations to hidden permutations (i.e., those encoded by using face-down cards), which would be of independent interest and would have various potential applications.

Original languageEnglish
Title of host publicationInformation Theoretic Security - 10th International Conference, ICITS 2017, Proceedings
EditorsJunji Shikata
PublisherSpringer Verlag
Pages135-152
Number of pages18
ISBN (Print)9783319720883
DOIs
Publication statusPublished - 2017
Externally publishedYes
Event10th International Conference on Information Theoretic Security, ICITS 2017 - Hong Kong, Hong Kong
Duration: Nov 29 2017Dec 2 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10681 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference10th International Conference on Information Theoretic Security, ICITS 2017
Country/TerritoryHong Kong
CityHong Kong
Period11/29/1712/2/17

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Secure Grouping Protocol Using a Deck of Cards'. Together they form a unique fingerprint.

Cite this