TY - GEN
T1 - Secure Grouping Protocol Using a Deck of Cards
AU - Hashimoto, Yuji
AU - Shinagawa, Kazumasa
AU - Nuida, Koji
AU - Inamura, Masaki
AU - Hanaoka, Goichiro
N1 - Publisher Copyright:
© Springer International Publishing AG. 2017.
PY - 2017
Y1 - 2017
N2 - We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined constraints, such as the number of parties in each group). In this paper, we construct an information-theoretically secure protocol using a deck of physical cards to solve the problem, which is jointly executable by the parties themselves without a trusted third party. Despite the non-triviality and the potential usefulness of the secure grouping, our proposed protocol is fairly simple to describe and execute. Our protocol is based on algebraic properties of conjugate permutations. A key ingredient of our protocol is our new techniques to apply multiplication and inverse operations to hidden permutations (i.e., those encoded by using face-down cards), which would be of independent interest and would have various potential applications.
AB - We consider a problem, which we call secure grouping, of dividing a number of parties into some subsets (groups) in the following manner: Each party has to know the other members of his/her group, while he/she may not know anything about how the remaining parties are divided (except for certain public predetermined constraints, such as the number of parties in each group). In this paper, we construct an information-theoretically secure protocol using a deck of physical cards to solve the problem, which is jointly executable by the parties themselves without a trusted third party. Despite the non-triviality and the potential usefulness of the secure grouping, our proposed protocol is fairly simple to describe and execute. Our protocol is based on algebraic properties of conjugate permutations. A key ingredient of our protocol is our new techniques to apply multiplication and inverse operations to hidden permutations (i.e., those encoded by using face-down cards), which would be of independent interest and would have various potential applications.
UR - http://www.scopus.com/inward/record.url?scp=85036646924&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85036646924&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-72089-0_8
DO - 10.1007/978-3-319-72089-0_8
M3 - Conference contribution
AN - SCOPUS:85036646924
SN - 9783319720883
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 135
EP - 152
BT - Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings
A2 - Shikata, Junji
PB - Springer Verlag
T2 - 10th International Conference on Information Theoretic Security, ICITS 2017
Y2 - 29 November 2017 through 2 December 2017
ER -