TY - GEN
T1 - Card-Based Protocols Imply PSM Protocols
AU - Shinagawa, Kazumasa
AU - Nuida, Koji
N1 - Publisher Copyright:
© Kazumasa Shinagawa and Koji Nuida.
PY - 2025/2/24
Y1 - 2025/2/24
N2 - Card-based cryptography is the art of cryptography using a deck of physical cards. While this area is known as a research area of recreational cryptography and is recently paid attention in educational purposes, there is no systematic study of the relationship between card-based cryptography and the other “conventional” cryptography. This paper establishes the first generic conversion from card-based protocols to private simultaneous messages (PSM) protocols, a special kind of secure multiparty computation. Our compiler supports “simple” card-based protocols, which is a natural subclass of finite-runtime protocols. The communication complexity of the resulting PSM protocol depends on how many cards are opened in total in all possible branches of the original card-based protocol. This result shows theoretical importance of such “opening complexity” of card-based protocols, which had not been focused in this area. As a consequence, lower bounds for PSM protocols imply those for simple card-based protocols. In particular, if there exists no PSM protocol with subexponential communication complexity for a function f, then there exists no simple card-based protocol with subexponential opening complexity for the same f.
AB - Card-based cryptography is the art of cryptography using a deck of physical cards. While this area is known as a research area of recreational cryptography and is recently paid attention in educational purposes, there is no systematic study of the relationship between card-based cryptography and the other “conventional” cryptography. This paper establishes the first generic conversion from card-based protocols to private simultaneous messages (PSM) protocols, a special kind of secure multiparty computation. Our compiler supports “simple” card-based protocols, which is a natural subclass of finite-runtime protocols. The communication complexity of the resulting PSM protocol depends on how many cards are opened in total in all possible branches of the original card-based protocol. This result shows theoretical importance of such “opening complexity” of card-based protocols, which had not been focused in this area. As a consequence, lower bounds for PSM protocols imply those for simple card-based protocols. In particular, if there exists no PSM protocol with subexponential communication complexity for a function f, then there exists no simple card-based protocol with subexponential opening complexity for the same f.
KW - Card-based cryptography
KW - private simultaneous messages
UR - https://www.scopus.com/pages/publications/85219520977
UR - https://www.scopus.com/inward/citedby.url?scp=85219520977&partnerID=8YFLogxK
U2 - 10.4230/LIPIcs.STACS.2025.72
DO - 10.4230/LIPIcs.STACS.2025.72
M3 - Conference contribution
AN - SCOPUS:85219520977
T3 - Leibniz International Proceedings in Informatics, LIPIcs
BT - 42nd International Symposium on Theoretical Aspects of Computer Science, STACS 2025
A2 - Beyersdorff, Olaf
A2 - Pilipczuk, Michal
A2 - Pimentel, Elaine
A2 - Thang, Nguyen Kim
PB - Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
T2 - 42nd International Symposium on Theoretical Aspects of Computer Science, STACS 2025
Y2 - 4 March 2025 through 7 March 2025
ER -