This paper provides the first systematic and comprehensive approach to active security in card-based protocols. We show how a large and natural class of shuffling operations, namely those which (opaquely) permute the cards according to a uniform distribution on a permutation group, can be implemented using only a linear number of helping cards. This ensures that any (information-theoretically) secure cryptographic protocol in the model of Mizuki and Shizuya (Int. J. Inf. Secur., 2014), restricted to this natural class of shuffles, can be realized in an actively secure fashion. For this, we develop an alternative computational model for card-based cryptography, which we believe to be of independent interest.
Category / Keywords: foundations / Card-based protocols, Card shuffling, Secure multiparty computation, Active security, Cryptography without computers Date: received 16 May 2017, last revised 24 May 2017 Contact author: alexander koch at kit edu Available format(s): PDF | BibTeX Citation Version: 20170525:000053 (All versions of this report) Short URL: ia.cr/2017/423 Discussion forum: Show discussion | Start new discussion