## Cryptology ePrint Archive: Report 2017/863

The Minimum Number of Cards in Practical Card-based Protocols

Julia Kastner and Alexander Koch and Stefan Walzer and Daiki Miyahara and Yu-ichi Hayashi and Takaaki Mizuki and Hideaki Sone

Abstract: The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a logical AND of two private bits, using five playing cards of symbols $\heartsuit$ and $\clubsuit$. Since then, card-based protocols have been successfully put to use in classroom environments, vividly illustrating secure multiparty computation – and evoked research on the minimum number of cards needed for several functionalities.

Securely computing arbitrary circuits needs protocols for negation, AND and bit copy in committed-format, where outputs are commitments again. Negation just swaps the bit's cards, computing AND and copying a bit $n$ times can be done with six and $2n+2$ cards, respectively, using the simple protocols of Mizuki and Sone (FAW 2009).

Koch, Walzer and Härtel (ASIACRYPT 2015) showed that five cards suffice for computing AND in finite runtime, albeit using relatively complex and unpractical shuffle operations. In this paper, we show that if we restrict shuffling to closed permutation sets, the six-card protocol is optimal in the finite-runtime setting. If we additionally assume a uniform distribution on the permutations in a shuffle, we show that restart-free four-card AND protocols are impossible. These shuffles are easy to perform even in an actively secure manner (Koch and Walzer, ePrint 2017).

For copying bit commitments, the protocol of Nishimura et al. (ePrint 2017) needs only $2n+1$ cards, but performs a number of complex shuffling steps that is only finite in expectation. We show that it is impossible to go with less cards. If we require an a priori bound on the runtime, we show that the $(2n+2)$-card protocol is card-minimal.

Category / Keywords: cryptographic protocols / Card-based protocols, Committed format, Boolean AND, COPY, Secure computation, Cryptography without computers

Original Publication (with minor differences): IACR-ASIACRYPT-2017

Date: received 6 Sep 2017, last revised 11 Sep 2017

Contact author: alexander koch at kit edu

Available format(s): PDF | BibTeX Citation

Note: Full version (provides proof of Prop. 1, discussion of Fig. 1, slightly more discussion on open problems).

Short URL: ia.cr/2017/863

[ Cryptology ePrint archive ]