Paper 2018/1113

Private Function Evaluation with Cards

Alexander Koch and Stefan Walzer

Abstract

Card-based protocols allow to evaluate an arbitrary fixed Boolean function $f$ on a hidden input to obtain a hidden output, without the executer learning anything about either of the two (e.g. Crépeau and Kilian, CRYPTO 1993). We explore the case where $f$ implements a universal function, i.e. $f$ is given the encoding $\langle P\rangle$ of a program $P$ and an input $x$ and computes $f(\langle P\rangle, x) = P(x)$. More concretely, we consider universal circuits, Turing machines, RAM machines, and branching programs, giving secure and conceptually simple card-based protocols in each case. We argue that card-based cryptography can be performed in a setting that is only very weakly interactive, which we call the “surveillance” model. Here, when Alice executes a protocol on the cards, the only task of Bob is to watch that Alice does not illegitimately turn over cards and that she shuffles in a way that nobody knows anything about the total permutation applied to the cards. We believe that because of this very limited interaction, our results can be called program obfuscation. As a tool, we develop a useful sub-protocol $\mathsf{sort}_{\Pi}X\mathop{\uparrow}Y$ that couples the two equal-length sequences $X, Y$ and jointly and obliviously permutes them with the permutation $\pi\in\Pi$ that lexicographically minimizes $\pi(X)$. We argue that this generalizes ideas present in many existing card-based protocols. In fact, AND, XOR, bit copy (Mizuki and Sone, FAW 2009), coupled rotation shuffles (Koch and Walzer, ePrint 2017) and the “permutation division” protocol of (Hashimoto et al., ICITS 2017) can all be expressed as “coupled sort protocols”.

Note: Added variants, especially for program reusability

Metadata
Available format(s)
PDF
Category
Cryptographic protocols
Publication info
Preprint. MINOR revision.
Keywords
Card-based protocolsRAM machineBranching programSecure computationUniversal CircuitsObfuscationCryptography without computers
Contact author(s)
alexander koch @ kit edu
History
2019-02-20: revised
2018-11-16: received
See all versions
Short URL
https://ia.cr/2018/1113
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2018/1113,
      author = {Alexander Koch and Stefan Walzer},
      title = {Private Function Evaluation with Cards},
      howpublished = {Cryptology ePrint Archive, Paper 2018/1113},
      year = {2018},
      note = {\url{https://eprint.iacr.org/2018/1113}},
      url = {https://eprint.iacr.org/2018/1113}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.