{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T09:14:20Z","timestamp":1769850860092,"version":"3.49.0"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T00:00:00Z","timestamp":1649203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T00:00:00Z","timestamp":1649203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JSPS KAKENHI Grant Number JP18H05289"],"award-info":[{"award-number":["JSPS KAKENHI Grant Number JP18H05289"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001691","name":"Japan Society for the Promotion of Science","doi-asserted-by":"publisher","award":["JSPS KAKENHI Grant Number JP17K00001"],"award-info":[{"award-number":["JSPS KAKENHI Grant Number JP17K00001"]}],"id":[{"id":"10.13039\/501100001691","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2022,8]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security.  Although flipping coins is indispensable in this manner, the coins themselves have never been in the spotlight. Therefore, we would like to make <jats:italic>physical coins<\/jats:italic> rise to the level of cryptography, just as a <jats:italic>deck of physical playing cards<\/jats:italic> has been used to perform a secure multi-party computation. Such a card-based protocol is known to be helpful both to perform a secure computation without any black-box computers and to understand the principles of secure protocols. In this paper, we propose a new framework of secure multi-party computation using physical coins, named a <jats:italic>coin-based protocol<\/jats:italic>. One advantage of the use of coins is that they are more ubiquitous than cards. Whereas a face-down card can conceal the information about its face side, one side of a coin reveals the information of its other side. Hence, more careful design is required for a secure coin-based protocol than for a card-based one. We formalize a computational model of the coin-based protocol and explicitly give protocols for NOT, AND, COPY, OR, and XOR computations. We also discuss the composability of the extended protocols and how to implement them in practice.<\/jats:p>","DOI":"10.1007\/s10207-022-00585-8","type":"journal-article","created":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T06:08:15Z","timestamp":1649225295000},"page":"833-846","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Coin-based Secure Computations"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5121-3458","authenticated-orcid":false,"given":"Yuichi","family":"Komano","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-1043","authenticated-orcid":false,"given":"Takaaki","family":"Mizuki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,6]]},"reference":[{"key":"585_CR1","doi-asserted-by":"publisher","unstructured":"Abe, Y., Iwamoto, M., Ohta, K.: Efficient private PEZ protocols for symmetric functions. In: D.\u00a0Hofheinz, A.\u00a0Rosen (eds.) Theory of Cryptography - 17th International Conference, TCC 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part I, Lecture Notes in Computer Science, vol. 11891, pp. 372\u2013392. Springer (2019). https:\/\/doi.org\/10.1007\/978-3-030-36030-6_15","DOI":"10.1007\/978-3-030-36030-6_15"},{"issue":"1\u20133","key":"585_CR2","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/S0304-3975(03)00210-X","volume":"306","author":"J Balogh","year":"2003","unstructured":"Balogh, J., Csirik, J.A., Ishai, Y., Kushilevitz, E.: Private computation using a PEZ dispenser. Theor. Comput. Sci. 306(1\u20133), 69\u201384 (2003). https:\/\/doi.org\/10.1016\/S0304-3975(03)00210-X","journal-title":"Theor. Comput. Sci."},{"key":"585_CR3","doi-asserted-by":"publisher","unstructured":"den Boer, B.: More efficient match-making and satisfiability: The Five Card Trick. In: J.\u00a0Quisquater, J.\u00a0Vandewalle (eds.) Advances in Cryptology - EUROCRYPT \u201989, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, Lecture Notes in Computer Science, vol. 434, pp. 208\u2013217. Springer (1989). https:\/\/doi.org\/10.1007\/3-540-46885-4_23","DOI":"10.1007\/3-540-46885-4_23"},{"key":"585_CR4","doi-asserted-by":"publisher","unstructured":"Cr\u00e9peau, C., Kilian, J.: Discreet solitary games. In: D.R. Stinson (ed.) Advances in Cryptology - CRYPTO \u201993, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, Lecture Notes in Computer Science, vol. 773, pp. 319\u2013330. Springer (1993). https:\/\/doi.org\/10.1007\/3-540-48329-2_27","DOI":"10.1007\/3-540-48329-2_27"},{"key":"585_CR5","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.tcs.2016.08.003","volume":"651","author":"P D\u2019Arco","year":"2016","unstructured":"D\u2019Arco, P., Prisco, R.D.: Secure computation without computers. Theor. Comput. Sci. 651, 11\u201336 (2016). https:\/\/doi.org\/10.1016\/j.tcs.2016.08.003","journal-title":"Theor. Comput. Sci."},{"key":"585_CR6","doi-asserted-by":"publisher","unstructured":"Goldwasser, S.: Multi-party computations: Past and present. In: J.E. Burns, H.\u00a0Attiya (eds.) Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, Santa Barbara, California, USA, August 21-24, 1997, pp. 1\u20136. ACM (1997). https:\/\/doi.org\/10.1145\/259380.259405","DOI":"10.1145\/259380.259405"},{"key":"585_CR7","doi-asserted-by":"publisher","unstructured":"Koch, A., Walzer, S., H\u00e4rtel, K.: Card-based cryptographic protocols using a minimal number of cards. In: T.\u00a0Iwata, J.H. Cheon (eds.) Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I, Lecture Notes in Computer Science, vol. 9452, pp. 783\u2013807. Springer (2015). https:\/\/doi.org\/10.1007\/978-3-662-48797-6_32","DOI":"10.1007\/978-3-662-48797-6_32"},{"key":"585_CR8","doi-asserted-by":"publisher","unstructured":"Kocher, P.C.: Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems. In: N.\u00a0Koblitz (ed.) Advances in Cryptology - CRYPTO \u201996, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, Lecture Notes in Computer Science, vol. 1109, pp. 104\u2013113. Springer (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_9","DOI":"10.1007\/3-540-68697-5_9"},{"key":"585_CR9","doi-asserted-by":"publisher","unstructured":"Kocher, P.C., Jaffe, J., Jun, B.: Differential power analysis. In: M.J. Wiener (ed.) Advances in Cryptology - CRYPTO \u201999, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings, Lecture Notes in Computer Science, vol. 1666, pp. 388\u2013397. Springer (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_25","DOI":"10.1007\/3-540-48405-1_25"},{"key":"585_CR10","doi-asserted-by":"publisher","unstructured":"Komano, Y., Mizuki, T.: Multi-party computation based on physical coins. In: D.\u00a0Fagan, C.\u00a0Mart\u00edn-Vide, M.\u00a0O\u2019Neill, M.A. Vega-Rodr\u00edguez (eds.) Theory and Practice of Natural Computing - 7th International Conference, TPNC 2018, Dublin, Ireland, December 12-14, 2018, Proceedings, Lecture Notes in Computer Science, vol. 11324, pp. 87\u201398. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-030-04070-3_7","DOI":"10.1007\/978-3-030-04070-3_7"},{"key":"585_CR11","unstructured":"Mangard, S., Oswald, E., Popp, T.: Power analysis attacks - revealing the secrets of smart cards. Springer (2007)"},{"key":"585_CR12","unstructured":"Marcedone, A., Wen, Z., Shi, E.: Secure dating with four or fewer cards. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2015\/1031 (2015). Accessed 15 May 2020"},{"key":"585_CR13","doi-asserted-by":"publisher","unstructured":"Miyahara, D., Komano, Y., Mizuki, T., Sone, H.: Cooking cryptographers: secure multiparty computation based on balls and bags. In: 34th IEEE 34th Computer Security Foundations Symposium (CSF), Dubrovnik, Croatia. IEEE (2021). https:\/\/doi.org\/10.1109\/CSF51468.2021.00034","DOI":"10.1109\/CSF51468.2021.00034"},{"key":"585_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1016\/j.tcs.2016.01.039","volume":"622","author":"T Mizuki","year":"2016","unstructured":"Mizuki, T.: Card-based protocols for securely computing the conjunction of multiple variables. Theor. Comput. Sci. 622, 34\u201344 (2016). https:\/\/doi.org\/10.1016\/j.tcs.2016.01.039","journal-title":"Theor. Comput. Sci."},{"key":"585_CR15","doi-asserted-by":"publisher","unstructured":"Mizuki, T., Komano, Y.: Analysis of information leakage due to operative errors in card-based protocols. In: C.S. Iliopoulos, H.W. Leong, W.\u00a0Sung (eds.) Combinatorial Algorithms - 29th International Workshop, IWOCA 2018, Singapore, July 16-19, 2018, Proceedings, Lecture Notes in Computer Science, vol. 10979, pp. 250\u2013262. Springer (2018). https:\/\/doi.org\/10.1007\/978-3-319-94667-2_21","DOI":"10.1007\/978-3-319-94667-2_21"},{"key":"585_CR16","doi-asserted-by":"publisher","unstructured":"Mizuki, T., Kumamoto, M., Sone, H.: The five-card trick can be done with four cards. In: X.\u00a0Wang, K.\u00a0Sako (eds.) Advances in Cryptology - ASIACRYPT 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings, Lecture Notes in Computer Science, vol. 7658, pp. 598\u2013606. Springer (2012). https:\/\/doi.org\/10.1007\/978-3-642-34961-4_36","DOI":"10.1007\/978-3-642-34961-4_36"},{"issue":"1","key":"585_CR17","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10207-013-0219-4","volume":"13","author":"T Mizuki","year":"2014","unstructured":"Mizuki, T., Shizuya, H.: A formalization of card-based cryptographic protocols via abstract machine. Int. J. Inf. Sec. 13(1), 15\u201323 (2014). https:\/\/doi.org\/10.1007\/s10207-013-0219-4","journal-title":"Int. J. Inf. Sec."},{"key":"585_CR18","doi-asserted-by":"publisher","unstructured":"Mizuki, T., Shizuya, H.: Computational model of card-based cryptographic protocols and its applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1), 3\u201311 (2017). https:\/\/doi.org\/10.1587\/transfun.E100.A.3","DOI":"10.1587\/transfun.E100.A.3"},{"key":"585_CR19","doi-asserted-by":"publisher","unstructured":"Mizuki, T., Sone, H.: Six-card secure AND and four-card secure XOR. In: X.\u00a0Deng, J.E. Hopcroft, J.\u00a0Xue (eds.) Frontiers in Algorithmics, Third International Workshop, FAW 2009, Hefei, China, June 20-23, 2009. Proceedings, Lecture Notes in Computer Science, vol. 5598, pp. 358\u2013369. Springer (2009). https:\/\/doi.org\/10.1007\/978-3-642-02270-8_36","DOI":"10.1007\/978-3-642-02270-8_36"},{"key":"585_CR20","first-page":"279","volume":"36","author":"T Mizuki","year":"2006","unstructured":"Mizuki, T., Uchiike, F., Sone, H.: Securely computing XOR with 10 cards. Australas. J Comb. 36, 279\u2013294 (2006)","journal-title":"Australas. J Comb."},{"issue":"10","key":"585_CR21","doi-asserted-by":"publisher","first-page":"1283","DOI":"10.1016\/j.tcs.2009.10.023","volume":"411","author":"T Moran","year":"2010","unstructured":"Moran, T., Naor, M.: Basing cryptographic protocols on tamper-evident seals. Theor. Comput. Sci. 411(10), 1283\u20131310 (2010). https:\/\/doi.org\/10.1016\/j.tcs.2009.10.023","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"585_CR22","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s00500-017-2858-2","volume":"22","author":"A Nishimura","year":"2018","unstructured":"Nishimura, A., Nishida, T., Hayashi, Y., Mizuki, T., Sone, H.: Card-based protocols using unequal division shuffles. Soft Comput. 22(2), 361\u2013371 (2018). https:\/\/doi.org\/10.1007\/s00500-017-2858-2","journal-title":"Soft Comput."},{"key":"585_CR23","doi-asserted-by":"publisher","unstructured":"Ueda, I., Miyahara, D., Nishimura, A., Hayashi, Y., Mizuki, T., Sone, H.: Secure implementations of a random bisection cut. Int. J. Inf. Sec. 19(4), 445\u2013452 (2020). https:\/\/doi.org\/10.1007\/s10207-019-00463-w","DOI":"10.1007\/s10207-019-00463-w"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00585-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00585-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00585-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T12:01:24Z","timestamp":1659096084000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00585-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,6]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,8]]}},"alternative-id":["585"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00585-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,6]]},"assertion":[{"value":"6 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}