Abstract
In the generalized Russian cards problem, the three players Alice, Bob and Cath draw \(a,b\) and \(c\) cards, respectively, from a deck of \(a+b+c\) cards. Players only know their own cards and what the deck of cards is. Alice and Bob are then required to communicate their hand of cards to each other by way of public messages. For a natural number \(k\), the communication is said to be \(k\)-safe if Cath does not learn whether or not Alice holds any given set of at most \(k\) cards that are not Cath’s, a notion originally introduced as weak \(k\)-security by Swanson and Stinson. An elegant solution by Atkinson views the cards as points in a finite projective plane. We propose a general solution in the spirit of Atkinson’s, although based on finite vector spaces rather than projective planes, and call it the ‘geometric protocol’. Given arbitrary \(c,k>0\), this protocol gives an informative and \(k\)-safe solution to the generalized Russian cards problem for infinitely many values of \((a,b,c)\) with \(b=O(ac)\). This improves on the collection of parameters for which solutions are known. In particular, it is the first solution which guarantees \(k\)-safety when Cath has more than one card.
Similar content being viewed by others
Notes
Note however that this restriction may be circumvented by using protocols of more than two steps [4].
Our presentation follows that given in [17]. Compare to [1, 18], where informative for \((A,B,C)\) is defined as follows: Given a deal \((A,B,C)\), an announcement \(\mathcal A \) containing \(A\) is informative for \((A,B,C)\) if for any \(A^{\prime } \in \mathcal A \) and any \((A^{\prime },B^{\prime },C^{\prime })\), there is only one \(X\in \mathcal A \) such that \(X\subseteq A^{\prime }\cup C^{\prime }\). In principle this is stronger than the definition we give; however, this is remedied by the more general condition of being informative for \((a,b,c)\).
References
Albert M., Aldred R., Atkinson M., van Ditmarsch H., Handley C.: Safe communication for card players by combinatorial designs for two-step protocols. Aust. J. Comb. 33, 33–46 (2005).
Atkinson M., van Ditmarsch H., Roehling S.: Avoiding bias in cards cryptography. Aust. J. Comb. 44, 3–17 (2009).
Cordón-Franco A., van Ditmarsch H., Fernández-Duque D., Joosten J., Soler-Toscano F.: A secure additive protocol for card players. Aust. J. Comb. 54, 163–176 (2012).
Cordón-Franco A., van Ditmarsch H., Fernández-Duque D., Soler-Toscano F.: A colouring protocol for the generalized Russian cards problem. Theor. Comput. Sci. (2013). doi:10.1016/j.tcs.2013.05.010.
Dembowski P.: Finite Geometries (reprint). Springer, Berlin (1997).
Fischer M., Wright R.: Bounds on secret key exchange using a random deal of cards. J. Cryptol. 9(2), 71–99 (1996).
Katz J., Lindell Y.: Introduction to Modern Cryptography. Chapman & Hall, London (2007).
Kerckhoffs A.: La cryptographie militaire. J. Des Sci. Militaires IX, 5–38, 161–191 (1883).
Kirkman T.: On a problem in combinations. Camb. Dublin Math. J. 2, 191–204 (1847).
Lidl R.: Finite Fields. Cambridge University Press, Cambridge (1997).
Makarychev K., Makarychev Y.: The importance of being formal. Math. Intell. 23(1), 41–42 (2001).
Maurer U.: Information-theoretic cryptography. In: Wiener, M. (ed.) Advances in Cryptology, CRYPTO 1999, Lecture Notes in Computer Science, vol. 1666, pp. 47–64. Springer, Heidelberg (1999).
Mizuki T., Shizuya H., Nishizeki T.: A complete characterization of a family of key exchange protocols. Int. J. Inf. Secur. 1, 131–142 (2002).
Stiglic A.: Computations with a deck of cards. Theor. Comput. Sci. 259(1–2), 671–678 (2001).
Stinson D.: Combinatorial Designs—Constructions and Analysis. Springer, Heidelberg (2004).
Stinson D.: Cryptography: Theory and Practice, 3rd edn. Discrete Mathematics and Its Applications. Chapman & Hall, London (2005).
Swanson C., Stinson D.: Combinatorial solutions providing improved security for the generalized Russian cards problem. Des. Codes Cryptogr. 1–23 (2012). doi:10.1007/s10623-012-9770-7.
van Ditmarsch H.: The Russian cards problem. Stud. Logica 75, 31–62 (2003).
van Ditmarsch H., Soler-Toscano F.: Three steps. In: Proceedings of CLIMA XII, Lecture Notes in Computer Science, vol. 6814, pp. 41–57. Springer, Heidelberg (2011).
Acknowledgments
We acknowledge support from the project ERC Starting Grant EPS 313360, the project FFI2011-15945-E (Ministerio de Economía y Competitividad, Spain) and the Excellence Research Project of the Junta de Andalucía P08-HUM-04159. Hans van Ditmarsch is also affiliated to IMSc, Chennai, India, as research associate. We would also like to express our gratitude to the anonymous referees.
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by C. Blundo.
Rights and permissions
About this article
Cite this article
Cordón-Franco, A., van Ditmarsch, H., Fernández-Duque, D. et al. A geometric protocol for cryptography with cards. Des. Codes Cryptogr. 74, 113–125 (2015). https://doi.org/10.1007/s10623-013-9855-y
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-013-9855-y