Additional constructions to solve the generalized Russian cards problem using combinatorial designs (Q406700): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(4 intermediate revisions by 3 users not shown) | |||
Property / review text | |||
Summary: In the generalized Russian cards problem, we have a card deck \(X\) of \(n\) cards and three participants, Alice, Bob, and Cathy, dealt \(a\), \(b\), and \(c\) cards, respectively. Once the cards are dealt, Alice and Bob wish to privately communicate their hands to each other via public announcements, without the advantage of a shared secret or public key infrastructure. Cathy, for her part, should remain ignorant of all but her own cards after Alice and Bob have made their announcements. Notions for Cathy's ignorance in the literature range from Cathy not learning the fate of any individual card with certainty (\textit{weak \(1\)-security}) to not gaining any probabilistic advantage in guessing the fate of some set of \(\delta\) cards (\textit{perfect \(\delta\)-security}). As we demonstrate in this work, the generalized Russian cards problem has close ties to the field of combinatorial designs, on which we rely heavily, particularly for perfect security notions. Our main result establishes an equivalence between perfectly \(\delta\)-secure strategies and \((c+\delta)\)-designs on \(n\) points with block size \(a\), when announcements are chosen uniformly at random from the set of possible announcements. We also provide construction methods and example solutions, including a construction that yields perfect \(1\)-security against Cathy when \(c=2\). Drawing on our equivalence results, we are able to use a known combinatorial design to construct a strategy with \(a=8\), \(b=13\), and \(c=3\) that is perfectly \(2\)-secure. Finally, we consider a variant of the problem that yields solutions that are easy to construct and optimal with respect to both the number of announcements and level of security achieved. Moreover, this is the first method obtaining weak \(\delta\)-security that allows Alice to hold an arbitrary number of cards and Cathy to hold a set of \(c = \lfloor \frac{a-\delta}{2} \rfloor\) cards. Alternatively, the construction yields solutions for arbitrary \(\delta\), \(c\) and any \(a \geqslant \delta + 2c\). | |||
Property / review text: Summary: In the generalized Russian cards problem, we have a card deck \(X\) of \(n\) cards and three participants, Alice, Bob, and Cathy, dealt \(a\), \(b\), and \(c\) cards, respectively. Once the cards are dealt, Alice and Bob wish to privately communicate their hands to each other via public announcements, without the advantage of a shared secret or public key infrastructure. Cathy, for her part, should remain ignorant of all but her own cards after Alice and Bob have made their announcements. Notions for Cathy's ignorance in the literature range from Cathy not learning the fate of any individual card with certainty (\textit{weak \(1\)-security}) to not gaining any probabilistic advantage in guessing the fate of some set of \(\delta\) cards (\textit{perfect \(\delta\)-security}). As we demonstrate in this work, the generalized Russian cards problem has close ties to the field of combinatorial designs, on which we rely heavily, particularly for perfect security notions. Our main result establishes an equivalence between perfectly \(\delta\)-secure strategies and \((c+\delta)\)-designs on \(n\) points with block size \(a\), when announcements are chosen uniformly at random from the set of possible announcements. We also provide construction methods and example solutions, including a construction that yields perfect \(1\)-security against Cathy when \(c=2\). Drawing on our equivalence results, we are able to use a known combinatorial design to construct a strategy with \(a=8\), \(b=13\), and \(c=3\) that is perfectly \(2\)-secure. Finally, we consider a variant of the problem that yields solutions that are easy to construct and optimal with respect to both the number of announcements and level of security achieved. Moreover, this is the first method obtaining weak \(\delta\)-security that allows Alice to hold an arbitrary number of cards and Cathy to hold a set of \(c = \lfloor \frac{a-\delta}{2} \rfloor\) cards. Alternatively, the construction yields solutions for arbitrary \(\delta\), \(c\) and any \(a \geqslant \delta + 2c\). / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 05B05 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 6341630 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
combinatorial designs | |||
Property / zbMATH Keywords: combinatorial designs / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
Russian cards problem | |||
Property / zbMATH Keywords: Russian cards problem / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
information-theoretic cryptography | |||
Property / zbMATH Keywords: information-theoretic cryptography / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
protocols | |||
Property / zbMATH Keywords: protocols / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / arXiv ID | |||
Property / arXiv ID: 1401.1526 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q5708984 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3635505 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3411976 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2869467 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A colouring protocol for the generalized Russian cards problem / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Unconditional secure communication: a Russian cards protocol / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3211252 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4035713 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4287359 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3140454 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Bounds on secret key exchange using a random deal of cards / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Public Communication Based on Russian Cards Protocol: A Case Study / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Computing and Combinatorics / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Partitions of sets of designs on seven, eight and nine points / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4707230 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Covering all triples on n marks by disjoint Steiner systems / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Combinatorial Designs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A new look at an old construction: constructing (simple) 3-designs from resolvable 2-designs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The Russian cards problem / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The case of the hidden hand / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Three Steps / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2852032 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 00:17, 9 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Additional constructions to solve the generalized Russian cards problem using combinatorial designs |
scientific article |
Statements
Additional constructions to solve the generalized Russian cards problem using combinatorial designs (English)
0 references
9 September 2014
0 references
Summary: In the generalized Russian cards problem, we have a card deck \(X\) of \(n\) cards and three participants, Alice, Bob, and Cathy, dealt \(a\), \(b\), and \(c\) cards, respectively. Once the cards are dealt, Alice and Bob wish to privately communicate their hands to each other via public announcements, without the advantage of a shared secret or public key infrastructure. Cathy, for her part, should remain ignorant of all but her own cards after Alice and Bob have made their announcements. Notions for Cathy's ignorance in the literature range from Cathy not learning the fate of any individual card with certainty (\textit{weak \(1\)-security}) to not gaining any probabilistic advantage in guessing the fate of some set of \(\delta\) cards (\textit{perfect \(\delta\)-security}). As we demonstrate in this work, the generalized Russian cards problem has close ties to the field of combinatorial designs, on which we rely heavily, particularly for perfect security notions. Our main result establishes an equivalence between perfectly \(\delta\)-secure strategies and \((c+\delta)\)-designs on \(n\) points with block size \(a\), when announcements are chosen uniformly at random from the set of possible announcements. We also provide construction methods and example solutions, including a construction that yields perfect \(1\)-security against Cathy when \(c=2\). Drawing on our equivalence results, we are able to use a known combinatorial design to construct a strategy with \(a=8\), \(b=13\), and \(c=3\) that is perfectly \(2\)-secure. Finally, we consider a variant of the problem that yields solutions that are easy to construct and optimal with respect to both the number of announcements and level of security achieved. Moreover, this is the first method obtaining weak \(\delta\)-security that allows Alice to hold an arbitrary number of cards and Cathy to hold a set of \(c = \lfloor \frac{a-\delta}{2} \rfloor\) cards. Alternatively, the construction yields solutions for arbitrary \(\delta\), \(c\) and any \(a \geqslant \delta + 2c\).
0 references
combinatorial designs
0 references
Russian cards problem
0 references
information-theoretic cryptography
0 references
protocols
0 references
0 references