Card-based cryptographic protocols for three-input functions using private operations (Q2115886): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: More Efficient Match-Making and Satisfiability The Five Card Trick / rank
 
Normal rank
Property / cites work
 
Property / cites work: Physical zero-knowledge proof for Makaro / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4341757 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interactive physical zero-knowledge proof for Norinori / rank
 
Normal rank
Property / cites work
 
Property / cites work: Necessary and sufficient numbers of cards for securely computing two-bit output functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points / rank
 
Normal rank
Property / cites work
 
Property / cites work: The minimum number of cards in practical card-based protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Card-Based Cryptographic Protocols Using a Minimal Number of Cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: A physical ZKP for Slitherlink: how to perform physical topology-preserving computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical card-based implementations of Yao's millionaire protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Card-based protocols for securely computing the conjunction of multiple variables / rank
 
Normal rank
Property / cites work
 
Property / cites work: Voting with a Logarithmic Number of Cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Five-Card Trick Can Be Done with Four Cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Six-Card Secure AND and Four-Card Secure XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3412148 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient generation of a card-based uniformly distributed random derangement / rank
 
Normal rank
Property / cites work
 
Property / cites work: Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure multiparty computations without computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Card-Based Protocols for Any Boolean Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Card-based protocols using unequal division shuffles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori / rank
 
Normal rank
Property / cites work
 
Property / cites work: AND protocols using only uniform shuffles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Securely computing the \(n\)-variable equality function with \(2n\) cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Physical zero-knowledge proof for ripple effect / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient card-based zero-knowledge proof for Sudoku / rank
 
Normal rank
Property / cites work
 
Property / cites work: The six-card trick: secure computation of three-input equality / rank
 
Normal rank
Property / cites work
 
Property / cites work: A single shuffle is enough for secure card-based computation of any Boolean circuit / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computations with a deck of cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Card-based protocols for secure ranking computations / rank
 
Normal rank

Latest revision as of 09:31, 28 July 2024

scientific article
Language Label Description Also known as
English
Card-based cryptographic protocols for three-input functions using private operations
scientific article

    Statements

    Card-based cryptographic protocols for three-input functions using private operations (English)
    0 references
    0 references
    0 references
    22 March 2022
    0 references
    card-based cryptographic protocols
    0 references
    multi-party secure computation
    0 references
    Boolean functions
    0 references
    half adder
    0 references
    symmetric functions
    0 references
    0 references
    0 references

    Identifiers