The six-card trick: secure computation of three-input equality
From MaRDI portal
Publication:1736040
DOI10.1007/978-3-030-12146-4_8zbMATH Open1433.94095OpenAlexW2913052448MaRDI QIDQ1736040FDOQ1736040
Authors: Kazumasa Shinagawa, Takaaki Mizuki
Publication date: 29 March 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-12146-4_8
Recommendations
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- Card-based protocols for securely computing the conjunction of multiple variables
- The five-card trick can be done with four cards
- Card-minimal protocols for three-input functions with standard playing cards
- Card-based cryptographic protocols using a minimal number of cards
Cited In (10)
- Card-based protocols using triangle cards
- Single-shuffle card-based protocol with eight cards per gate
- Card-based cryptographic protocols for three-input functions using private operations
- The five-card trick can be done with four cards
- The landscape of computing symmetric \(n\)-variable functions with \(2n\) cards
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- Another use of the five-card trick: card-minimal secure three-input majority function evaluation
- Card-minimal protocols for symmetric Boolean functions of more than seven inputs
- Card-based protocol against actively revealing card attack
- Card-based cryptographic protocols with a standard deck of cards using private operations
This page was built for publication: The six-card trick: secure computation of three-input equality
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1736040)