Card-based protocols for any Boolean function
From MaRDI portal
Publication:2948458
DOI10.1007/978-3-319-17142-5_11zbMATH Open1353.94067OpenAlexW783329724MaRDI QIDQ2948458FDOQ2948458
Authors: Takuya Nishida, Takaaki Mizuki, Hideaki Sone, Yu-ichi Hayashi
Publication date: 30 September 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-319-17142-5_11
Recommendations
Cited In (27)
- Securely computing XOR with 10 cards
- Card-based protocols using triangle cards
- Single-shuffle card-based protocol with eight cards per gate
- Card-based cryptographic protocols for three-input functions using private operations
- A secure three-input and protocol with a standard deck of minimal cards
- Physical ZKP protocols for Nurimisaki and Kurodoko
- Efficient card-based protocols for generating a hidden random permutation without fixed points
- Card-based cryptographic protocols using a minimal number of cards
- Secure computation of any Boolean function based on any deck of cards
- Efficient private PEZ protocols for symmetric functions
- Card-based cryptography meets formal verification
- A single shuffle is enough for secure card-based computation of any Boolean circuit
- The landscape of computing symmetric \(n\)-variable functions with \(2n\) cards
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- Analysis of information leakage due to operative errors in card-based protocols
- Card-based protocols using unequal division shuffles
- Analyzing execution time of card-based protocols
- Secure multi-party computation using polarizing cards
- Card-minimal protocols for three-input functions with standard playing cards
- Necessary and sufficient numbers of cards for securely computing two-bit output functions
- Card-minimal protocols for symmetric Boolean functions of more than seven inputs
- Multi-party computation based on physical coins
- Six-Card Secure AND and Four-Card Secure XOR
- Secure Multiparty Computations Using the 15 Puzzle
- Single-shuffle card-based protocols with six cards per gate
- Multi-party computation with small shuffle complexity using regular polygon cards
- Card-based cryptographic protocols with a standard deck of cards using private operations
This page was built for publication: Card-based protocols for any Boolean function
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2948458)