Card-based Protocols Using Triangle Cards
From MaRDI portal
Publication:3301023
DOI10.4230/LIPICS.FUN.2018.31zbMath1465.94087OpenAlexW2811257399MaRDI QIDQ3301023
Kazumasa Shinagawa, Takaaki Mizuki
Publication date: 11 August 2020
Full work available at URL: https://drops.dagstuhl.de/opus/volltexte/2018/8822/pdf/LIPIcs-FUN-2018-31.pdf/
card-based protocolssecure computationcryptography without computersecure matching problemthree-valued computationtriangle cards
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60)
Related Items (2)
Physical ZKP for connected spanning subgraph: applications to bridges puzzle and other problems ⋮ A secure three-input and protocol with a standard deck of minimal cards
Cites Work
- Secure multi-party computation using polarizing cards
- Fun with algorithms. 7th international conference, FUN 2014, Lipari Island, Sicily, Italy, July 1--3, 2014. Proceedings
- Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards
- More Efficient Match-Making and Satisfiability The Five Card Trick
- Six-Card Secure AND and Four-Card Secure XOR
This page was built for publication: Card-based Protocols Using Triangle Cards