Six-Card Secure AND and Four-Card Secure XOR

From MaRDI portal
Publication:5321728

DOI10.1007/978-3-642-02270-8_36zbMath1248.94083OpenAlexW1519482947MaRDI QIDQ5321728

Takaaki Mizuki, Hideaki Sone

Publication date: 14 July 2009

Published in: Frontiers in Algorithmics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-02270-8_36




Related Items (30)

Card-based cryptographic protocols with a standard deck of cards using private operationsHow to construct physical zero-knowledge proofs for puzzles with a ``single loop conditionAn improved physical ZKP for NonogramCard-based Protocols Using Triangle CardsEfficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed PointsInformation leakage due to operative errors in card-based protocolsMulti-party computation based on physical coinsPhysical ZKP protocols for Nurimisaki and KurodokoCommitted-format AND protocol using only random cutsCard-minimal protocols for three-input functions with standard playing cardsCard-minimal protocols for symmetric Boolean functions of more than seven inputsHide a liar: card-based ZKP protocol for UsowanCard-based zero-knowledge proof for the nearest neighbor property: zero-knowledge proof of ABC end viewActively revealing card attack on card-based protocolsSingle-shuffle card-based protocol with eight cards per gateCard-based ZKP protocol for NurimisakiAnother use of the five-card trick: card-minimal secure three-input majority function evaluationSecure computations through checking suits of playing cardsAn improved physical ZKP for nonogram and nonogram colorA card-minimal three-input and protocol using two shufflesCard-based zero-knowledge proof protocols for graph problems and their computational modelCard-based protocols for secure ranking computationsA single shuffle is enough for secure card-based computation of any Boolean circuitEfficient generation of a card-based uniformly distributed random derangementSecurely computing the \(n\)-variable equality function with \(2n\) cardsPractical card-based implementations of Yao's millionaire protocolCard-based protocols for securely computing the conjunction of multiple variablesCard-based protocols using unequal division shufflesCard-based cryptographic protocols for three-input functions using private operationsA secure three-input and protocol with a standard deck of minimal cards



Cites Work


This page was built for publication: Six-Card Secure AND and Four-Card Secure XOR