Secure computations through checking suits of playing cards
From MaRDI portal
Publication:6166876
DOI10.1007/978-3-031-20796-9_9zbMATH Open1525.94046MaRDI QIDQ6166876FDOQ6166876
Authors: Daiki Miyahara, Takaaki Mizuki
Publication date: 3 August 2023
Published in: Frontiers of Algorithmic Wisdom (Search for Journal in Brave)
Recommendations
- Secure computation of any Boolean function based on any deck of cards
- Efficient and secure multiparty computations using a standard deck of playing cards
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- Necessary and sufficient numbers of cards for securely computing two-bit output functions
- Card-based protocols for securely computing the conjunction of multiple variables
- A secure additive protocol for card players
- Card-based cryptographic protocols with a standard deck of cards using private operations
- Bounds on secret key exchange using a random deal of cards
- Securely computing XOR with 10 cards
Cites Work
- The minimum number of cards in practical card-based protocols
- Card-based cryptography meets formal verification
- Efficient card-based zero-knowledge proof for Sudoku
- A single shuffle is enough for secure card-based computation of any Boolean circuit
- Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles
- Practical card-based implementations of Yao's millionaire protocol
- Card-based cryptographic protocols using a minimal number of cards
- Efficient card-based protocols for generating a hidden random permutation without fixed points
- Title not available (Why is that?)
- The five-card trick can be done with four cards
- More Efficient Match-Making and Satisfiability The Five Card Trick
- Six-Card Secure AND and Four-Card Secure XOR
- How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition
- Public-PEZ Cryptography
- Efficient and secure multiparty computations using a standard deck of playing cards
- Card-based cryptographic protocols with a standard deck of cards using private operations
- A secure three-input and protocol with a standard deck of minimal cards
- Title not available (Why is that?)
- Two standard decks of playing cards are sufficient for a ZKP for Sudoku
- Physical zero-knowledge proof and NP-completeness proof of Suguru puzzle
- Information leakage due to operative errors in card-based protocols
- Card-based zero-knowledge proof protocols for graph problems and their computational model
- Physical zero-knowledge proof for ripple effect
- Card-minimal protocols for three-input functions with standard playing cards
Cited In (7)
- Computations with a deck of cards
- Practical construction for secure trick-taking games even with cards set aside
- Secure computation of any Boolean function based on any deck of cards
- A secure additive protocol for card players
- Card-based secure ranking computations
- Card-based protocol against actively revealing card attack
- Title not available (Why is that?)
This page was built for publication: Secure computations through checking suits of playing cards
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6166876)