Foundations for actively secure card-based cryptography
From MaRDI portal
Publication:6487589
DOI10.4230/LIPICS.FUN.2021.17zbMATH Open1516.94038MaRDI QIDQ6487589FDOQ6487589
Authors: Alexander K. Koch, Stefan Walzer
Publication date: 7 February 2023
Recommendations
- A single shuffle is enough for secure card-based computation of any Boolean circuit
- How to implement a non-uniform or non-closed shuffle
- Card-based cryptographic protocols using a minimal number of cards
- The minimum number of cards in practical card-based protocols
- Card-based protocols using unequal division shuffles
card shufflingsecure multiparty computationcard-based protocolscryptography without computersactive security
Cryptography (94A60) Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10)
Cited In (25)
- How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition
- Title not available (Why is that?)
- A fast mental poker protocol
- Verifying the first nonzero term: physical ZKPs for ABC end view, Goishi Hiroi, and Toichika
- Practical construction for secure trick-taking games even with cards set aside
- Physical zero-knowledge proofs for Five Cells
- Physical zero-knowledge proof for ball sort puzzle
- Physical ZKP protocols for Nurimisaki and Kurodoko
- Actively revealing card attack on card-based protocols
- Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori
- A single shuffle is enough for secure card-based computation of any Boolean circuit
- Practical card-based implementations of Yao's millionaire protocol
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- An improved physical ZKP for Nonogram
- How to implement a non-uniform or non-closed shuffle
- Analysis of information leakage due to operative errors in card-based protocols
- Two standard decks of playing cards are sufficient for a ZKP for Sudoku
- Hide a liar: card-based ZKP protocol for Usowan
- Card-based ZKP protocol for Nurimisaki
- Who holds the best card? Secure communication of optimal secret bits
- Card-Based Secure Sorting Protocol
- Card-minimal protocols for three-input functions with standard playing cards
- Physically verifying the first nonzero term in a sequence: physical ZKPs for ABC End View and Goishi Hiroi
- Single-shuffle card-based protocols with six cards per gate
- Title not available (Why is that?)
This page was built for publication: Foundations for actively secure card-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6487589)