Foundations for actively secure card-based cryptography
From MaRDI portal
Publication:6487589
Recommendations
- A single shuffle is enough for secure card-based computation of any Boolean circuit
- How to implement a non-uniform or non-closed shuffle
- Card-based cryptographic protocols using a minimal number of cards
- The minimum number of cards in practical card-based protocols
- Card-based protocols using unequal division shuffles
Cited in
(25)- How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition
- scientific article; zbMATH DE number 1941259 (Why is no real title available?)
- A fast mental poker protocol
- Verifying the first nonzero term: physical ZKPs for ABC end view, Goishi Hiroi, and Toichika
- Practical construction for secure trick-taking games even with cards set aside
- Physical zero-knowledge proofs for Five Cells
- Physical zero-knowledge proof for ball sort puzzle
- Physical ZKP protocols for Nurimisaki and Kurodoko
- Interactive physical ZKP for connectivity: applications to Nurikabe and Hitori
- Actively revealing card attack on card-based protocols
- A single shuffle is enough for secure card-based computation of any Boolean circuit
- Practical card-based implementations of Yao's millionaire protocol
- Securely computing the \(n\)-variable equality function with \(2n\) cards
- An improved physical ZKP for Nonogram
- How to implement a non-uniform or non-closed shuffle
- Analysis of information leakage due to operative errors in card-based protocols
- Two standard decks of playing cards are sufficient for a ZKP for Sudoku
- Hide a liar: card-based ZKP protocol for Usowan
- Card-based ZKP protocol for Nurimisaki
- Who holds the best card? Secure communication of optimal secret bits
- Card-Based Secure Sorting Protocol
- Card-minimal protocols for three-input functions with standard playing cards
- Physically verifying the first nonzero term in a sequence: physical ZKPs for ABC End View and Goishi Hiroi
- scientific article; zbMATH DE number 5575521 (Why is no real title available?)
- Single-shuffle card-based protocols with six cards per gate
This page was built for publication: Foundations for actively secure card-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6487589)