Exploring design and governance challenges in the development of privacy-preserving computation
Homomorphic encryption, secure multi-party computation, and differential privacy are part of
an emerging class of Privacy Enhancing Technologies which share a common promise: to …
an emerging class of Privacy Enhancing Technologies which share a common promise: to …
Card-based cryptographic logical computations using private operations
H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …
with the minimum number of cards using private operations under the semi-honest model …
[HTML][HTML] Practical card-based implementations of Yao's millionaire protocol
Yao's millionaire protocol enables Alice and Bob to know whether or not Bob is richer than
Alice by using a public-key cryptosystem without revealing the actual amounts of their …
Alice by using a public-key cryptosystem without revealing the actual amounts of their …
How to solve millionaires' problem with two kinds of cards
Card-based cryptography, introduced by den Boer aims to realize multiparty computation
(MPC) by using physical cards. We propose several efficient card-based protocols for the …
(MPC) by using physical cards. We propose several efficient card-based protocols for the …
Foundations for actively secure card-based cryptography
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …
The minimum number of cards in practical card-based protocols
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely
compute a logical AND of two private bits, using five playing cards of symbols ♡ and ♣ …
compute a logical AND of two private bits, using five playing cards of symbols ♡ and ♣ …
Computational model of card-based cryptographic protocols and its applications
T Mizuki, H Shizuya - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Card-based protocols enable us to easily perform cryptographic tasks such as secure
multiparty computation using a deck of physical cards. Since the first card-based protocol …
multiparty computation using a deck of physical cards. Since the first card-based protocol …
Card-based cryptographic protocols with malicious players using private operations
Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …
secure against malicious players. Physical cards are used in card-based cryptographic …
Secure computation for threshold functions with physical cards: power of private permutations
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …
playing cards. There are two models on card-based cryptography, called public and private …
Another use of the five-card trick: card-minimal secure three-input majority function evaluation
Starting from the five-card trick proposed by Den Boer (EUROCRYPT'89), many card-based
protocols performing secure multiparty computations with a deck of physical cards have …
protocols performing secure multiparty computations with a deck of physical cards have …