Card-based cryptographic protocols using a minimal number of cards

A Koch, S Walzer, K Härtel - International Conference on the Theory and …, 2015 - Springer
Secure multiparty computation can be done with a deck of playing cards. For example, den
Boer (EUROCRYPT'89) devised his famous “five-card trick”, which is a secure two-party …

Secure implementations of a random bisection cut

I Ueda, D Miyahara, A Nishimura, Y Hayashi… - International journal of …, 2020 - Springer
By using a deck of cards, it is possible to realize a secure multiparty computation. In
particular, since a new shuffling operation, called a random bisection cut, was devised in …

Card-based cryptographic logical computations using private operations

H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …

Efficient card-based protocols for generating a hidden random permutation without fixed points

R Ishikawa, E Chida, T Mizuki - … 2015, Auckland, New Zealand, August 30 …, 2015 - Springer
Consider the holiday season, where there are n players who would like to exchange gifts.
That is, we would like to generate a random permutation having no fixed point. It is known …

Foundations for actively secure card-based cryptography

A Koch, S Walzer - Cryptology ePrint Archive, 2017 - eprint.iacr.org
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …

Computational model of card-based cryptographic protocols and its applications

T Mizuki, H Shizuya - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Card-based protocols enable us to easily perform cryptographic tasks such as secure
multiparty computation using a deck of physical cards. Since the first card-based protocol …

NP-completeness and physical zero-knowledge proofs for sumplete, a puzzle generated by ChatGPT

K Hatsugai, S Ruangwises, K Asano, Y Abe - New Generation Computing, 2024 - Springer
Sumplete is a logic puzzle generated by ChatGPT in March 2023. The puzzle consists of a
rectangular grid, with each cell containing an integer. Each row and column also has an …

Card-based cryptographic protocols with malicious players using private operations

Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …

Securely computing the n-variable equality function with 2n cards

S Ruangwises, T Itoh - Theoretical Computer Science, 2021 - Elsevier
Research in the area of secure multi-party computation using a deck of playing cards, often
called card-based cryptography, started from the introduction of the five-card trick protocol to …

Secure computation for threshold functions with physical cards: power of private permutations

T Nakai, S Shirouchi, Y Tokushige, M Iwamoto… - New Generation …, 2022 - Springer
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …