Card-based cryptographic protocols using a minimal number of cards
Secure multiparty computation can be done with a deck of playing cards. For example, den
Boer (EUROCRYPT'89) devised his famous “five-card trick”, which is a secure two-party …
Boer (EUROCRYPT'89) devised his famous “five-card trick”, which is a secure two-party …
Secure implementations of a random bisection cut
By using a deck of cards, it is possible to realize a secure multiparty computation. In
particular, since a new shuffling operation, called a random bisection cut, was devised in …
particular, since a new shuffling operation, called a random bisection cut, was devised in …
Card-based cryptographic logical computations using private operations
H Ono, Y Manabe - New Generation Computing, 2021 - Springer
This paper proposes new card-based cryptographic protocols to calculate logic functions
with the minimum number of cards using private operations under the semi-honest model …
with the minimum number of cards using private operations under the semi-honest model …
Efficient card-based protocols for generating a hidden random permutation without fixed points
R Ishikawa, E Chida, T Mizuki - … 2015, Auckland, New Zealand, August 30 …, 2015 - Springer
Consider the holiday season, where there are n players who would like to exchange gifts.
That is, we would like to generate a random permutation having no fixed point. It is known …
That is, we would like to generate a random permutation having no fixed point. It is known …
Foundations for actively secure card-based cryptography
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …
secure multiparty computation using only a deck of playing cards. Many protocols as of yet …
Computational model of card-based cryptographic protocols and its applications
T Mizuki, H Shizuya - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Card-based protocols enable us to easily perform cryptographic tasks such as secure
multiparty computation using a deck of physical cards. Since the first card-based protocol …
multiparty computation using a deck of physical cards. Since the first card-based protocol …
NP-completeness and physical zero-knowledge proofs for sumplete, a puzzle generated by ChatGPT
K Hatsugai, S Ruangwises, K Asano, Y Abe - New Generation Computing, 2024 - Springer
Sumplete is a logic puzzle generated by ChatGPT in March 2023. The puzzle consists of a
rectangular grid, with each cell containing an integer. Each row and column also has an …
rectangular grid, with each cell containing an integer. Each row and column also has an …
Card-based cryptographic protocols with malicious players using private operations
Y Manabe, H Ono - New Generation Computing, 2022 - Springer
This paper shows new card-based cryptographic protocols using private operations that are
secure against malicious players. Physical cards are used in card-based cryptographic …
secure against malicious players. Physical cards are used in card-based cryptographic …
Securely computing the n-variable equality function with 2n cards
S Ruangwises, T Itoh - Theoretical Computer Science, 2021 - Elsevier
Research in the area of secure multi-party computation using a deck of playing cards, often
called card-based cryptography, started from the introduction of the five-card trick protocol to …
called card-based cryptography, started from the introduction of the five-card trick protocol to …
Secure computation for threshold functions with physical cards: power of private permutations
Card-based cryptography is a variant of multi-party computation using physical cards like
playing cards. There are two models on card-based cryptography, called public and private …
playing cards. There are two models on card-based cryptography, called public and private …