2015
DOI: 10.1007/978-3-662-48797-6_32
|View full text |Cite
|
Sign up to set email alerts
|

Card-Based Cryptographic Protocols Using a Minimal Number of Cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
54
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(54 citation statements)
references
References 9 publications
0
54
0
Order By: Relevance
“…Previously, the bounds in Table 2 were all tight except in the third row (restart-free Las Vegas, uniform) where the trivial lower bound was four (since we need at least two cards for a commitment of each player's bit) but the upper bound was five (protocol of Abe et al [1]), and the sixth row (finite, uniform) where the lower bound was five [5] but the upper bound was six (protocol of Mizuki and Sone [9]).…”
Section: Our Contributionmentioning
confidence: 98%
See 2 more Smart Citations
“…Previously, the bounds in Table 2 were all tight except in the third row (restart-free Las Vegas, uniform) where the trivial lower bound was four (since we need at least two cards for a commitment of each player's bit) but the upper bound was five (protocol of Abe et al [1]), and the sixth row (finite, uniform) where the lower bound was five [5] but the upper bound was six (protocol of Mizuki and Sone [9]).…”
Section: Our Contributionmentioning
confidence: 98%
“…In this paper we use a KWH-tree, a tool developed by Koch et al [5], to help verify the correctness and security of the protocol. X 00 , X 01 , X 10 , and X 11 denote the probabilities of (a, b) being (0, 0), (0, 1), (1, 0), and (1, 1), respectively, with shorthands X 0 = X 00 + X 01 + X 10 and X 1 = X 11 being used.…”
Section: Proof Of Correctness and Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…We also use x to denote not only an element in Z 4 but also the front side card, as long as it is clear from the context. The important property is that [2]] and [ [3]] have the identical face ■ .…”
Section: Regular Polygon Cardsmentioning
confidence: 99%
“…(The Five-Card Trick [1] does not enjoy this property since it outputs the value of x ∧ y.) The state-of-the-art protocols are summarized as follows: In the above encoding scheme ( ♣ ♡ = 0, ♡ ♣ = 1), Mizuki and Sone [9] constructed a six-card COPY protocol and a four-card XOR protocol, and Koch [9], and Koch, Walzer and Härtel [4] constructed a five-card AND protocol; see Table 1. There are a five-card COPY protocol [13] and a four-card AND protocol [4], however, these protocols are Las-Vegas protocols, i.e., their computational times are finite only in expectation.…”
Section: Introductionmentioning
confidence: 99%