2019
DOI: 10.1007/978-3-030-31500-9_10
|View full text |Cite
|
Sign up to set email alerts
|

Card-Based Cryptographic Protocols with the Minimum Number of Rounds Using Private Operations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 34 publications
0
3
0
Order By: Relevance
“…All the protocols mentioned thus far in this paper can be executed publicly: every operation by players is supposed to be conducted with all eyes fixed on how the cards are manipulated. In contrast, there is another model wherein players are allowed to use "private" operations: it is known that such a somewhat strong assumption results in protocols with fewer cards, e.g., [11,12,14,15,20].…”
Section: Resultsmentioning
confidence: 99%
“…All the protocols mentioned thus far in this paper can be executed publicly: every operation by players is supposed to be conducted with all eyes fixed on how the cards are manipulated. In contrast, there is another model wherein players are allowed to use "private" operations: it is known that such a somewhat strong assumption results in protocols with fewer cards, e.g., [11,12,14,15,20].…”
Section: Resultsmentioning
confidence: 99%
“…Intriguing future work involves applying our new criteria to other existing protocols using different types of cards (e.g., [21,22]) or those using private operations (e.g., [14,[17][18][19]). Table 5 The experimental result of measuring the execution time of adding, turning over, and permuting cards, which was mainly conducted by the second author, who is familiar with playing cards.…”
Section: Resultsmentioning
confidence: 99%
“…The number of rounds was considered as the time complexity of the protocol with private operations. The definition of rounds is as follows [39]. The first round is (possibly parallel) local executions by each player using the cards initially given to each player.…”
Section: Primitive 3 (Private Reveal) a Player Privately Opens A Given Committed Bit The Player Does Not Disclose The Value To The Other mentioning
confidence: 99%