2004
DOI: 10.1007/978-3-540-27798-9_12
|View full text |Cite
|
Sign up to set email alerts
|

Necessary and Sufficient Numbers of Cards for the Transformation Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2008
2008
2014
2014

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…Some are interested in card deal protocols that allow players to agree on a common secret without a given eavesdropper being able to determine this secret value. This area of research is especially interesting in terms of possible applications to key generation; see, for example [10,11,12,13,14,17,16,2]. Others are concerned with analyzing variations of the problem using epistemic logic [18,19,20,7].…”
mentioning
confidence: 99%
“…Some are interested in card deal protocols that allow players to agree on a common secret without a given eavesdropper being able to determine this secret value. This area of research is especially interesting in terms of possible applications to key generation; see, for example [10,11,12,13,14,17,16,2]. Others are concerned with analyzing variations of the problem using epistemic logic [18,19,20,7].…”
mentioning
confidence: 99%
“…The Russian cards problem and variants of it has received a fair amount of attention in the literature, with focus ranging from possible applications to key generation [2,3,[15][16][17][18][19]21,23], to analyses based on epistemic logic [9][10][11][12], to card deals with more than three players [14,20]. Of more relevance to our work is the recent research that takes a combinatorial approach [1-4, 6, 27], on which we now focus.…”
Section: Discussion and Comparison With Related Workmentioning
confidence: 99%
“…The solution to the problem will imply a method to communicate information among parties in a distributed computing setting securely without using any encryption [15], [23], [20]. The analogy is that, the communicating agents and adversaries are modeled as players and the information to be communicated as the ownership of cards.…”
Section: Introductionmentioning
confidence: 99%
“…The analogy is that, the communicating agents and adversaries are modeled as players and the information to be communicated as the ownership of cards. It is generally believed that the above game gives unconditional security [11], [15], [23], [20].…”
Section: Introductionmentioning
confidence: 99%