Third International Conference on Information Technology: New Generations (ITNG'06) 2006
DOI: 10.1109/itng.2006.103
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of a Repaired Mental Poker Protocol

Abstract: In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be flawed in 2004: any player (or any outsider knowing the deck coding) is able to decrypt encrypted cards without knowing the encryption key. In 2005, the first two authors published a repaired version of this TTP-free mental poker protocol. We show here that this second version is also flawed: the first player can find all cleartexts of the final encrypted shuffled deck of cards. Both protocols are similar to Sham… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
7
0

Year Published

2008
2008
2019
2019

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 8 publications
0
7
0
Order By: Relevance
“…Then, Zhao and Vadaharajan introduced in 2005 [10] a revised version of the system. But, Castella and Roca in 2006 [11] indicated that the revised version was insecure and resembled the RSA system. In 2008, Chun and Chao [12] introduced a poker protocol to accomplish the distribution of encryption, detection and verification in an entirely distributed manner.…”
Section: Related Workmentioning
confidence: 99%
“…Then, Zhao and Vadaharajan introduced in 2005 [10] a revised version of the system. But, Castella and Roca in 2006 [11] indicated that the revised version was insecure and resembled the RSA system. In 2008, Chun and Chao [12] introduced a poker protocol to accomplish the distribution of encryption, detection and verification in an entirely distributed manner.…”
Section: Related Workmentioning
confidence: 99%
“…Zhao et al [14] revised the original scheme to remove the security aw pointed out in [3]. However, the revised version introduced another security aw pointed out in [4]. Soo et al [11] proposed a scheme based on optimized arbitrarysized Benes permutation networks to shuf e the deck.…”
Section: Related Workmentioning
confidence: 99%
“…Solving this issue has inspired a long line of research on mental poker, i.e. playing poker among distrustful players without relying on a trusted third party [3,38,19,20,31,28,17,24,37,30,33,32]. Nevertheless, the aforementioned mental poker protocols did not provide formal security definitions or proofs.…”
Section: Introductionmentioning
confidence: 99%
“…In fact, concrete flaws in the protocols of [38,37] (resp. [3,17]) have been identified in [30] (resp. [22]).…”
Section: Introductionmentioning
confidence: 99%