2022
DOI: 10.1007/s00354-022-00153-7
|View full text |Cite
|
Sign up to set email alerts
|

Secure Computation for Threshold Functions with Physical Cards: Power of Private Permutations

Abstract: Card-based cryptography is a variant of multi-party computation using physical cards like playing cards. There are two models on card-based cryptography, called public and private models. The public model assumes that all operations are executed publicly, while the private model allows the players private operations called private permutations (PP, for short). Much of the existing card-based protocols were developed under the public model. Under the public model, 2n cards are necessary for every protocol with … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 14 publications
0
6
0
Order By: Relevance
“…The private-permutation-based model allows a player to express his/her input without using a commitment [13,17]. This is thanks to the fact that a player can express his/her input secretly by using a private permutation depend on the value.…”
Section: Encoding a Set With Cardsmentioning
confidence: 99%
“…The private-permutation-based model allows a player to express his/her input without using a commitment [13,17]. This is thanks to the fact that a player can express his/her input secretly by using a private permutation depend on the value.…”
Section: Encoding a Set With Cardsmentioning
confidence: 99%
“…This is thanks to the fact that players can express their inputs secretly by using private permutations depending on the values. Indeed, several works showed n-bit input protocols with less than 2n cards [2,3,20,21,25]. These results, however, are only for the two-colored card setting.…”
Section: Backgroundsmentioning
confidence: 99%
“…Although Alice uses a commitment to express her input, Bob expresses his input by a PP and does not use any additional cards. It is known that the lower bound can be broken for various protocols other than secure AND protocol using PPs [2,3,20,21,25].…”
Section: Private Modelmentioning
confidence: 99%
See 2 more Smart Citations