“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”