2012
DOI: 10.1007/978-3-642-34961-4_36
|View full text |Cite
|
Sign up to set email alerts
|

The Five-Card Trick Can Be Done with Four Cards

Abstract: Abstract. The "five-card trick" invented by Boer allows Alice and Bob to securely compute the AND function of their secret inputs using five cards-three black cards and two red cards-with identical backs. This paper shows that such a secure computation can be done with only four cards. Specifically, we give a protocol to achieve a secure computation of AND using only four cards-two black and two red. Our protocol is optimal in the sense that the number of required cards is minimum.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

2
8

Authors

Journals

citations
Cited by 73 publications
(19 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…On the other hand, PP enables players' malicious behaviors. 4 Our protocols suppose the semi-honest model, which assumes all players follow the protocols.…”
Section: Private Modelmentioning
confidence: 99%
“…On the other hand, PP enables players' malicious behaviors. 4 Our protocols suppose the semi-honest model, which assumes all players follow the protocols.…”
Section: Private Modelmentioning
confidence: 99%
“…Mizuki et al [7] later improved the five-card trick protocol so that it requires only four cards instead of five. While both protocols are useful, the format of the output value a ∧ b is different from the format of the inputs a and b (♣♥ for 0 and ♥♣ for 1).…”
Section: The Five-card Trickmentioning
confidence: 99%
“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”
Section: Introductionmentioning
confidence: 99%