2018
DOI: 10.1587/transfun.e101.a.1503
|View full text |Cite
|
Sign up to set email alerts
|

Toward Finite-Runtime Card-Based Protocol for Generating a Hidden Random Permutation without Fixed Points

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…No player can prepare the same envelopes in his/her pocket and exchange them for the envelopes used in the protocol. Such envelopes are used in some cardbased protocols [8,45,58,63].…”
Section: Envelopesmentioning
confidence: 99%
See 2 more Smart Citations
“…No player can prepare the same envelopes in his/her pocket and exchange them for the envelopes used in the protocol. Such envelopes are used in some cardbased protocols [8,45,58,63].…”
Section: Envelopesmentioning
confidence: 99%
“…den Boer [2] first showed a five-card protocol to securely calculate logical AND of two inputs. Since then, many protocols have been proposed to realize primitives to calculate any logical functions [14,18,24,37,42,48,49,62,63] and specific computations such as a specific class of logical functions [1,7,13,19,23,25,31,33,43,46,54,58,61,68], universal computation such as Turing machines [6,16], millionaires' problem [27,40,47], voting [32,41,44,69,70], random permutation [8,10,11,39], grouping [9], ranking [66], lottery [64], proof of knowledge of a puzzle solution [3, 5, 12, 21, 26, 28, 29, 50-53, 55-57, 59], and so on. This paper considers calculations of logical functions and a copy operation under the malicious model since any logical function can be realized with a combination of these calculations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2018, Hashimoto et al [4] proposed the first finite-runtime protocol for generating a uniformly distributed random derangement by using the properties of the types of permutations. While their proposed protocol is innovative, its feasibility to be performed by humans has not been studied, as it requires a shuffle operation with a nonuniform probability distribution.…”
Section: Introductionmentioning
confidence: 99%
“…den Boer [2] first showed a five-card protocol to securely calculate AND of two inputs. Since then, many protocols have been proposed to calculate logical functions [4,5,21,24,27,30,40,44,47] and specific computations such as computations on three inputs [32,33,43], calculation of symmetric functions [41], millionaires' problem [18,29,37], voting [22,28,51], random permutation [6,8,9], grouping [7], matching [17], ranking [48], zero-knowledge proof of puzzle solutions [3,16,19,42] and so on. Most of the protocols assume a semi-honest model, that is, players obey the rule of the protocol but try to obtain secret values.…”
Section: Introductionmentioning
confidence: 99%