Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
From MaRDI portal
Publication:1705725
DOI10.1007/978-3-319-72089-0_9zbMath1417.94077OpenAlexW2770291594MaRDI QIDQ1705725
Mitsugu Iwamoto, Kazuo Ohta, Satoshi Shirouchi, Takeshi Nakai
Publication date: 16 March 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-72089-0_9
majority votingmulti-party computationlogic gatescard-based cryptographic protocolsprivate permutation
Voting theory (91B12) Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12)
Related Items (5)
Card-based cryptographic protocols with a standard deck of cards using private operations ⋮ Information leakage due to operative errors in card-based protocols ⋮ Another use of the five-card trick: card-minimal secure three-input majority function evaluation ⋮ Practical card-based implementations of Yao's millionaire protocol ⋮ Card-based cryptographic protocols for three-input functions using private operations
This page was built for publication: Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations