Information leakage due to operative errors in card-based protocols
From MaRDI portal
Publication:2672274
DOI10.1016/J.IC.2022.104910zbMath1504.68073OpenAlexW4223963467MaRDI QIDQ2672274
Publication date: 8 June 2022
Published in: Information and Computation (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ic.2022.104910
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Related Items (4)
Card-minimal protocols for three-input functions with standard playing cards ⋮ Card-minimal protocols for symmetric Boolean functions of more than seven inputs ⋮ Physical zero-knowledge proof protocol for Topswops ⋮ Secure computations through checking suits of playing cards
Cites Work
- Analysis of information leakage due to operative errors in card-based protocols
- Four cards are sufficient for a card-based three-input voting protocol utilizing private permutations
- Card-Based Cryptographic Protocols Using a Minimal Number of Cards
- Six-Card Secure AND and Four-Card Secure XOR
- Card-based protocols for securely computing the conjunction of multiple variables
This page was built for publication: Information leakage due to operative errors in card-based protocols