Card-based protocols for securely computing the conjunction of multiple variables
From MaRDI portal
Publication:5964073
DOI10.1016/J.TCS.2016.01.039zbMath1353.94063OpenAlexW2279961069MaRDI QIDQ5964073
Publication date: 26 February 2016
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.tcs.2016.01.039
card gamescard-based protocolscryptography without computersreal-life hands-on cryptographysecure multiparty computations
Related Items (7)
Card-based cryptographic protocols with a standard deck of cards using private operations ⋮ How to construct physical zero-knowledge proofs for puzzles with a ``single loop condition ⋮ Information leakage due to operative errors in card-based protocols ⋮ Multi-party computation based on physical coins ⋮ Card-minimal protocols for symmetric Boolean functions of more than seven inputs ⋮ A card-minimal three-input and protocol using two shuffles ⋮ Card-based cryptographic protocols for three-input functions using private operations
Cites Work
This page was built for publication: Card-based protocols for securely computing the conjunction of multiple variables