Card-based protocol against actively revealing card attack
From MaRDI portal
Publication:6536365
DOI10.1007/978-3-030-34500-6_6zbMATH Open1540.68091MaRDI QIDQ6536365
Hideaki Sone, Takaaki Mizuki, Ken Takashima, Daiki Miyahara
Publication date: 19 April 2024
Modes of computation (nondeterministic, parallel, interactive, probabilistic, etc.) (68Q10) Cryptography (94A60)
Cites Work
- Secure multiparty computations without computers
- Analysis of information leakage due to operative errors in card-based protocols
- Card-Based Cryptographic Protocols Using a Minimal Number of Cards
- Efficient Card-Based Protocols for Generating a Hidden Random Permutation Without Fixed Points
- How to share a secret
- The Five-Card Trick Can Be Done with Four Cards
- More Efficient Match-Making and Satisfiability The Five Card Trick
- Six-Card Secure AND and Four-Card Secure XOR
This page was built for publication: Card-based protocol against actively revealing card attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6536365)