Securely Computing the n-Variable Equality Function with 2n Cards

11/14/2019
by   Suthee Ruangwises, et al.
0

Research on the area of secure multi-party computation using a deck of playing cards, often called card-based cryptograpy, started from the introduction of the "five-card trick" to compute the logical AND function by den Boar in 1989. Since then, many protocols with different properties to compute various functions have been developed. In this paper, we propose a new card-based protocol that securely computes the n-variable equality function using 2n cards. We also show that the same technique can be applied to compute any doubly symmetric function f: {0,1}^n →Z using 2n cards, and any symmetric function f: {0,1}^n →Z using 2n+2 cards.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
06/23/2023

The Landscape of Computing Symmetric n-Variable Functions with 2n Cards

Secure multi-party computation using a physical deck of cards, often cal...
research
11/05/2020

Using Five Cards to Encode Each Integer in ℤ/6ℤ

Research in secure multi-party computation using a deck of playing cards...
research
12/27/2013

The Garden Hose Complexity for the Equality Function

The garden hose complexity is a new communication complexity introduced ...
research
10/01/2018

AND Protocols Using Only Uniform Shuffles

Secure multi-party computation using a deck of playing cards has been a ...
research
12/27/2022

Information-theoretically secure equality-testing protocol with dispute resolution

There are often situations where two remote users each have data, and wi...
research
02/09/2022

Protocol Insecurity with Assertions

In the study of symbolic verification of cryptographic protocols, a cent...
research
08/26/2023

Solving the insecurity problem for assertions

In the symbolic verification of cryptographic protocols, a central probl...

Please sign up or login with your details

Forgot password? Click here to reset