2022
DOI: 10.1007/s00354-021-00148-w
|View full text |Cite
|
Sign up to set email alerts
|

Card-Based Cryptographic Protocols with Malicious Players Using Private Operations

Abstract: This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards are used in card-based cryptographic protocols instead of computers. Operations that a player executes in a place where the other players cannot see are called private operations. Using several private operations, calculations of two variable Boolean functions and copy operations were realized with the minimum number of cards. Though private operations are very powerful in … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(1 citation statement)
references
References 61 publications
(59 reference statements)
0
1
0
Order By: Relevance
“…โ€  โ€  There are studies to prevent and detect malicious behaviors using additional tools or introducing a player who monitors the operations (See, e.g., [16]- [18]). ๐‘› is not a generalized protocol of MAJ W 3 in the sense that MAJ A 3 is not equivalent to MAJ W 3 and actually does not work well (See Section 3.2.2 for details).…”
Section: ]mentioning
confidence: 99%
“…โ€  โ€  There are studies to prevent and detect malicious behaviors using additional tools or introducing a player who monitors the operations (See, e.g., [16]- [18]). ๐‘› is not a generalized protocol of MAJ W 3 in the sense that MAJ A 3 is not equivalent to MAJ W 3 and actually does not work well (See Section 3.2.2 for details).…”
Section: ]mentioning
confidence: 99%