What can we expect from a poker protocol? How close to reality can we come? From the outset of this research, we realized that a cryptographic protocol could achieve more security than its real life counterpart (with physical cards). But every protocol proposed until now was far from offering all the possibilities of a real deck of cards or could not acheive the full securit
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
Poker is an interesting test-bed for artificial intelligence research. It is a game of imperfect inf...
We consider mental poker, i.e. a game of poker played without the aid of physical cards, most common...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encry...
The research on secure poker protocols without trusted intermediaries has a long history that dates ...
Zhao et al proposed an efficient mental poker protocol which did not require using a trusted third p...
Investigating the capabilities of public key and related cryptographic techniques has recently becom...
We present efficient protocols for amortized secure multiparty computation with penalties and secure...
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be f...
Many cryptographic protocols secure against malicious players use specially designed cryptographic ...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
The goal of secure multiparty computation is to transform a given protocol involving a trusted party...
In today’s world, Artificial Intelligence exists in every game we play. It was a challenge for compu...
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
Poker is an interesting test-bed for artificial intelligence research. It is a game of imperfect inf...
We consider mental poker, i.e. a game of poker played without the aid of physical cards, most common...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encry...
The research on secure poker protocols without trusted intermediaries has a long history that dates ...
Zhao et al proposed an efficient mental poker protocol which did not require using a trusted third p...
Investigating the capabilities of public key and related cryptographic techniques has recently becom...
We present efficient protocols for amortized secure multiparty computation with penalties and secure...
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be f...
Many cryptographic protocols secure against malicious players use specially designed cryptographic ...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
The goal of secure multiparty computation is to transform a given protocol involving a trusted party...
In today’s world, Artificial Intelligence exists in every game we play. It was a challenge for compu...
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
Poker is an interesting test-bed for artificial intelligence research. It is a game of imperfect inf...