Given an interpreted system, we investigate ways for two agents to communicate secrets by public announcements. For card deals, the problem to keep all of your cards a secret (i) can be distinguished from the problem to keep some of your cards a secret (ii). For (i): we characterize a novel class of protocols consisting of two announcements, for the case where two agents both hold n cards and the third agent a single card; the communicating agents announce the sum of their cards modulo 2n+1. For (ii): we show that the problem to keep at least one of your cards a secret is equivalent to the problem to keep your local state (hand of cards) a secret; we provide a large class of card deals for which exchange of secrets is possible; and ...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to...
When communicating using an unconditionally secure protocol, a sender and receiver is able to transm...
Abstract Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a ...
In the Russian cards problem, a group of communicating agents and an eavesdropper, Eve, draw cards f...
In the generalized Russian cards problem, Alice, Bob and Cath draw a, b and c cards, respectively, ...
In the Russian cards problem, Alice, Bob and Cath draw a, b and c cards, respectively, from a public...
AbstractWe implement a specific protocol for bit exchange among card-playing agents in three differe...
A protocol defines a structured conversation aimed at exchanging information between two or more par...
In the generalized Russian cards problem, the three players Alice, Bob and Cath draw a, b and c card...
We consider the generic problem of Secure Aggregation of Distributed Information (SADI), where sever...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
Investigating the capabilities of public key and related cryptographic techniques has recently becom...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to...
When communicating using an unconditionally secure protocol, a sender and receiver is able to transm...
Abstract Consider three players Alice, Bob and Cath who hold a, b and c cards, respectively, from a ...
In the Russian cards problem, a group of communicating agents and an eavesdropper, Eve, draw cards f...
In the generalized Russian cards problem, Alice, Bob and Cath draw a, b and c cards, respectively, ...
In the Russian cards problem, Alice, Bob and Cath draw a, b and c cards, respectively, from a public...
AbstractWe implement a specific protocol for bit exchange among card-playing agents in three differe...
A protocol defines a structured conversation aimed at exchanging information between two or more par...
In the generalized Russian cards problem, the three players Alice, Bob and Cath draw a, b and c card...
We consider the generic problem of Secure Aggregation of Distributed Information (SADI), where sever...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
Investigating the capabilities of public key and related cryptographic techniques has recently becom...
Shamir’s (n, k) threshold secret sharing is an important component of several cryptographic protocol...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
The cryptogenography problem, introduced by Brody, Jakobsen, Scheder, and Winkler (ITCS 2014), is to...