Card-based cryptography provides simple and practicable protocols for performing secure multi-party computation (MPC) with just a deck of cards. For the sake of simplicity, this is often done using cards with only two symbols, e.g., ♣ and ♡. Within this paper, we target the setting where all cards carry distinct symbols, catering for use-cases with commonly available standard decks and a weaker indistinguishability assumption. As of yet, the literature provides for only three protocols and no proofs for non-trivial lower bounds on the number of cards. As such complex proofs (handling very large combinatorial state spaces) tend to be involved and error-prone, we propose using formal verification for finding protocols and proving lower ...
Cryptographic protocols enable participating parties to compute any function of their inputs without...
International audienceTrick-taking games are traditional card games played all over the world. There...
In Cornell\u27s “CS4830: Introduction to Cryptography” offered Fall 2015, students are asked to devi...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party ...
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROC...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
Abstract. Secure multiparty computation can be done with a deck of playing cards. For example, den B...
AbstractA deck of cards can be used as a cryptographic tool (Advances in cryptology : CRYPTO’93, Lec...
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Che...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using pri...
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables secure multiparty c...
Card-based cryptography, as first proposed by den Boer [den Boer, 1989], enables secure multiparty c...
AbstractWe implement a specific protocol for bit exchange among card-playing agents in three differe...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
Cryptographic protocols enable participating parties to compute any function of their inputs without...
International audienceTrick-taking games are traditional card games played all over the world. There...
In Cornell\u27s “CS4830: Introduction to Cryptography” offered Fall 2015, students are asked to devi...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party ...
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROC...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
Abstract. Secure multiparty computation can be done with a deck of playing cards. For example, den B...
AbstractA deck of cards can be used as a cryptographic tool (Advances in cryptology : CRYPTO’93, Lec...
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Che...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function on a hidden input to obt...
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using pri...
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables secure multiparty c...
Card-based cryptography, as first proposed by den Boer [den Boer, 1989], enables secure multiparty c...
AbstractWe implement a specific protocol for bit exchange among card-playing agents in three differe...
While many cryptographic protocols for card games have been proposed, all of them focus on card game...
Cryptographic protocols enable participating parties to compute any function of their inputs without...
International audienceTrick-taking games are traditional card games played all over the world. There...
In Cornell\u27s “CS4830: Introduction to Cryptography” offered Fall 2015, students are asked to devi...