Zhao et al proposed an efficient mental poker protocol which did not require using a trusted third party (TTP). The protocol is efficient and suitable for any number of players but it introduces a security flaw. In this paper, we propose two mental poker protocols based on Zhao's previous work. The security flaw has been removed and the additional computing cost is small.6 page(s
Cryptosystems are one of the most important parts of secure online poker card games. However, there ...
As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, t...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Zhao et al proposed an efficient mental poker protocol which did not require using a Trusted Third P...
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encry...
We consider mental poker, i.e. a game of poker played without the aid of physical cards, most common...
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be f...
Abstract. On-line casinos have experienced a great expansion since the generalized use of Internet s...
Abstract There are many schemes proposed on mental poker so far. Most of them are based on the compo...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
The research on secure poker protocols without trusted intermediaries has a long history that dates ...
What can we expect from a poker protocol? How close to reality can we come? From the outset of this ...
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
Consultable des del TDXTítol obtingut de la portada digitalitzadaLes xarxes d'ordinadors i especialm...
International audienceTrick-Taking Games (TTGs) are card games in which each player plays one of his...
Cryptosystems are one of the most important parts of secure online poker card games. However, there ...
As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, t...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...
Zhao et al proposed an efficient mental poker protocol which did not require using a Trusted Third P...
An efficient and secure mental poker scheme is proposed in this paper. It is based on multiple encry...
We consider mental poker, i.e. a game of poker played without the aid of physical cards, most common...
In 2003, Zhao, Varadharajan and Mu proposed a mental poker protocol whose security was shown to be f...
Abstract. On-line casinos have experienced a great expansion since the generalized use of Internet s...
Abstract There are many schemes proposed on mental poker so far. Most of them are based on the compo...
InvestigatIng the capabilities of public key and related cryptographic techniques has recently becom...
The research on secure poker protocols without trusted intermediaries has a long history that dates ...
What can we expect from a poker protocol? How close to reality can we come? From the outset of this ...
Electronic commerce and the internet provide greater opportunities for companies and individual pers...
Consultable des del TDXTítol obtingut de la portada digitalitzadaLes xarxes d'ordinadors i especialm...
International audienceTrick-Taking Games (TTGs) are card games in which each player plays one of his...
Cryptosystems are one of the most important parts of secure online poker card games. However, there ...
As traditional oblivious transfer protocols are treated as cryptographic primitives in most cases, t...
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, an...