Card-based protocols allow to evaluate an arbitrary fixed Boolean function f on a hidden input to obtain a hidden output, without the executer learning anything about either of the two (e.g., [12]). We explore the case where f implements a universal function, i.e., f is given the encoding (P) of a program P and an input x and computes f(,x) = P(x). More concretely, we consider universal circuits, Turing machines, RAM machines, and branching programs, giving secure and conceptually simple card-based protocols in each case. We argue that card-based cryptography can be performed in a setting that is only very weakly interactive, which we call the surveillance model. Here, when Alice executes a protocol on the cards, the only task of Bob is to ...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
This paper studies the question of how to define, construct, and use obfuscators for probabilistic p...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function f on a hidden input to ob...
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using pri...
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Che...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables secure multiparty c...
Card-based cryptography, as first proposed by den Boer [den Boer, 1989], enables secure multiparty c...
Abstract. Secure multiparty computation can be done with a deck of playing cards. For example, den B...
AbstractA deck of cards can be used as a cryptographic tool (Advances in cryptology : CRYPTO’93, Lec...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party ...
International audienceTrick-taking games are traditional card games played all over the world. There...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROC...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
This paper studies the question of how to define, construct, and use obfuscators for probabilistic p...
Card-based protocols allow to evaluate an arbitrary fixed Boolean function f on a hidden input to ob...
This paper shows new card-based cryptographic protocols with the minimum number of rounds, using pri...
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Che...
The elegant “five-card trick” of den Boer (EUROCRYPT 1989) allows two players to securely compute a ...
Card-based cryptography, as first proposed by den Boer (EUROCRYPT 1989), enables secure multiparty c...
Card-based cryptography, as first proposed by den Boer [den Boer, 1989], enables secure multiparty c...
Abstract. Secure multiparty computation can be done with a deck of playing cards. For example, den B...
AbstractA deck of cards can be used as a cryptographic tool (Advances in cryptology : CRYPTO’93, Lec...
Card-based cryptography provides simple and practicable protocols for performing secure multi-party ...
International audienceTrick-taking games are traditional card games played all over the world. There...
The question of how to construct optimally efficient secure protocols is a central question in crypt...
Secure multiparty computation can be done with a deck of playing cards. For example, den Boer (EUROC...
Visualizing protocols is not only useful as a step towards understanding and ensuring security prope...
We introduce covert two-party computation, a stronger notion of security than standard secure twopar...
This paper studies the question of how to define, construct, and use obfuscators for probabilistic p...