Card-Based Secure Ranking Computations

Ken Takashima, Yuta Abe, Tatsuya Sasaki, Daiki Miyahara, Kazumasa Shinagawa, Takaaki Mizuki, Hideaki Sone

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Citations (Scopus)


Consider a group of people who want to know the “rich list” among them, namely the ranking in terms of their total assets, without revealing any information about the actual value of their assets. This can be achieved by a “secure ranking computation,” which was first considered by Jiang and Gong (CT-RSA 2006); they constructed a secure ranking computation protocol based on a public-key cryptosystem. In this paper, instead of using a public-key cryptosystem, we use a deck of physical cards to provide secure ranking computation protocols. Therefore, our card-based protocols do not rely on computers, and they are simple and easy for humans to implement. Specifically, we design four protocols considering tradeoffs between the number of cards and the number of shuffles required to execute protocols. We also present a guide to choose an appropriate protocol according to the number of people participating in the protocol and the size of the input range.

Original languageEnglish
Title of host publicationCombinatorial Optimization and Applications - 13th International Conference, COCOA 2019, Proceedings
EditorsYingshu Li, Mihaela Cardei, Yan Huang
Number of pages12
ISBN (Print)9783030364113
Publication statusPublished - 2019
Event13th Annual International Conference on Combinatorial Optimization and Applications, COCOA 2019 - Xiamen, China
Duration: 2019 Dec 132019 Dec 15

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11949 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference13th Annual International Conference on Combinatorial Optimization and Applications, COCOA 2019


  • Card-based protocols
  • Deck of cards
  • Millionaire problem
  • Secure multiparty computations
  • Secure ranking computation

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)


Dive into the research topics of 'Card-Based Secure Ranking Computations'. Together they form a unique fingerprint.

Cite this