Securely computing the three-input majority function with eight cards

Takuya Nishida, Takaaki Mizuki, Hideaki Sone

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Citations (Scopus)

Abstract

Assume that Alice, Bob and Carol, each of whom privately holds a one-bit input, want to learn the value of the majority function of their inputs without revealing more of their own secret inputs than is necessary. In this paper, we show that such a secure majority computation can be done with a deck of real cards; specifically, the three players can learn only the majority of their inputs using eight physical cards-four black cards and four red cards - with identical backs.

Original languageEnglish
Title of host publicationTheory and Practice of Natural Computing - Second International Conference, TPNC 2013, Proceedings
Pages193-204
Number of pages12
DOIs
Publication statusPublished - 2013 Dec 1
Event2nd International Conference on the Theory and Practice of Natural Computing, TPNC 2013 - Caceres, Spain
Duration: 2013 Dec 32013 Dec 5

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8273 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other2nd International Conference on the Theory and Practice of Natural Computing, TPNC 2013
CountrySpain
CityCaceres
Period13/12/313/12/5

Keywords

  • Card games
  • Card-based protocols
  • Cryptography without computers
  • Recreational cryptography
  • Secure computations

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Securely computing the three-input majority function with eight cards'. Together they form a unique fingerprint.

  • Cite this

    Nishida, T., Mizuki, T., & Sone, H. (2013). Securely computing the three-input majority function with eight cards. In Theory and Practice of Natural Computing - Second International Conference, TPNC 2013, Proceedings (pp. 193-204). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 8273 LNCS). https://doi.org/10.1007/978-3-642-45008-2_16