Abstract
Assume that Alice, Bob, and Carol, each of whom privately holds a one-bit input, want to learn the output of some Boolean function, say the majority function, of their inputs without revealing more of their own secret inputs than necessary. In this paper, we show that such a secure three-input function evaluation can be performed with a deck of real cards; specifically, the three players can learn only the output of the function using eight physical cards - four black and four red cards - with identical backs.
Original language | English |
---|---|
Pages (from-to) | 1145-1152 |
Number of pages | 8 |
Journal | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
Volume | E98A |
Issue number | 6 |
DOIs | |
Publication status | Published - 2015 Jun 1 |
Keywords
- Card games
- Card-based protocols
- Cryptography without computers
- Secure computations
ASJC Scopus subject areas
- Signal Processing
- Computer Graphics and Computer-Aided Design
- Electrical and Electronic Engineering
- Applied Mathematics