The six-card trick: Secure computation of three-input equality

Kazumasa Shinagawa, Takaaki Mizuki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Secure computation enables parties having secret inputs to compute some function of their inputs without revealing inputs beyond the output. It is known that secure computation can be done by using a deck of physical cards. The five-card trick proposed by den Boer in 1989 is the first card-based protocol, which computes the logical AND function of two inputs. In this paper, we design a new protocol for the three-input equality function using six cards, which we call the six-card trick.

Original languageEnglish
Title of host publicationInformation Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers
EditorsKwangsu Lee
PublisherSpringer Verlag
Pages123-131
Number of pages9
ISBN (Print)9783030121457
DOIs
Publication statusPublished - 2019
Event21st International Conference on Information Security and Cryptology, ICISC 2018 - Seoul, Korea, Republic of
Duration: 2018 Nov 282018 Nov 30

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume11396 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other21st International Conference on Information Security and Cryptology, ICISC 2018
Country/TerritoryKorea, Republic of
CitySeoul
Period18/11/2818/11/30

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'The six-card trick: Secure computation of three-input equality'. Together they form a unique fingerprint.

Cite this