Card-based protocols using triangle cards

Kazumasa Shinagawa, Takaaki Mizuki

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

Suppose that three boys and three girls attend a party. Each boy and girl have a crush on exactly one of the three girls and three boys, respectively. The following dilemma arises: On one hand, each person thinks that if there is a mutual affection between a girl and boy, the couple should go on a date the next day. On the other hand, everyone wants to avoid the possible embarrassing situation in which their heart is broken "publicly." In this paper, we solve the dilemma using novel cards called triangle cards. The number of cards required is only six, which is minimal in the case where each player commits their input at the beginning of the protocol. We also construct multiplication and addition protocols based on triangle cards. Combining these protocols, we can securely compute any function f: {0, 1, 2}n → {0, 1, 2}.

Original languageEnglish
Title of host publication9th International Conference on Fun with Algorithms, FUN 2018
EditorsGiuseppe Prencipe, Hiro Ito, Stefano Leonardi, Linda Pagli
PublisherSchloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing
Pages311-3113
Number of pages2803
ISBN (Electronic)9783959770675
DOIs
Publication statusPublished - 2018 Jun 1
Event9th International Conference on Fun with Algorithms, FUN 2018 - La Maddalena Island, Italy
Duration: 2018 Jun 132018 Jun 15

Publication series

NameLeibniz International Proceedings in Informatics, LIPIcs
Volume100
ISSN (Print)1868-8969

Other

Other9th International Conference on Fun with Algorithms, FUN 2018
Country/TerritoryItaly
CityLa Maddalena Island
Period18/6/1318/6/15

Keywords

  • Card-based protocols
  • Cryptography without computer
  • Secure computation
  • Secure matching problem
  • Three-valued computation
  • Triangle cards

ASJC Scopus subject areas

  • Software

Fingerprint

Dive into the research topics of 'Card-based protocols using triangle cards'. Together they form a unique fingerprint.

Cite this