## Abstract

There exist several protocols by which Alice and Bob can securely compute some function using a deck of cards. The most efficient protocol currently known is given by Stiglic: his elaborate but simple protocol can allow Alice and Bob to securely compute the AND function using only 8 cards. The existence of the AND protocol implies that one can design a protocol which securely computes any Boolean function: for example, the XOR function can be securely computed using 12 cards, although the computation requires a relatively large task such as copying the input and repeating the AND protocol. This paper addresses efficient secure computation of XOR, and gives a simple protocol which securely computes the XOR function using only 10 cards.

Original language | English |
---|---|

Pages (from-to) | 279-293 |

Number of pages | 15 |

Journal | Australasian Journal of Combinatorics |

Volume | 36 |

Publication status | Published - 2006 Dec 1 |

## ASJC Scopus subject areas

- Discrete Mathematics and Combinatorics