TY - GEN
T1 - Six-card secure and AND four-card secure XOR
AU - Mizuki, Takaaki
AU - Sone, Hideaki
PY - 2009
Y1 - 2009
N2 - There have existed several "card-based protocols" for secure computations of a Boolean function such as AND and XOR. The best result currently known is that AND and XOR can be securely computed using 8 cards and 10 cards, respectively. In this paper, we improve the result: we design a 6-card AND protocol and a 4-card XOR protocol. Thus, this paper succeeds in reducing the number of required cards for secure computations.
AB - There have existed several "card-based protocols" for secure computations of a Boolean function such as AND and XOR. The best result currently known is that AND and XOR can be securely computed using 8 cards and 10 cards, respectively. In this paper, we improve the result: we design a 6-card AND protocol and a 4-card XOR protocol. Thus, this paper succeeds in reducing the number of required cards for secure computations.
UR - http://www.scopus.com/inward/record.url?scp=70350666768&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=70350666768&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-02270-8_36
DO - 10.1007/978-3-642-02270-8_36
M3 - Conference contribution
AN - SCOPUS:70350666768
SN - 3642022693
SN - 9783642022692
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 358
EP - 369
BT - Frontiers in Algorithmics - Third International Workshop, FAW 2009, Proceedings
T2 - 3rd International Frontiers of Algorithmics Workshop, FAW 2009
Y2 - 20 June 2009 through 23 June 2009
ER -