Card-based protocols for securely computing the conjunction of multiple variables
Theor. Comput. Sci., Volume 622, 2016, Pages 34-44.
Consider a deck of real cards with faces that are either black or red and backs that are all identical. Then, using two cards of different colors, we can commit a secret bit to a pair of face-down cards so that its order (i.e., black to red, or red to black) represents the value of the bit. Given such two commitments (consisting of four f...More
Full Text (Upload PDF)
PPT (Upload PPT)