Card-based protocols for securely computing the conjunction of multiple variables

Theor. Comput. Sci., Volume 622, 2016, Pages 34-44.

Cited by: 11|Bibtex|Views3|Links
EI

Abstract:

Consider a deck of real cards with faces that are either black or red and backs that are all identical. Then, using two cards of different colors, we can commit a secret bit to a pair of face-down cards so that its order (i.e., black to red, or red to black) represents the value of the bit. Given such two commitments (consisting of four f...More

Code:

Data:

Your rating :
0

 

Tags
Comments