Papers
Topics
Authors
Recent
Search
2000 character limit reached

Securely Computing the $n$-Variable Equality Function with $2n$ Cards

Published 14 Nov 2019 in cs.CR | (1911.05994v6)

Abstract: Research in the area of secure multi-party computation using a deck of playing cards, often called card-based cryptography, started from the introduction of the five-card trick protocol to compute the logical AND function by den Boer in 1989. Since then, many card-based protocols to compute various functions have been developed. In this paper, we propose two new protocols that securely compute the $n$-variable equality function (determining whether all inputs are equal) $E: {0,1}n \rightarrow {0,1}$ using $2n$ cards. The first protocol can be generalized to compute any doubly symmetric function $f: {0,1}n \rightarrow \mathbb{Z}$ using $2n$ cards, and any symmetric function $f: {0,1}n \rightarrow \mathbb{Z}$ using $2n+2$ cards. The second protocol can be generalized to compute the $k$-candidate $n$-variable equality function $E: (\mathbb{Z}/k\mathbb{Z})n \rightarrow {0,1}$ using $2 \lceil \lg k \rceil n$ cards.

Citations (26)

Summary

No one has generated a summary of this paper yet.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Continue Learning

We haven't generated follow-up questions for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.