Efficient card-based protocols for generating a hidden random permutation without fixed points

R Ishikawa, E Chida, T Mizuki - … 2015, Auckland, New Zealand, August 30 …, 2015 - Springer
Consider the holiday season, where there are n players who would like to exchange gifts.
That is, we would like to generate a random permutation having no fixed point. It is known …

Computational model of card-based cryptographic protocols and its applications

T Mizuki, H Shizuya - IEICE Transactions on Fundamentals of …, 2017 - search.ieice.org
Card-based protocols enable us to easily perform cryptographic tasks such as secure
multiparty computation using a deck of physical cards. Since the first card-based protocol …

Card-based protocols for any boolean function

T Nishida, Y Hayashi, T Mizuki, H Sone - Theory and Applications of …, 2015 - Springer
Card-based protocols that are based on a deck of physical cards achieve secure multi-party
computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy …

[图书][B] One hundred prisoners and a light bulb

H Van Ditmarsch, B Kooi, H van Ditmarsch, B Kooi - 2015 - Springer
A group of 100 prisoners, all together in the prison dining area, are told that they will be all
put in isolation cells and then will be interrogated one by one in a room containing a light …

Efficient and secure multiparty computations using a standard deck of playing cards

T Mizuki - Cryptology and Network Security: 15th International …, 2016 - Springer
It is known that secure multiparty computation can be performed using physical cards with
identical backs, and numerous card-based cryptographic protocols have been proposed …

[图书][B] Bicycle or unicycle?: A collection of intriguing mathematical puzzles

DJ Velleman, S Wagon - 2020 - ams.org
Puzzle 1. You are playing solitaire in the first quadrant of the Cartesian plane, the lower
corner of which is shown in Figure 1. You begin with a single checker on square a1. On …

A colouring protocol for the generalized Russian cards problem

A Cordón-Franco, H Van Ditmarsch… - Theoretical Computer …, 2013 - Elsevier
In the generalized Russian cards problem, Alice, Bob and Cath draw a, b and c cards,
respectively, from a deck of size a+ b+ c. Alice and Bob must then communicate their entire …

A distributed computing perspective of unconditionally secure information transmission in Russian cards problems

S Rajsbaum - Theoretical Computer Science, 2023 - Elsevier
In the generalized Russian cards problem, we have a deck of n cards and three participants,
A, B, and C, which receive a, b, and c cards respectively. The signature (a, b, c), where n= a+ …

A geometric protocol for cryptography with cards

A Cordón-Franco, H van Ditmarsch… - Designs, Codes and …, 2015 - Springer
In the generalized Russian cards problem, the three players Alice, Bob and Cath draw a, ba,
b and cc cards, respectively, from a deck of a+ b+ c a+ b+ c cards. Players only know their …

Coloured and directed designs

P Keevash - Building Bridges II: Mathematics of László Lovász, 2019 - Springer
We give some illustrative applications of our recent result on decompositions of labelled
complexes, including some new results on decompositions of hypergraphs with coloured or …