Back to Search
Start Over
Necessary and Sufficient Numbers of Cards for Securely Computing Two-Bit Output Functions
- Source :
- Lecture Notes in Computer Science ISBN: 9783319612720, Mycrypt
- Publication Year :
- 2017
- Publisher :
- Springer International Publishing, 2017.
-
Abstract
- In 2015, Koch et al. proposed a five-card finite-runtime committed protocol to compute securely the AND function, showing that their protocol was optimal: there is no protocol computing the AND function with four cards in finite-runtime fashion and committed format. Thus, necessary and sufficient numbers of cards for computing single-bit output functions are known. However, as for two-bit output functions, such an exact characterization is unknown. This paper gives a six-card (or less) protocol for each of all two-bit output functions and proves that our finite-runtime committed protocols are optimal by providing a lower bound. In other words, we give the necessary and sufficient number of cards for any two-bit output function to be computed by a finite-runtime committed protocol. Our lower bound can also be applied to any function which outputs more than two bits.
- Subjects :
- business.industry
Computer science
05 social sciences
Function (mathematics)
Characterization (mathematics)
Upper and lower bounds
Bit (horse)
0502 economics and business
050211 marketing
Arithmetic
business
Protocol (object-oriented programming)
050203 business & management
Computer hardware
Subjects
Details
- ISBN :
- 978-3-319-61272-0
- ISBNs :
- 9783319612720
- Database :
- OpenAIRE
- Journal :
- Lecture Notes in Computer Science ISBN: 9783319612720, Mycrypt
- Accession number :
- edsair.doi...........29a206d911541476085ff9411c6d0be5
- Full Text :
- https://doi.org/10.1007/978-3-319-61273-7_10