Back to Search Start Over

How to Implement a Random Bisection Cut

Authors :
Akihiro Nishimura
Takaaki Mizuki
Hideaki Sone
Itaru Ueda
Yu-ichi Hayashi
Source :
Theory and Practice of Natural Computing ISBN: 9783319490007, TPNC
Publication Year :
2016
Publisher :
Springer International Publishing, 2016.

Abstract

By using a deck of cards, it is possible to realize a secure computation. In particular, since a new shuffling operation, called a random bisection cut, was devised in 2009, many efficient protocols have been designed. The shuffle functions in the following manner. A sequence of cards is bisected, and the two halves are swapped randomly. This results in two possible cases, depending on whether the two halves of the card sequence are swapped or not. Because there are only two possibilities when a random bisection cut is performed, it has been suggested that information regarding the result of the shuffle could sometimes be leaked visually. Thus, in this paper we propose some methods for implementing a random bisection cut without leaking such information.

Details

ISBN :
978-3-319-49000-7
ISBNs :
9783319490007
Database :
OpenAIRE
Journal :
Theory and Practice of Natural Computing ISBN: 9783319490007, TPNC
Accession number :
edsair.doi...........42e6f280512c3fe3f7109eeed28b5428
Full Text :
https://doi.org/10.1007/978-3-319-49001-4_5