Back to Search
Start Over
How to Implement a Random Bisection Cut
- Source :
- Theory and Practice of Natural Computing ISBN: 9783319490007, TPNC
- Publication Year :
- 2016
- Publisher :
- Springer International Publishing, 2016.
-
Abstract
- By using a deck of cards, it is possible to realize a secure computation. In particular, since a new shuffling operation, called a random bisection cut, was devised in 2009, many efficient protocols have been designed. The shuffle functions in the following manner. A sequence of cards is bisected, and the two halves are swapped randomly. This results in two possible cases, depending on whether the two halves of the card sequence are swapped or not. Because there are only two possibilities when a random bisection cut is performed, it has been suggested that information regarding the result of the shuffle could sometimes be leaked visually. Thus, in this paper we propose some methods for implementing a random bisection cut without leaking such information.
- Subjects :
- Sequence
Shuffling
Computer science
business.industry
Bisection
05 social sciences
Cryptography
ComputerSystemsOrganization_PROCESSORARCHITECTURES
Standard 52-card deck
TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY
0502 economics and business
Secure multi-party computation
050211 marketing
Arithmetic
business
050203 business & management
Subjects
Details
- ISBN :
- 978-3-319-49000-7
- ISBNs :
- 9783319490007
- Database :
- OpenAIRE
- Journal :
- Theory and Practice of Natural Computing ISBN: 9783319490007, TPNC
- Accession number :
- edsair.doi...........42e6f280512c3fe3f7109eeed28b5428
- Full Text :
- https://doi.org/10.1007/978-3-319-49001-4_5