Coin-based Secure Computations
Composability
DOI:
10.1007/s10207-022-00585-8
Publication Date:
2022-04-06T06:08:15Z
AUTHORS (2)
ABSTRACT
Abstract In the history of cryptography, many cryptographic protocols have relied on random coin tosses to prove their security. Although flipping coins is indispensable in this manner, themselves never been spotlight. Therefore, we would like make physical rise level just as a deck playing cards has used perform secure multi-party computation. Such card-based protocol known be helpful both computation without any black-box computers and understand principles protocols. paper, propose new framework using coins, named coin-based . One advantage use that they are more ubiquitous than cards. Whereas face-down card can conceal information about its face side, one side reveals other side. Hence, careful design required for one. We formalize computational model explicitly give NOT, AND, COPY, OR, XOR computations. also discuss composability extended how implement them practice.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (23)
CITATIONS (6)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....