Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 222,876,894 papers from all fields of science
Search
Sign In
Create Free Account
Mental poker
Mental poker is the common name for a set of cryptographic problems that concerns playing a fair game over distance without the need for a trusted…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Algorithm
Alice and Bob
Ciphertext
Commitment scheme
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Provably Secure Password Reset Protocol: Model, Definition, and Generic Construction
Satsuya Ohata
,
Takahiro Matsuda
,
Kanta Matsuura
IACR Cryptology ePrint Archive
2016
Corpus ID: 7119887
Many online services adopt a password-based user authentication system because of its usability. However, several problems have…
Expand
Review
2016
Review
2016
Utility And Privacy Guarantees of Differential Privacy by Shubham Srivastava
S. Srivastava
,
Debajyoti Bera
2016
Corpus ID: 59463178
The primary aim of any survey is to facilitate analysis of sensitive data to extract useful information, without jeopardizing…
Expand
Review
2015
Review
2015
From Mental Poker to Core Business: Why and How to Deploy Secure Computation Protocols?
M. Yung
Conference on Computer and Communications…
2015
Corpus ID: 2709839
Technological innovations in security and privacy are critical to advancing modern computing in our time. I will present an…
Expand
2015
2015
Preserving Record Sharing Privacy with Anonymous ID Assignments
R. Paper
,
Prof. V. S Prafull B. Masal
,
Kadam
2015
Corpus ID: 11636908
Algorithm for anonymous sharing of private data among parties is developed. This technique is used iteratively to assign these…
Expand
2014
2014
Privacy Preserving Distributed Data Mining with Anonymous ID Assignment
Chikkudu Chandrakanth
,
Dr B Santhosh Kumar Santhosh Balan
,
C. Singh
2014
Corpus ID: 212474454
: This paper builds an algorithm for sharing simple integer data on top of secure sum data mining operation using Newton’s…
Expand
2013
2013
Secrecy without one-way functions
D. Grigoriev
,
V. Shpilrain
Groups Complex. Cryptol.
2013
Corpus ID: 10149512
Abstract. We show that some problems in information security can be solved without using one-way functions. The latter are…
Expand
2012
2012
A fast mental poker protocol
Tzer-jen Wei
,
Lih-chung Wang
Journal of Mathematical Cryptology
2012
Corpus ID: 2599425
Abstract. In this paper, we present a fast and secure mental poker protocol. The basic structure is the same as Barnett & Smart's…
Expand
2009
2009
Mental poker protocol without trusted third party
Z. Liu
,
Xiaoyuan Yang
,
Bo Yan
,
H. Xiao
2009
Corpus ID: 62494864
Mental poker is a secure multi-party computation solution in specific scene.In recent years,the studies on mental poker protocol…
Expand
2007
2007
A Toolbox for Mental Card Games
C. Schindelhauer
2007
Corpus ID: 59896006
Mental card games are played without a trusted party and without cards. It is well known that the problem of mental card games…
Expand
2004
2004
On the security of an efficient TTP-free mental poker protocol
Jordi Castellà-Roca
,
J. Domingo-Ferrer
International Conference on Information…
2004
Corpus ID: 17657172
Using commutative cryptosystems is a way to obtain efficient mental poker protocols which do not require using a trusted third…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE