Efficient Card-Based Majority Voting Protocols

نویسندگان

چکیده

Abstract Card-based cryptography is a variety of secure multiparty computation (MPC). Recently, new technique called private operations was introduced because the protocol can be implemented with fewer cards than that by using conventional shuffle. For example, Nakai et al. showed if are available, computations AND and OR for two inputs realized simultaneously four cards, applied to four-card majority voting three inputs. This paper shows only sufficient construct Specifically, we propose constructions three-input protocols. One assuming players announce their output, other not allowed. Compared al.’s protocol, announcement without any additional communications. On hand, second construction requires more communications it removes assumption on from first construction. More importantly, idea extended an n -input which main result this paper.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Voting on Majority Rules∗

We analyze an overlapping generations model of voting on “reform projects”. These resemble investments in that they first require some investment expenditure and later pay off. Since the time during which old people get the benefit is shorter, or because older people are more wealthy and hence pay more taxes, they are more conservative (against reforms) than young people. We show that if people...

متن کامل

Iterated Majority Voting

We study a model in which a group of agents make a sequence of collective decisions on whether to remain in the current state of the system or switch to an alternative state, as proposed by one of them. Examples for instantiations of this model include the step-wise refinement of a bill of law by means of amendments to be voted on, as well as resource allocation problems, where agents successiv...

متن کامل

Card-based protocols using unequal division shuffles

Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and ...

متن کامل

Card-Based Protocols for Any Boolean Function

Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for comp...

متن کامل

Majority voting on restricted domains

In judgment aggregation, unlike preference aggregation, not much is known about domain restrictions that guarantee consistent majority outcomes. We introduce several conditions on individual judgments su¢ cient for consistent majority judgments. Some are based on global orders of propositions or individuals, others on local orders, still others not on orders at all. Some generalize classic soci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: New Generation Computing

سال: 2022

ISSN: ['0288-3635', '1882-7055']

DOI: https://doi.org/10.1007/s00354-022-00161-7