Efficient Card-Based Majority Voting Protocols
نویسندگان
چکیده
Abstract Card-based cryptography is a variety of secure multiparty computation (MPC). Recently, new technique called private operations was introduced because the protocol can be implemented with fewer cards than that by using conventional shuffle. For example, Nakai et al. showed if are available, computations AND and OR for two inputs realized simultaneously four cards, applied to four-card majority voting three inputs. This paper shows only sufficient construct Specifically, we propose constructions three-input protocols. One assuming players announce their output, other not allowed. Compared al.’s protocol, announcement without any additional communications. On hand, second construction requires more communications it removes assumption on from first construction. More importantly, idea extended an n -input which main result this paper.
منابع مشابه
Voting on Majority Rules∗
We analyze an overlapping generations model of voting on “reform projects”. These resemble investments in that they first require some investment expenditure and later pay off. Since the time during which old people get the benefit is shorter, or because older people are more wealthy and hence pay more taxes, they are more conservative (against reforms) than young people. We show that if people...
متن کاملIterated Majority Voting
We study a model in which a group of agents make a sequence of collective decisions on whether to remain in the current state of the system or switch to an alternative state, as proposed by one of them. Examples for instantiations of this model include the step-wise refinement of a bill of law by means of amendments to be voted on, as well as resource allocation problems, where agents successiv...
متن کاملCard-based protocols using unequal division shuffles
Card-based cryptographic protocols can perform secure computation of Boolean functions. In 2013, Cheung et al. presented a protocol that securely produces a hidden AND value using five cards; however, it fails with a probability of 1/2. The protocol uses an unconventional shuffle operation called an unequal division shuffle; after a sequence of five cards is divided into a two-card portion and ...
متن کاملCard-Based Protocols for Any Boolean Function
Card-based protocols that are based on a deck of physical cards achieve secure multi-party computation with information-theoretic secrecy. Using existing AND, XOR, NOT, and copy protocols, one can naively construct a secure computation protocol for any given (multivariable) Boolean function as long as there are plenty of additional cards. However, an explicit sufficient number of cards for comp...
متن کاملMajority voting on restricted domains
In judgment aggregation, unlike preference aggregation, not much is known about domain restrictions that guarantee consistent majority outcomes. We introduce several conditions on individual judgments su¢ cient for consistent majority judgments. Some are based on global orders of propositions or individuals, others on local orders, still others not on orders at all. Some generalize classic soci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: New Generation Computing
سال: 2022
ISSN: ['0288-3635', '1882-7055']
DOI: https://doi.org/10.1007/s00354-022-00161-7