Abstract | ||
---|---|---|
In order to remedy the flaw of SRA mental poker protocol, we propose poker-resembled protocols over Zopf*p and Zopf*N, where p is a strong prime and N is the product of two strong primes. Using the results of hidden number problem, we analyze the security of these protocols and prove that when the first card drawing player is malicious, the security of the random permutation and the secret key selected by the card shuffling player can be reduced to the difficulty in predicting the ?(log log p)/2 + 1? most significant bits of cards(plaintext) and the ?2 log log p? most significant bits of her secret key. And in the case card shuffling player is malicious, the security of the secret key of the first card drawing player can be reduced to the difficulty in predicting the ?2 log log p? most significant bits of the secret key. |
Year | DOI | Venue |
---|---|---|
2009 | 10.1109/CSO.2009.335 | CSO (2) |
Keywords | Field | DocType |
sra mental poker protocol,hidden number problem,private key cryptography,numerical analysis,poker-resembled protocols,strong prime,secret key,significant bit,poker-resembled protocol,random permutation,log p,mental poker,security analysis,case card shuffling player,ignificant bit,data mining,cryptographic protocols,polynomials,protocols,algorithm design and analysis,probabilistic logic,cryptography,zinc,information analysis,information security | Discrete mathematics,Mathematical optimization,Cryptographic protocol,Cryptography,Mental poker,Theoretical computer science,Random permutation,Shuffling,Security analysis,Mathematics,Strong prime,Plaintext | Conference |
Volume | ISBN | Citations |
2 | 978-0-7695-3605-7 | 0 |
PageRank | References | Authors |
0.34 | 4 | 2 |