Abstract
This paper presents a use of secure multi-party computations in duplicate bridge. A two-person computation is performed by dealing cards in a specific permutation in order to create a deal which has been pre-determined by computer. Statistical analysis is used to demonstrate that little information about the resultant hands can be derived by the participants of the computation. Experimental evidence for failure-rates and time taken to perform the operation is also presented.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bailey, W., Goldberg, E., Ford, B., Kucera, G.: Deep Finesse, http://www.deepfinesse.com/
Chang, M.S.: Building a Fast Double-Dummy Bridge Solver. Tech. Rep. TR1996-725, New York University Computer Science (August 1996), http://cs.nyu.edu/web/Research/TechReports/TR1996-725/TR1996-725.pdf
Chaum, D., Crépeau, C., Damgård, I.: Multiparty Unconditionally Secure Protocols. In: 20th Annual Symposium on Theory of Computing, pp. 11–19. ACM, New York (1988), http://portal.acm.org/citation.cfm?id=62214
Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Goldriech, O., Micali, S., Wigderson, A.: How to Play Any Mental Game. In: 19th Annual Conference on Theory of Computing, pp. 218–219. ACM, New York (1987)
Haglund, B.: DDD, http://web.telia.com/~u88910365/
Handley, B.: Dealing Sheets. Personal Communication
Johnson, M.: Pescetti—Pseudo-Duplimate Generator, http://www.matthew.ath.cx/projects/pescetti/
Knuth, D.E.: The Art of Computer Programming. Seminumerical algorithms, vol. 2, ch. 3, pp. 124–125. Addison-Wesley, Reading (1969)
Richardson, B.: DDS, http://www.bridge-captain.com/downloadDD.html
Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979), http://portal.acm.org/citation.cfm?id=359176
Yao, A.C.: Protocols for Secure Computation (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE, Los Alamitos (1982)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johnson, M., Owen, R. (2011). A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates). In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds) Security Protocols XVI. Security Protocols 2008. Lecture Notes in Computer Science, vol 6615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22137-8_25
Download citation
DOI: https://doi.org/10.1007/978-3-642-22137-8_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22136-1
Online ISBN: 978-3-642-22137-8
eBook Packages: Computer ScienceComputer Science (R0)