Skip to main content

A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates)

  • Conference paper
Security Protocols XVI (Security Protocols 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 6615))

Included in the following conference series:

  • 525 Accesses

Abstract

This paper presents a use of secure multi-party computations in duplicate bridge. A two-person computation is performed by dealing cards in a specific permutation in order to create a deal which has been pre-determined by computer. Statistical analysis is used to demonstrate that little information about the resultant hands can be derived by the participants of the computation. Experimental evidence for failure-rates and time taken to perform the operation is also presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bailey, W., Goldberg, E., Ford, B., Kucera, G.: Deep Finesse, http://www.deepfinesse.com/

  2. Chang, M.S.: Building a Fast Double-Dummy Bridge Solver. Tech. Rep. TR1996-725, New York University Computer Science (August 1996), http://cs.nyu.edu/web/Research/TechReports/TR1996-725/TR1996-725.pdf

  3. Chaum, D., Crépeau, C., Damgård, I.: Multiparty Unconditionally Secure Protocols. In: 20th Annual Symposium on Theory of Computing, pp. 11–19. ACM, New York (1988), http://portal.acm.org/citation.cfm?id=62214

    Google Scholar 

  4. Diffie, W., Hellman, M.E.: New Directions in Cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)

    Article  MathSciNet  MATH  Google Scholar 

  5. Goldriech, O., Micali, S., Wigderson, A.: How to Play Any Mental Game. In: 19th Annual Conference on Theory of Computing, pp. 218–219. ACM, New York (1987)

    Google Scholar 

  6. Haglund, B.: DDD, http://web.telia.com/~u88910365/

  7. Handley, B.: Dealing Sheets. Personal Communication

    Google Scholar 

  8. Johnson, M.: Pescetti—Pseudo-Duplimate Generator, http://www.matthew.ath.cx/projects/pescetti/

  9. Knuth, D.E.: The Art of Computer Programming. Seminumerical algorithms, vol. 2, ch. 3, pp. 124–125. Addison-Wesley, Reading (1969)

    Google Scholar 

  10. Richardson, B.: DDS, http://www.bridge-captain.com/downloadDD.html

  11. Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612–613 (1979), http://portal.acm.org/citation.cfm?id=359176

    Article  MathSciNet  MATH  Google Scholar 

  12. Yao, A.C.: Protocols for Secure Computation (extended abstract). In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160–164. IEEE, Los Alamitos (1982)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Johnson, M., Owen, R. (2011). A Real World Application of Secure Multi-party Computations (Duplicate Bridge for Cheapskates). In: Christianson, B., Malcolm, J.A., Matyas, V., Roe, M. (eds) Security Protocols XVI. Security Protocols 2008. Lecture Notes in Computer Science, vol 6615. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22137-8_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22137-8_25

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22136-1

  • Online ISBN: 978-3-642-22137-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics