Abstract
The situation is quite serious. After four years of research, there has been no satisfactory way for a group of card sharks to play poker over the phone. Until now. In this paper, we present a new method for playing ‘mental poker,’ discuss its significance, and mention some of the further questions it raises. Ante up.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Shamir, A., Rivest, R., Adleman, L., “Mental Poker”, in Mathematical Gardner, D.E. Klarner, ed., Wadsworth International, 1981, pp. 37–43.
Lipton, R. “How to Cheat at Mental Poker,” Proceedings of the AMS Short Course in Cryptography, 1981
Goldwasser, S., Micali, S., “Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information,” Proceedings of the 14th STOC, pp. 365–377, 1982.
Barany, I., Furedi, Z., “Mental Poker with Three or More Players,” Technical Report, Mathematical Institute of the Hungarian Academy of Sciences (1983).
Heisenberg, W., “Physics and Beyond”, translated by Arnold Pomerans, Harper & Row, 1971, p. 139.
Yung, M. M., “Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and the Multi-Player Mental Poker Game”, manuscript, 1984.
Fich, F., Goldwasser, S., “Sending Messages without Hidden Information and Applications to Multiperson Games,” manuscript, 1984.
Evans, A., Kantrowitz, W., Weiss, E.. “A User Authentication Scheme Not Requiring Secrecy in the Computer.” CACM (August 1974) Vol. 17(8). pp. 437–442.
Rabin, M., “Digitalized Signatures,” in Foundations of Secure Computation, DeMillo, Dobkin and Lipton, eds., Academic Press, 1978. pp. 155–168.
Chaum, D., “Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms,” CACM (February 1981) Vol. 24(2), pp. 84–88.
Merritt, M., “Cryptographic Protocols,” Ph.D. thesis, Georgia Institute of Technology (1983) GIT-ICS-83/06
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1985 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fortune, S., Merritt, M. (1985). Poker Protocols. In: Blakley, G.R., Chaum, D. (eds) Advances in Cryptology. CRYPTO 1984. Lecture Notes in Computer Science, vol 196. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-39568-7_36
Download citation
DOI: https://doi.org/10.1007/3-540-39568-7_36
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-15658-1
Online ISBN: 978-3-540-39568-3
eBook Packages: Springer Book Archive