Discreet Solitary Games

Cryptographic techniques have been used intensively in the past to show how to play multiparty games in an adversarial scenario. We now investigate the cryptographic power of a deck of cards in a solitary scenario. In particular, we show how a person can select a random permutation satisfying a certain criterion discreetly (without knowing which one was picked) using a simple deck of cards. We also show how it is possible using cards to play games of partial information such as POKER, BRIDGE and other cards games in solitary.

[1]  Michael J. Fischer,et al.  An efficient protocol for unconditionally secure secret key exchange , 1993, SODA '93.

[2]  Michael J. Fischer,et al.  Multiparty Secret Key Exchange Using a Random Deal of Cards , 1991, CRYPTO.

[3]  Peter Winkler The Advent of Cryptology in the Game of Bridge , 1983, Cryptologia.

[4]  Claude Crépeau,et al.  A Zero-Knowledge Poker Protocol That Achieves Confidentiality of the Players' Strategy or How to Achieve an Electronic Poker Face , 1986, CRYPTO.

[5]  Avi Wigderson,et al.  Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.

[6]  Moti Yung Cryptoprotocols: Subscription to a Public Key, the Secret Blocking and the Multi-Player Mental Poker Game (Extended Abstract) , 1984, CRYPTO.

[7]  Bert den Boer More Efficient Match-Making and Satisfiability: The Five Card Trick , 1990, EUROCRYPT.

[8]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[9]  David Chaum,et al.  Multiparty unconditionally secure protocols , 1988, STOC '88.

[10]  Claude Crépeau,et al.  A Secure Poker Protocol that Minimizes the Effect of Player Coalitions , 1986, CRYPTO.

[11]  Michael J. Fischer,et al.  Secret Bit Transmission Using a Random Deal of Cards , 1990, Distributed Computing And Cryptography.

[12]  Mordechai M. Yung,et al.  Cryptoprotocols: Subscription to a public key, the secret blocking and the multi-player mental poker game , 1985, CRYPTO 1985.

[13]  Michael Merritt,et al.  Poker Protocols , 1985, CRYPTO.

[14]  Silvio Micali,et al.  Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.

[15]  Imre Bárány,et al.  Mental Poker with Three or More Players , 1983, Inf. Control..

[16]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[17]  Tal Rabin,et al.  Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.