![]() |
|
|
#1 | |
|
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
10,753 Posts |
Mod Note:This thread was split from the thread quoted in this post.
Quote:
TL;DR --- it is possible to implement a system where it is possible to detect when someone is cheating. Last fiddled with by Uncwilly on 2020-03-16 at 14:13 |
|
|
|
|
|
|
#2 |
|
Dec 2012
The Netherlands
2·23·37 Posts |
|
|
|
|
|
|
#3 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
140648 Posts |
Quote:
|
|
|
|
|
|
|
#4 | |
|
Jun 2003
10011101110112 Posts |
Quote:
a) alice can decode the specific card ... b) ... without bob knowing what card it is ... c) ... and furthermore, without alice being able to decode the whole deck? |
|
|
|
|
|
|
#5 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
183416 Posts |
Quote:
Last fiddled with by retina on 2020-03-15 at 11:20 |
|
|
|
|
|
|
#6 | |
|
Bamboozled!
"πΊππ·π·π"
May 2003
Down not across
10,753 Posts |
Quote:
|
|
|
|
|
|
|
#7 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
619610 Posts |
Quote:
And secondly the protocol still needs to be verified at the finish of the hand to verify there were no anomalies, so the final transfer of keys and seeds etc. will reveal any and all previous attempts to cheat. So it is of no advantage to Bob to select a different card, because if he does he gets caught when the hand is over. ETA: Actually Alice can also ask Bob to select a card or her. There really isn't a need for Alice to select the card. Just let Bob select it, decode his part, and send it. Or even always select the first card from the pack. No random choice is needed since they are already shuffled. Last fiddled with by retina on 2020-03-15 at 13:22 |
|
|
|
|
|
|
#8 | |
|
Romulan Interpreter
Jun 2011
Thailand
7×1,373 Posts |
Quote:
Interesting enough, there is also at least one patent for it. Fun story: the "millionaire" problem also has a "socialist" version, in the past I struggled for weeks to understand why they made it so complicate, when a simple combination of SHA256 or so, of the info should be enough. But actually, it is not. And I am not talking about "fill the last 5 bytes of the block with your wealth, as none of us is richer than a trillion dollars, then apply SHA to it, and we can compare the result", that would be indeed stupid, as the search space is very low and it can be bruteforced. I am talking about the most general case when two people want to decide if they have the same information without revealing it, when a "full block" of SHA is filled with random data, and that can't be bruteforced. Last fiddled with by LaurV on 2020-03-16 at 08:16 |
|
|
|
|
|
|
#9 | |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
11000001101002 Posts |
Quote:
26 players A..Z: After the initial round of shuffling we have card 0 = m0A..Z. To select a card for Alice we have Zelda decode card 0 to m0A..Y and pass to Yolanda. Then Yolanda decodes to m0A..X and passes to Xavier ... <snip 22 steps> ... Bob decodes to m0A and passes to Alice. Lastly Alice decodes to m0 and reveals the card to herself. What am I not seeing? |
|
|
|
|
|
|
#10 |
|
Undefined
"The unspeakable one"
Jun 2006
My evil lair
140648 Posts |
It isn't mentioned anywhere that I can see but might it be because of efficiency concerns?
It would be more efficient to have Alice receive all the keys B-Z and then she can simply compute A*B*C*..*Z mod phi(p) to get the decode key. But that would seem to be specific to the usage of primitive roots modulo p for the commutative encryption scheme. Other schemes might not exhibit this advantage.
|
|
|
|
![]() |
Similar Threads
|
||||
| Thread | Thread Starter | Forum | Replies | Last Post |
| A Holy New Board Game | MattcAnderson | Puzzles | 2 | 2015-10-18 09:40 |
| If you won't play online I won't play with your stuff at all | jasong | jasong | 1 | 2014-06-30 02:23 |
| Alice in Wonderland | ZFR | Puzzles | 36 | 2013-10-23 16:16 |
| Encryption and governments | retina | Soap Box | 119 | 2012-02-28 05:00 |
| American Mcgee's Alice | Margaret3000 | Computer Games | 3 | 2004-10-16 16:14 |