University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Cryptographic protocols with everyday objects

Heather, J, Schneider, S and Teague, V (2013) Cryptographic protocols with everyday objects Formal Aspects of Computing. pp. 1-26.

non-crypto-protocols.pdf - Accepted version Manuscript

Download (600kB) | Preview


Most security protocols appearing in the literature make use of cryptographic primitives that assume that the participants have access to some sort of computational device. However, there are times when there is need for a security mechanism to evaluate some result without leaking sensitive information, but computational devices are unavailable. We discuss here various protocols for solving cryptographic problems using everyday objects: coins, dice, cards, and envelopes. © 2013 British Computer Society.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Heather, J
Schneider, S
Teague, V
Date : 2013
DOI : 10.1007/s00165-013-0274-7
Additional Information : The original publication is available at
Depositing User : Symplectic Elements
Date Deposited : 29 Nov 2013 10:32
Last Modified : 09 Jun 2014 13:47

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800