How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs

Yoshiki Abe, Mitsugu Iwamoto, Kazuo Ohta. How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs. In International Symposium on Information Theory and Its Applications, ISITA 2020, Kapolei, HI, USA, October 24-27, 2020. pages 377-381, IEEE, 2020. [doi]

Abstract

Abstract is missing.