Poker Protocols

  • Steven Fortune
  • Michael Merritt
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 196)


The situation is quite serious. After four years of research, there has been no satisfactory way for a group of card sharks to play poker over the phone. Until now. In this paper, we present a new method for playing ‘mental poker,’ discuss its significance, and mention some of the further questions it raises. Ante up.


Secret Message Secret Information Quadratic Residue User Authentication Scheme Poker Player 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Shamir, A., Rivest, R., Adleman, L., “Mental Poker”, in Mathematical Gardner, D.E. Klarner, ed., Wadsworth International, 1981, pp. 37–43.Google Scholar
  2. 2.
    Lipton, R. “How to Cheat at Mental Poker,” Proceedings of the AMS Short Course in Cryptography, 1981Google Scholar
  3. 3.
    Goldwasser, S., Micali, S., “Probabilistic Encryption and How to Play Mental Poker Keeping Secret All Partial Information,” Proceedings of the 14th STOC, pp. 365–377, 1982.Google Scholar
  4. 4.
    Barany, I., Furedi, Z., “Mental Poker with Three or More Players,” Technical Report, Mathematical Institute of the Hungarian Academy of Sciences (1983).Google Scholar
  5. 5.
    Heisenberg, W., “Physics and Beyond”, translated by Arnold Pomerans, Harper & Row, 1971, p. 139.Google Scholar
  6. 6.
    Yung, M. M., “Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and the Multi-Player Mental Poker Game”, manuscript, 1984.Google Scholar
  7. 7.
    Fich, F., Goldwasser, S., “Sending Messages without Hidden Information and Applications to Multiperson Games,” manuscript, 1984.Google Scholar
  8. 8.
    Evans, A., Kantrowitz, W., Weiss, E.. “A User Authentication Scheme Not Requiring Secrecy in the Computer.” CACM (August 1974) Vol. 17(8). pp. 437–442.Google Scholar
  9. 9.
    Rabin, M., “Digitalized Signatures,” in Foundations of Secure Computation, DeMillo, Dobkin and Lipton, eds., Academic Press, 1978. pp. 155–168.Google Scholar
  10. 10.
    Chaum, D., “Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms,” CACM (February 1981) Vol. 24(2), pp. 84–88.Google Scholar
  11. 11.
    Merritt, M., “Cryptographic Protocols,” Ph.D. thesis, Georgia Institute of Technology (1983) GIT-ICS-83/06Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1985

Authors and Affiliations

  • Steven Fortune
    • 1
  • Michael Merritt
    • 1
  1. 1.AT&T Bell LaboratoriesMurray HillUSA

Personalised recommendations