Comments by "EebstertheGreat" (@EebstertheGreat) on "Dealing Cards with Cryptography (with Ron Rivest) - Numberphile" video.
-
+Connor Butterworth
0. Both players agree to the rules (including cryptographic protocol, order of hands, betting order, etc.) and to a public key.
1. Player 1 encrypts all 52 cards with his secret key and sends them to Player 2. This phase simulates shuffling and cutting the cards (Player 1 shuffles, Player 2 cuts).
2. Player 2 picks 10 cards and discards the rest. Player 2 then encrypts 5 cards with his secret key and sends all 10 to Player 1. This phase simulates dealing the cards.
3. Player 1 decrypts all 10 cards with his secret key, revealing the faces of 5 (his hand). He sends the other 5 back to Player 2, along with an opening bet. This phase simulates Player 1 picking up his cards and betting.
4. Player 2 decrypts these 5 cards with his secret key, revealing the faces of all of them (his hand). He then sends a response to Player 1 (fold, call, raise (with an amount), or check (if available)). This phase simulates Player 2 picking up his cards and betting.
5. Players continue to bet until one calls or folds (or both check). Afterwards, if neither player folded (and they didn't both check), they each send their hand to the other to verify the winner.
This method is secure, fair, and random, and conforms to the rules of Poker.
3