-
1
-
-
0002430114
-
Subjectivity and correlation in randomized strategies
-
R. Aumann. Subjectivity and correlation in randomized strategies. J. Math. Econ., 1:67-96, 1974.
-
(1974)
J. Math. Econ.
, vol.1
, pp. 67-96
-
-
Aumann, R.1
-
2
-
-
0001415601
-
Fair distribution protocols or how the players replace fortune
-
May
-
I. Bárány. Fair distribution protocols or how the players replace fortune. Mathematics of Operation Research, 17:327-341, May 1992.
-
(1992)
Mathematics of Operation Research
, vol.17
, pp. 327-341
-
-
Bárány, I.1
-
3
-
-
0009583632
-
Everything provable is provable in zero-knowledge
-
Springer Verlag
-
M. Ben-Or, O. Goldreich, S. Goldwasser, J. Hastad, J. K. S. Micali, and P. Rogaway. Everything provable is provable in zero-knowledge. In Proc. CRYPTO 88, pages 37-56. Springer Verlag, 1988.
-
(1988)
Proc. CRYPTO
, vol.88
, pp. 37-56
-
-
Ben-Or, M.1
Goldreich, O.2
Goldwasser, S.3
Hastad, J.4
Micali, J.K.S.5
Rogaway, P.6
-
4
-
-
84898960610
-
Completeness theorems for fault-tolerant distributed computing
-
ACM
-
M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for fault-tolerant distributed computing. In Proc. 20th STOC, pages 1-10. ACM, 1988.
-
(1988)
Proc. 20th STOC
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
5
-
-
0000621526
-
Correlation without mediation: Expanding the set of equilibria outcomes by "cheap" pre-play procedures
-
E. Ben-Porath. Correlation without mediation: Expanding the set of equilibria outcomes by "cheap" pre-play procedures. Journal of Economic Theory, 80:108-122, 1998.
-
(1998)
Journal of Economic Theory
, vol.80
, pp. 108-122
-
-
Ben-Porath, E.1
-
7
-
-
0026383119
-
Noninteractive zero-knowledge
-
M. Blum, A. D. Santis, S. Micali, and G. Persiano. Noninteractive zero-knowledge. SIAM J. Computing, 20(6):1084-1118, 1991.
-
(1991)
SIAM J. Computing
, vol.20
, Issue.6
, pp. 1084-1118
-
-
Blum, M.1
Santis, A.D.2
Micali, S.3
Persiano, G.4
-
8
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE
-
R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd FOCS, pages 136-147. IEEE, 2001.
-
(2001)
Proc. 42nd FOCS
, pp. 136-147
-
-
Canetti, R.1
-
9
-
-
0029723583
-
Adaptively secure multi-party computation
-
ACM Press
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor. Adaptively secure multi-party computation. In Proc. 28th annual ACM Symposium on Theory of Computing, pages 639-648. ACM Press, 1996.
-
(1996)
Proc. 28th Annual ACM Symposium on Theory of Computing
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
10
-
-
84957671573
-
Multi-party unconditionally secure protocols
-
Chicago, ACM
-
D. Chaum, C. Crepeau, and I. Damgård. Multi-party unconditionally secure protocols. In Proc. 20th STOC, Chicago, 1988. ACM.
-
(1988)
Proc. 20th STOC
-
-
Chaum, D.1
Crepeau, C.2
Damgård, I.3
-
11
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
R. Cleve. Limits on the security of coin flips when half the processors are faulty. In 18th ACM STOC, pages 364-369, 1986.
-
(1986)
18th ACM STOC
, pp. 364-369
-
-
Cleve, R.1
-
12
-
-
84974555688
-
A cryptographic solution to a game theoretic problem
-
of LNCS, Springer-Verlag
-
Y. Dodis, S. Halevi, and T. Rabin. A cryptographic solution to a game theoretic problem. In Advances in Cryptology - CRYPTO 2000, volume 1880 of LNCS, pages 112-130. Springer-Verlag, 2000.
-
(2000)
Advances in Cryptology - CRYPTO 2000
, vol.1880
, pp. 112-130
-
-
Dodis, Y.1
Halevi, S.2
Rabin, T.3
-
13
-
-
84974597111
-
Parallel reducibility for information-theoretically secure computation
-
of LNCS, Springer-Verlag
-
Y. Dodis and S. Micali. Parallel reducibility for information-theoretically secure computation. In CRYPTO 2000, volume 1880 of LNCS, pages 74-92. Springer-Verlag, 2000.
-
(2000)
CRYPTO 2000
, vol.1880
, pp. 74-92
-
-
Dodis, Y.1
Micali, S.2
-
14
-
-
0022080529
-
A randomized protocol for signing contracts
-
Technion, Haifa, February 1982
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Technical Report 233, Technion, Haifa, February 1982. Subsequent version: CACM, 28(6) pp. 637-647, 1985.
-
Technical Report
, vol.233
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
15
-
-
0022080529
-
-
S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Technical Report 233, Technion, Haifa, February 1982. Subsequent version: CACM, 28(6) pp. 637-647, 1985.
-
(1985)
Subsequent Version: CACM
, vol.28
, Issue.6
, pp. 637-647
-
-
-
16
-
-
0022185625
-
Byzantine agreement in constant expected time (and trusting no one)
-
IEEE
-
P. Feldman and S. Micali. Byzantine agreement in constant expected time (and trusting no one). In Proc. 26th FOCS, pages 267-276. IEEE, 1985.
-
(1985)
Proc. 26th FOCS
, pp. 267-276
-
-
Feldman, P.1
Micali, S.2
-
17
-
-
10444229890
-
Efficient and secure multi-party computation with faulty majority and complete fairness
-
Eprint, Jan
-
J. A. Garay, P. MacKenzie, and K. Yang. Efficient and secure multi-party computation with faulty majority and complete fairness. Technical Report 9, Eprint, Jan 2004. http://eprint.iacr.org/2004/009.
-
(2004)
Technical Report
, vol.9
-
-
Garay, J.A.1
MacKenzie, P.2
Yang, K.3
-
18
-
-
0347662287
-
Unmediated communication in games with complete and incomplete information
-
to appear
-
D. Gerardi. Unmediated communication in games with complete and incomplete information. Journal of Economic Theory, to appear.
-
Journal of Economic Theory
-
-
Gerardi, D.1
-
20
-
-
0012527958
-
Fair computation of general functions in the presence of an immoral majority
-
Springer Verlag
-
S. Goldwasser and L. Levin. Fair computation of general functions in the presence of an immoral majority. In Proc. CRYPTO 90, pages 77-93. Springer Verlag, 1990.
-
(1990)
Proc. CRYPTO 90
, pp. 77-93
-
-
Goldwasser, S.1
Levin, L.2
-
21
-
-
0020889143
-
How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin
-
M. Luby, S. Micali, and C. Rackoff. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin. In FOCS, pages 11-21, 1983.
-
(1983)
FOCS
, pp. 11-21
-
-
Luby, M.1
Micali, S.2
Rackoff, C.3
-
22
-
-
84974655726
-
Secure computation
-
J. Feigenbaum, editor. Springer. Lecture Notes in Computer Science No. 576
-
S. Micali and P. Rogaway. Secure computation. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 392-404. Springer, 1992. Lecture Notes in Computer Science No. 576.
-
(1992)
Proc. CRYPTO
, vol.91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
25
-
-
0001730497
-
Non-cooperative games
-
J. Nash. Non-cooperative games. Annals of Mathematics, 54:286-295, 1951.
-
(1951)
Annals of Mathematics
, vol.54
, pp. 286-295
-
-
Nash, J.1
-
26
-
-
0024859552
-
Verifiable secret sharing and multiparty protocols with honest majority
-
ACM
-
T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st STOC, pages 73-85. ACM, 1989.
-
(1989)
Proc. 21st STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
27
-
-
0030295805
-
Coalition-proof correlated equilibrium: A definition
-
I. Ray. Coalition-proof correlated equilibrium: A definition. Games and Economic Behavior, 17:56-79, 1996.
-
(1996)
Games and Economic Behavior
, vol.17
, pp. 56-79
-
-
Ray, I.1
-
29
-
-
0036377456
-
Computational complexity and communication: Coordination in two-player games
-
A. Urbano and J. E. Vila. Computational complexity and communication: Coordination in two-player games. Econometrica, 70(5):1893-1927, 2002.
-
(2002)
Econometrica
, vol.70
, Issue.5
, pp. 1893-1927
-
-
Urbano, A.1
Vila, J.E.2
-
30
-
-
0022882770
-
How to generate and exchange secrets
-
IEEE
-
A. C.-C. Yao. How to generate and exchange secrets. In Proc. 27th FOCS, pages 162-167. IEEE, 1986.
-
(1986)
Proc. 27th FOCS
, pp. 162-167
-
-
Yao, A.C.-C.1
|