메뉴 건너뛰기




Volumn 23, Issue , 2004, Pages 1-10

Completely fair SFE and coalition-safe cheap talk

Author keywords

Correlated Equilibrium; Game Theory; Mechanism Design; Secure Function Evaluation

Indexed keywords

CORRELATED EQUILIBRIUM; MECHANISM DESIGN; SECURE FUNCTION EVALUATION;

EID: 10444265884     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (71)

References (30)
  • 1
    • 0002430114 scopus 로고
    • Subjectivity and correlation in randomized strategies
    • R. Aumann. Subjectivity and correlation in randomized strategies. J. Math. Econ., 1:67-96, 1974.
    • (1974) J. Math. Econ. , vol.1 , pp. 67-96
    • Aumann, R.1
  • 2
    • 0001415601 scopus 로고
    • Fair distribution protocols or how the players replace fortune
    • May
    • I. Bárány. Fair distribution protocols or how the players replace fortune. Mathematics of Operation Research, 17:327-341, May 1992.
    • (1992) Mathematics of Operation Research , vol.17 , pp. 327-341
    • Bárány, I.1
  • 4
    • 84898960610 scopus 로고
    • Completeness theorems for fault-tolerant distributed computing
    • ACM
    • M. Ben-Or, S. Goldwasser, and A. Wigderson. Completeness theorems for fault-tolerant distributed computing. In Proc. 20th STOC, pages 1-10. ACM, 1988.
    • (1988) Proc. 20th STOC , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 5
    • 0000621526 scopus 로고    scopus 로고
    • Correlation without mediation: Expanding the set of equilibria outcomes by "cheap" pre-play procedures
    • E. Ben-Porath. Correlation without mediation: Expanding the set of equilibria outcomes by "cheap" pre-play procedures. Journal of Economic Theory, 80:108-122, 1998.
    • (1998) Journal of Economic Theory , vol.80 , pp. 108-122
    • Ben-Porath, E.1
  • 8
    • 0035163054 scopus 로고    scopus 로고
    • Universally composable security: A new paradigm for cryptographic protocols
    • IEEE
    • R. Canetti. Universally composable security: A new paradigm for cryptographic protocols. In Proc. 42nd FOCS, pages 136-147. IEEE, 2001.
    • (2001) Proc. 42nd FOCS , pp. 136-147
    • Canetti, R.1
  • 10
    • 84957671573 scopus 로고
    • Multi-party unconditionally secure protocols
    • Chicago, ACM
    • D. Chaum, C. Crepeau, and I. Damgård. Multi-party unconditionally secure protocols. In Proc. 20th STOC, Chicago, 1988. ACM.
    • (1988) Proc. 20th STOC
    • Chaum, D.1    Crepeau, C.2    Damgård, I.3
  • 11
    • 0012610677 scopus 로고
    • Limits on the security of coin flips when half the processors are faulty
    • R. Cleve. Limits on the security of coin flips when half the processors are faulty. In 18th ACM STOC, pages 364-369, 1986.
    • (1986) 18th ACM STOC , pp. 364-369
    • Cleve, R.1
  • 12
    • 84974555688 scopus 로고    scopus 로고
    • A cryptographic solution to a game theoretic problem
    • of LNCS, Springer-Verlag
    • Y. Dodis, S. Halevi, and T. Rabin. A cryptographic solution to a game theoretic problem. In Advances in Cryptology - CRYPTO 2000, volume 1880 of LNCS, pages 112-130. Springer-Verlag, 2000.
    • (2000) Advances in Cryptology - CRYPTO 2000 , vol.1880 , pp. 112-130
    • Dodis, Y.1    Halevi, S.2    Rabin, T.3
  • 13
    • 84974597111 scopus 로고    scopus 로고
    • Parallel reducibility for information-theoretically secure computation
    • of LNCS, Springer-Verlag
    • Y. Dodis and S. Micali. Parallel reducibility for information-theoretically secure computation. In CRYPTO 2000, volume 1880 of LNCS, pages 74-92. Springer-Verlag, 2000.
    • (2000) CRYPTO 2000 , vol.1880 , pp. 74-92
    • Dodis, Y.1    Micali, S.2
  • 14
    • 0022080529 scopus 로고    scopus 로고
    • A randomized protocol for signing contracts
    • Technion, Haifa, February 1982
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Technical Report 233, Technion, Haifa, February 1982. Subsequent version: CACM, 28(6) pp. 637-647, 1985.
    • Technical Report , vol.233
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 15
    • 0022080529 scopus 로고    scopus 로고
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Technical Report 233, Technion, Haifa, February 1982. Subsequent version: CACM, 28(6) pp. 637-647, 1985.
    • (1985) Subsequent Version: CACM , vol.28 , Issue.6 , pp. 637-647
  • 16
    • 0022185625 scopus 로고
    • Byzantine agreement in constant expected time (and trusting no one)
    • IEEE
    • P. Feldman and S. Micali. Byzantine agreement in constant expected time (and trusting no one). In Proc. 26th FOCS, pages 267-276. IEEE, 1985.
    • (1985) Proc. 26th FOCS , pp. 267-276
    • Feldman, P.1    Micali, S.2
  • 17
    • 10444229890 scopus 로고    scopus 로고
    • Efficient and secure multi-party computation with faulty majority and complete fairness
    • Eprint, Jan
    • J. A. Garay, P. MacKenzie, and K. Yang. Efficient and secure multi-party computation with faulty majority and complete fairness. Technical Report 9, Eprint, Jan 2004. http://eprint.iacr.org/2004/009.
    • (2004) Technical Report , vol.9
    • Garay, J.A.1    MacKenzie, P.2    Yang, K.3
  • 18
    • 0347662287 scopus 로고    scopus 로고
    • Unmediated communication in games with complete and incomplete information
    • to appear
    • D. Gerardi. Unmediated communication in games with complete and incomplete information. Journal of Economic Theory, to appear.
    • Journal of Economic Theory
    • Gerardi, D.1
  • 20
    • 0012527958 scopus 로고
    • Fair computation of general functions in the presence of an immoral majority
    • Springer Verlag
    • S. Goldwasser and L. Levin. Fair computation of general functions in the presence of an immoral majority. In Proc. CRYPTO 90, pages 77-93. Springer Verlag, 1990.
    • (1990) Proc. CRYPTO 90 , pp. 77-93
    • Goldwasser, S.1    Levin, L.2
  • 21
    • 0020889143 scopus 로고
    • How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin
    • M. Luby, S. Micali, and C. Rackoff. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin. In FOCS, pages 11-21, 1983.
    • (1983) FOCS , pp. 11-21
    • Luby, M.1    Micali, S.2    Rackoff, C.3
  • 22
    • 84974655726 scopus 로고
    • Secure computation
    • J. Feigenbaum, editor. Springer. Lecture Notes in Computer Science No. 576
    • S. Micali and P. Rogaway. Secure computation. In J. Feigenbaum, editor, Proc. CRYPTO 91, pages 392-404. Springer, 1992. Lecture Notes in Computer Science No. 576.
    • (1992) Proc. CRYPTO , vol.91 , pp. 392-404
    • Micali, S.1    Rogaway, P.2
  • 25
    • 0001730497 scopus 로고
    • Non-cooperative games
    • J. Nash. Non-cooperative games. Annals of Mathematics, 54:286-295, 1951.
    • (1951) Annals of Mathematics , vol.54 , pp. 286-295
    • Nash, J.1
  • 26
    • 0024859552 scopus 로고
    • Verifiable secret sharing and multiparty protocols with honest majority
    • ACM
    • T. Rabin and M. Ben-Or. Verifiable secret sharing and multiparty protocols with honest majority. In Proc. 21st STOC, pages 73-85. ACM, 1989.
    • (1989) Proc. 21st STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 27
    • 0030295805 scopus 로고    scopus 로고
    • Coalition-proof correlated equilibrium: A definition
    • I. Ray. Coalition-proof correlated equilibrium: A definition. Games and Economic Behavior, 17:56-79, 1996.
    • (1996) Games and Economic Behavior , vol.17 , pp. 56-79
    • Ray, I.1
  • 29
    • 0036377456 scopus 로고    scopus 로고
    • Computational complexity and communication: Coordination in two-player games
    • A. Urbano and J. E. Vila. Computational complexity and communication: Coordination in two-player games. Econometrica, 70(5):1893-1927, 2002.
    • (2002) Econometrica , vol.70 , Issue.5 , pp. 1893-1927
    • Urbano, A.1    Vila, J.E.2
  • 30
    • 0022882770 scopus 로고
    • How to generate and exchange secrets
    • IEEE
    • A. C.-C. Yao. How to generate and exchange secrets. In Proc. 27th FOCS, pages 162-167. IEEE, 1986.
    • (1986) Proc. 27th FOCS , pp. 162-167
    • Yao, A.C.-C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.