메뉴 건너뛰기




Volumn 4948 LNCS, Issue , 2008, Pages 320-339

Cryptography and game theory: Designing protocols for exchanging information

Author keywords

[No Author keywords available]

Indexed keywords

ARCHITECTURAL DESIGN; COMPUTATION THEORY; COMPUTATIONAL METHODS; COMPUTER NETWORKS; CRYPTOGRAPHY; DECISION MAKING; NETWORK PROTOCOLS; NUMERICAL METHODS; SOLUTIONS;

EID: 40249088241     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-78524-8_18     Document Type: Conference Paper
Times cited : (152)

References (33)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation
    • Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation. In: PODC, pp. 53-62 (2006)
    • (2006) PODC , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halpern, J.4
  • 2
    • 0001415601 scopus 로고
    • Fair distribution protocols or how the players replace fortune
    • Barany, I.: Fair distribution protocols or how the players replace fortune. Mathematics of Operations Research 17, 327-340 (1992)
    • (1992) Mathematics of Operations Research , vol.17 , pp. 327-340
    • Barany, I.1
  • 3
    • 85032877753 scopus 로고
    • Non-Interactive Oblivious Transfer
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Bellare, M., Micali, S.: Non-Interactive Oblivious Transfer. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 547-557
    • Bellare, M.1    Micali, S.2
  • 4
    • 0038743071 scopus 로고    scopus 로고
    • Ben-Porath, E.: Cheap talk in games with incomplete information, Journal of Economic Theory 1.08, 45-71 (2003)
    • Ben-Porath, E.: Cheap talk in games with incomplete information, Journal of Economic Theory 1.08, 45-71 (2003)
  • 5
    • 0000621526 scopus 로고    scopus 로고
    • Correlation Without Mediation: Expanding the Set of Equilibria Outcomes by "Cheap" Pre-Play Procedures
    • Ben-Porath, E.: Correlation Without Mediation: Expanding the Set of Equilibria Outcomes by "Cheap" Pre-Play Procedures. Journal of Economic Theory 80, 108-122 (1998)
    • (1998) Journal of Economic Theory , vol.80 , pp. 108-122
    • Ben-Porath, E.1
  • 6
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 7
    • 84974555688 scopus 로고    scopus 로고
    • Dodis, Y., Halevi, S., Rabin, T.: A. Cryptographic Solution to a Game Theoretic Problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, 1880, pp. 112-130. Springer, Heidelberg (2000)
    • Dodis, Y., Halevi, S., Rabin, T.: A. Cryptographic Solution to a Game Theoretic Problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 112-130. Springer, Heidelberg (2000)
  • 8
  • 9
    • 84957040406 scopus 로고    scopus 로고
    • Garay, J., Jakobsson, M.: Timed Release of Standard Digital Signatures. In: Blaze, M. (ed.) FC 2002. LNCS, 2357, pp. 168-182. Springer, Heidelberg (2003)
    • Garay, J., Jakobsson, M.: Timed Release of Standard Digital Signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 168-182. Springer, Heidelberg (2003)
  • 10
    • 0347662287 scopus 로고    scopus 로고
    • Unmediated communication in games with complete and incomplete information
    • Gerardi, D.: Unmediated communication in games with complete and incomplete information. Journal of Economic Theory 114, 104-131 (2004)
    • (2004) Journal of Economic Theory , vol.114 , pp. 104-131
    • Gerardi, D.1
  • 11
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 12
  • 14
    • 33750018128 scopus 로고    scopus 로고
    • Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 229-241. Springer, Heidelberg (2006)
    • Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
  • 15
    • 4544259607 scopus 로고    scopus 로고
    • Rational Secret Sharing and Multiparty Computation
    • Halpern, J., Teague, V.: Rational Secret Sharing and Multiparty Computation. In: STOC, pp. 623-632 (2004)
    • (2004) STOC , pp. 623-632
    • Halpern, J.1    Teague, V.2
  • 16
    • 40249111084 scopus 로고    scopus 로고
    • Heller, Y.: A. coalition-proof cheap-talk protocol (manuscript, 2005)
    • Heller, Y.: A. coalition-proof cheap-talk protocol (manuscript, 2005)
  • 17
    • 33748582624 scopus 로고    scopus 로고
    • Rational Secure Computation and Ideal Mechanism Design
    • Izmalkov, S., Micali, S., Lepinski, M.: Rational Secure Computation and Ideal Mechanism Design. In: FOCS, pp. 585-595 (2005)
    • (2005) FOCS , pp. 585-595
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 20
    • 10444265884 scopus 로고    scopus 로고
    • Completely Fair SFE and Coalition-Safe Cheap Talk
    • Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely Fair SFE and Coalition-Safe Cheap Talk. In: PODC, pp. 1-10 (2004)
    • (2004) PODC , pp. 1-10
    • Lepinski, M.1    Micali, S.2    Peikert, C.3    Shelat, A.4
  • 21
    • 33748680791 scopus 로고    scopus 로고
    • Collusion-Free Protocols
    • Lepinski, M., Micali, S., Shelat, A.: Collusion-Free Protocols. In: STOC, pp. 543- 552 (2005)
    • (2005) STOC , pp. 543-552
    • Lepinski, M.1    Micali, S.2    Shelat, A.3
  • 22
    • 24744472288 scopus 로고    scopus 로고
    • A Proof of Yao's Protocol for Secure Two-Party Computation. In: ECCC
    • Report TR04-063
    • Lindell, Y., Pinkas, B.: A Proof of Yao's Protocol for Secure Two-Party Computation. In: ECCC, Report TR04-063 (2004)
    • (2004)
    • Lindell, Y.1    Pinkas, B.2
  • 23
    • 33749541500 scopus 로고    scopus 로고
    • Rationality and Adversarial Behavior in Multi-Party Computation
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Lysyanskaya, A., Triandopoulos, N.: Rationality and Adversarial Behavior in Multi-Party Computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 180-197
    • Lysyanskaya, A.1    Triandopoulos, N.2
  • 25
    • 35248883427 scopus 로고    scopus 로고
    • Fair Secure Two-Party Computation
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Pinkas, B.: Fair Secure Two-Party Computation, In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 87-105
    • Pinkas, B.1
  • 26
    • 0024859552 scopus 로고
    • Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
    • Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: STOC, pp. 73-85 (1989)
    • (1989) STOC , pp. 73-85
    • Rabin, T.1    Ben-Or, M.2
  • 27
    • 0344794410 scopus 로고    scopus 로고
    • A Complete Problem for Statistical Zero Knowledge
    • Sahai, A., Vadhan, S.: A Complete Problem for Statistical Zero Knowledge. Journal of the ACM 50, 196-249 (2003)
    • (2003) Journal of the ACM , vol.50 , pp. 196-249
    • Sahai, A.1    Vadhan, S.2
  • 28
  • 29
    • 25444462746 scopus 로고    scopus 로고
    • Shoham, Y., Tennenholtz, M.: Non-Cooperative Computation: Boolean Functions with Correctness and Exclusivity. TCS 343(2), 97-113 (2005)
    • Shoham, Y., Tennenholtz, M.: Non-Cooperative Computation: Boolean Functions with Correctness and Exclusivity. TCS 343(2), 97-113 (2005)
  • 30
    • 0036377456 scopus 로고
    • Computational Complexity and Communication: Coordination in Two-Player Games
    • Urbano, A., Vila, J.: Computational Complexity and Communication: Coordination in Two-Player Games. Econometrica 70, 1893-1927 (1992)
    • (1992) Econometrica , vol.70 , pp. 1893-1927
    • Urbano, A.1    Vila, J.2
  • 31
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M., Carter, L.: New hash functions and their use in authentication and set equality. JCSS 22, 265-279 (1981)
    • (1981) JCSS , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, L.2
  • 32
    • 33746074792 scopus 로고    scopus 로고
    • Oblivious Transfer is Symmetric
    • Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
    • Wolf, S., Wullschleger, J.: Oblivious Transfer is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4004 , pp. 222-232
    • Wolf, S.1    Wullschleger, J.2
  • 33
    • 0022882770 scopus 로고
    • How to Generate and Exchange Secrets
    • Yao, A.: How to Generate and Exchange Secrets. In: FOCS, pp. 162-167 (1986)
    • (1986) FOCS , pp. 162-167
    • Yao, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.