-
1
-
-
33748686155
-
Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation
-
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation. In: PODC, pp. 53-62 (2006)
-
(2006)
PODC
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.4
-
2
-
-
0001415601
-
Fair distribution protocols or how the players replace fortune
-
Barany, I.: Fair distribution protocols or how the players replace fortune. Mathematics of Operations Research 17, 327-340 (1992)
-
(1992)
Mathematics of Operations Research
, vol.17
, pp. 327-340
-
-
Barany, I.1
-
3
-
-
85032877753
-
Non-Interactive Oblivious Transfer
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Bellare, M., Micali, S.: Non-Interactive Oblivious Transfer. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 547-557. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 547-557
-
-
Bellare, M.1
Micali, S.2
-
4
-
-
0038743071
-
-
Ben-Porath, E.: Cheap talk in games with incomplete information, Journal of Economic Theory 1.08, 45-71 (2003)
-
Ben-Porath, E.: Cheap talk in games with incomplete information, Journal of Economic Theory 1.08, 45-71 (2003)
-
-
-
-
5
-
-
0000621526
-
Correlation Without Mediation: Expanding the Set of Equilibria Outcomes by "Cheap" Pre-Play Procedures
-
Ben-Porath, E.: Correlation Without Mediation: Expanding the Set of Equilibria Outcomes by "Cheap" Pre-Play Procedures. Journal of Economic Theory 80, 108-122 (1998)
-
(1998)
Journal of Economic Theory
, vol.80
, pp. 108-122
-
-
Ben-Porath, E.1
-
6
-
-
84974588386
-
Timed commitments
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
7
-
-
84974555688
-
-
Dodis, Y., Halevi, S., Rabin, T.: A. Cryptographic Solution to a Game Theoretic Problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, 1880, pp. 112-130. Springer, Heidelberg (2000)
-
Dodis, Y., Halevi, S., Rabin, T.: A. Cryptographic Solution to a Game Theoretic Problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 112-130. Springer, Heidelberg (2000)
-
-
-
-
8
-
-
0022080529
-
A Randomized Protocol for Signing Contracts
-
Even, S., Goldreich, O., Lempel, A.: A Randomized Protocol for Signing Contracts. Communications of the ACM 28(6), 637-647 (1985)
-
(1985)
Communications of the ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
9
-
-
84957040406
-
-
Garay, J., Jakobsson, M.: Timed Release of Standard Digital Signatures. In: Blaze, M. (ed.) FC 2002. LNCS, 2357, pp. 168-182. Springer, Heidelberg (2003)
-
Garay, J., Jakobsson, M.: Timed Release of Standard Digital Signatures. In: Blaze, M. (ed.) FC 2002. LNCS, vol. 2357, pp. 168-182. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
0347662287
-
Unmediated communication in games with complete and incomplete information
-
Gerardi, D.: Unmediated communication in games with complete and incomplete information. Journal of Economic Theory 114, 104-131 (2004)
-
(2004)
Journal of Economic Theory
, vol.114
, pp. 104-131
-
-
Gerardi, D.1
-
11
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
12
-
-
0023545076
-
How to Play any Mental Game
-
Goldreich, O., Micali, S., Wigderson, A.: How to Play any Mental Game. In: STOC, pp. 218-229 (1987)
-
(1987)
STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
14
-
-
33750018128
-
-
Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 229-241. Springer, Heidelberg (2006)
-
Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
-
-
-
-
15
-
-
4544259607
-
Rational Secret Sharing and Multiparty Computation
-
Halpern, J., Teague, V.: Rational Secret Sharing and Multiparty Computation. In: STOC, pp. 623-632 (2004)
-
(2004)
STOC
, pp. 623-632
-
-
Halpern, J.1
Teague, V.2
-
16
-
-
40249111084
-
-
Heller, Y.: A. coalition-proof cheap-talk protocol (manuscript, 2005)
-
Heller, Y.: A. coalition-proof cheap-talk protocol (manuscript, 2005)
-
-
-
-
17
-
-
33748582624
-
Rational Secure Computation and Ideal Mechanism Design
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational Secure Computation and Ideal Mechanism Design. In: FOCS, pp. 585-595 (2005)
-
(2005)
FOCS
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
20
-
-
10444265884
-
Completely Fair SFE and Coalition-Safe Cheap Talk
-
Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely Fair SFE and Coalition-Safe Cheap Talk. In: PODC, pp. 1-10 (2004)
-
(2004)
PODC
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
21
-
-
33748680791
-
Collusion-Free Protocols
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-Free Protocols. In: STOC, pp. 543- 552 (2005)
-
(2005)
STOC
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
22
-
-
24744472288
-
A Proof of Yao's Protocol for Secure Two-Party Computation. In: ECCC
-
Report TR04-063
-
Lindell, Y., Pinkas, B.: A Proof of Yao's Protocol for Secure Two-Party Computation. In: ECCC, Report TR04-063 (2004)
-
(2004)
-
-
Lindell, Y.1
Pinkas, B.2
-
23
-
-
33749541500
-
Rationality and Adversarial Behavior in Multi-Party Computation
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Lysyanskaya, A., Triandopoulos, N.: Rationality and Adversarial Behavior in Multi-Party Computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 180-197
-
-
Lysyanskaya, A.1
Triandopoulos, N.2
-
25
-
-
35248883427
-
Fair Secure Two-Party Computation
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Pinkas, B.: Fair Secure Two-Party Computation, In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 87-105
-
-
Pinkas, B.1
-
26
-
-
0024859552
-
Verifiable Secret Sharing and Multiparty Protocols with Honest Majority
-
Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with Honest Majority. In: STOC, pp. 73-85 (1989)
-
(1989)
STOC
, pp. 73-85
-
-
Rabin, T.1
Ben-Or, M.2
-
27
-
-
0344794410
-
A Complete Problem for Statistical Zero Knowledge
-
Sahai, A., Vadhan, S.: A Complete Problem for Statistical Zero Knowledge. Journal of the ACM 50, 196-249 (2003)
-
(2003)
Journal of the ACM
, vol.50
, pp. 196-249
-
-
Sahai, A.1
Vadhan, S.2
-
28
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22, 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
29
-
-
25444462746
-
-
Shoham, Y., Tennenholtz, M.: Non-Cooperative Computation: Boolean Functions with Correctness and Exclusivity. TCS 343(2), 97-113 (2005)
-
Shoham, Y., Tennenholtz, M.: Non-Cooperative Computation: Boolean Functions with Correctness and Exclusivity. TCS 343(2), 97-113 (2005)
-
-
-
-
30
-
-
0036377456
-
Computational Complexity and Communication: Coordination in Two-Player Games
-
Urbano, A., Vila, J.: Computational Complexity and Communication: Coordination in Two-Player Games. Econometrica 70, 1893-1927 (1992)
-
(1992)
Econometrica
, vol.70
, pp. 1893-1927
-
-
Urbano, A.1
Vila, J.2
-
31
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M., Carter, L.: New hash functions and their use in authentication and set equality. JCSS 22, 265-279 (1981)
-
(1981)
JCSS
, vol.22
, pp. 265-279
-
-
Wegman, M.1
Carter, L.2
-
32
-
-
33746074792
-
Oblivious Transfer is Symmetric
-
Vaudenay, S, ed, EUROCRYPT 2006, Springer, Heidelberg
-
Wolf, S., Wullschleger, J.: Oblivious Transfer is Symmetric. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 222-232. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4004
, pp. 222-232
-
-
Wolf, S.1
Wullschleger, J.2
-
33
-
-
0022882770
-
How to Generate and Exchange Secrets
-
Yao, A.: How to Generate and Exchange Secrets. In: FOCS, pp. 162-167 (1986)
-
(1986)
FOCS
, pp. 162-167
-
-
Yao, A.1
|