메뉴 건너뛰기




Volumn , Issue , 2004, Pages 623-632

Rational secret sharing and multiparty computation: Extended abstract

Author keywords

Game Theory; Iterated deletion of weakly dominated strategies; Multiparty computation; Non cooperative computing; Secret sharing

Indexed keywords

INTERATED DELETION OF WEAKLY DOMINATED STRATEGIES; MULTIPARTY COMPUTATION; NON-COOPERATIVE COMPUTING; SECRET SHARING;

EID: 4544259607     PISSN: 07349025     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (312)

References (20)
  • 2
    • 84976804419 scopus 로고
    • How to exchange (secret) keys
    • M. Blum. How to exchange (secret) keys. ACM Trans. on Computer Systems, 1(2):175-193, 1983.
    • (1983) ACM Trans. on Computer Systems , vol.1 , Issue.2 , pp. 175-193
    • Blum, M.1
  • 3
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Lecture Notes in Computer Science. Springer-Verlag
    • D. Boneh and M. Naor. Timed commitments. In Proc. CRYPTO 2000, Lecture Notes in Computer Science, Volume 1880, pages 236-254. Springer-Verlag, 2000.
    • (2000) Proc. CRYPTO 2000 , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 7
    • 85032862578 scopus 로고
    • Controlled gradual disclosure schemes for random bits and their applications
    • R. Cleve. Controlled gradual disclosure schemes for random bits and their applications. In Proc. CRYPTO '89, pages 573-588, 1989.
    • (1989) Proc. CRYPTO '89 , pp. 573-588
    • Cleve, R.1
  • 8
    • 0029362450 scopus 로고
    • Practical and provably secure release of a secret and exchange of signatures
    • I. Damgård. Practical and provably secure release of a secret and exchange of signatures. Journal of Cryptology, 8(4):201-222, 1995.
    • (1995) Journal of Cryptology , vol.8 , Issue.4 , pp. 201-222
    • Damgård, I.1
  • 9
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • S. Even, O. Goldreich, and A. Lempel. A randomized protocol for signing contracts. Communications of the ACM, 28(6):637-647, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 12
    • 0003979335 scopus 로고    scopus 로고
    • Cambridge University Press. To appear
    • O. Goldreich. Foundations of Cryptography, Vol. 2. Cambridge University Press, 2004. To appear; draft available at www.wisdom.weizmann.ac.il/~oded/foc. html.
    • (2004) Foundations of Cryptography , vol.2
    • Goldreich, O.1
  • 19
    • 4544297759 scopus 로고    scopus 로고
    • Non-cooperative computing: Boolean functions with correctness and exclusivity
    • To appear. Also available at iew3.technion.ac.il/~moshet/NCC-TCS.pdf
    • Y. Shoham and M. Tennenholtz. Non-cooperative computing: Boolean functions with correctness and exclusivity. Theoretical Computer Science, 2004. To appear. Also available at iew3.technion.ac.il/~moshet/NCC-TCS.pdf.
    • (2004) Theoretical Computer Science
    • Shoham, Y.1    Tennenholtz, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.