-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
Abraham, I., Dolev, D., Gonen, R., Halpern, J.Y.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: PODC 2006, pp. 53-62 (2006)
-
(2006)
PODC 2006
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.Y.4
-
2
-
-
33845400316
-
Bar fault tolerance for cooperative services
-
Aiyer, A.S., Alvisi, L., Clement, A., Dahlin, M., Martin, J.-P., Porth, C.: Bar fault tolerance for cooperative services. In: SOSP, pp. 45-58 (2005)
-
(2005)
SOSP
, pp. 45-58
-
-
Aiyer, A.S.1
Alvisi, L.2
Clement, A.3
Dahlin, M.4
Martin, J.-P.5
Porth, C.6
-
4
-
-
0000636587
-
Strategy subsets closed under rational behavior
-
Basu, K., Weibull, J.W.: Strategy subsets closed under rational behavior. Economics Letters 36, 141-146 (1991)
-
(1991)
Economics Letters
, vol.36
, pp. 141-146
-
-
Basu, K.1
Weibull, J.W.2
-
5
-
-
84898960610
-
Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)
-
Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: STOC 1988, pp. 1-10 (1988)
-
(1988)
STOC 1988
, pp. 1-10
-
-
Ben-Or, M.1
Goldwasser, S.2
Wigderson, A.3
-
7
-
-
84974588386
-
Timed commitments
-
Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
-
Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 236-254
-
-
Boneh, D.1
Naor, M.2
-
8
-
-
84898947315
-
Multiparty unconditionally secure protocols (extended abstract)
-
Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC 1988, pp. 11-19 (1988)
-
(1988)
STOC 1988
, pp. 11-19
-
-
Chaum, D.1
Crépeau, C.2
Damgård, I.3
-
9
-
-
0022199386
-
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In: FOCS, pp. 383-395. IEEE, Los Alamitos (1985)
-
Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In: FOCS, pp. 383-395. IEEE, Los Alamitos (1985)
-
-
-
-
10
-
-
70350700194
-
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: STOC, pp. 364-369. ACM, New York (1986)
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: STOC, pp. 364-369. ACM, New York (1986)
-
-
-
-
11
-
-
70350697079
-
Algorithms for Rationalizability and CURB Sets
-
Davis, G.B., Sandholm, T.W.: Algorithms for Rationalizability and CURB Sets. In: AAAI 2006 (2006)
-
(2006)
AAAI
-
-
Davis, G.B.1
Sandholm, T.W.2
-
12
-
-
0022080529
-
A randomized protocol for signing contracts
-
Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
-
(1985)
Commun. ACM
, vol.28
, Issue.6
, pp. 637-647
-
-
Even, S.1
Goldreich, O.2
Lempel, A.3
-
13
-
-
0036957186
-
A BGP-based mechanism for lowest-cost routing
-
Feigenbaum, J., Papadimitriou, C., Sami, R., Shenker, S.: A BGP-based mechanism for lowest-cost routing. In: PODC, pp. 173-182 (2002)
-
(2002)
PODC
, pp. 173-182
-
-
Feigenbaum, J.1
Papadimitriou, C.2
Sami, R.3
Shenker, S.4
-
14
-
-
0035416195
-
Sharing the cost of multicast transmissions
-
Feigenbaum, J., Papadimitriou, C.H., Shenker, S.: Sharing the cost of multicast transmissions. Journal of Computer and System Sciences 63, 21-41 (2001)
-
(2001)
Journal of Computer and System Sciences
, vol.63
, pp. 21-41
-
-
Feigenbaum, J.1
Papadimitriou, C.H.2
Shenker, S.3
-
16
-
-
70350660397
-
Efficient rational secret sharing in the standard communication model. Cryptology ePrint Archive
-
Report 2008/488
-
Fuchsbauer, G., Katz, J., Levieil, E., Naccache, D.: Efficient rational secret sharing in the standard communication model. Cryptology ePrint Archive, Report 2008/488 (2008), http://eprint.iacr.org/
-
(2008)
-
-
Fuchsbauer, G.1
Katz, J.2
Levieil, E.3
Naccache, D.4
-
18
-
-
0023545076
-
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
-
-
-
-
19
-
-
33750018128
-
-
Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 229-241. Springer, Heidelberg (2006)
-
Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
-
-
-
-
20
-
-
4544259607
-
-
Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Babai, L. (ed.) STOC, pp. 623-632. ACM, New York (2004)
-
Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Babai, L. (ed.) STOC, pp. 623-632. ACM, New York (2004)
-
-
-
-
21
-
-
33748582624
-
Rational secure computation and ideal mechanism design. In: FOCS
-
Los Alamitos
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: FOCS, pp. 585-595. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Computer Society
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
22
-
-
8344250976
-
Large robust games
-
Kalai, E.: Large robust games. Econometrica 72(6), 1631-1665 (2004)
-
(2004)
Econometrica
, vol.72
, Issue.6
, pp. 1631-1665
-
-
Kalai, E.1
-
23
-
-
40249118370
-
-
Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 251-272. Springer, Heidelberg (2008)
-
Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
-
-
-
-
24
-
-
40249088241
-
-
Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 320-339. Springer, Heidelberg (2008)
-
Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
-
-
-
-
25
-
-
57049100461
-
-
Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423-432. ACM, New York (2008)
-
Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423-432. ACM, New York (2008)
-
-
-
-
26
-
-
20744441823
-
Online ascending auctions for gradually expiring goods
-
Lavi, R., Nisan, N.: Online ascending auctions for gradually expiring goods. In: SODA 2005 (2005)
-
(2005)
SODA
-
-
Lavi, R.1
Nisan, N.2
-
27
-
-
0242550383
-
Truth revelation in approximately efficient combinatorial auctions
-
Lehmann, D., O'Callaghan, L.I., Shoham, Y.: Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM 49(5)
-
Journal of the ACM
, vol.49
, Issue.5
-
-
Lehmann, D.1
O'Callaghan, L.I.2
Shoham, Y.3
-
28
-
-
10444265884
-
Completely fair sfe and coalitionsafe cheap talk
-
Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair sfe and coalitionsafe cheap talk. In: PODC 2004, pp. 1-10 (2004)
-
(2004)
PODC 2004
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
29
-
-
33748680791
-
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 543-552. ACM, New York (2005)
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 543-552. ACM, New York (2005)
-
-
-
-
30
-
-
33749541500
-
Rationality and adversarial behavior in multiparty computation
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 180-197
-
-
Lysyanskaya, A.1
Triandopoulos, N.2
-
31
-
-
84926119183
-
-
TARK, pp
-
McGrew, R., Porter, R., Shoham, Y.: Towards a general theory of non-cooperative computation. In: TARK, pp. 59-71 (2003)
-
(2003)
Towards a general theory of non-cooperative computation
, pp. 59-71
-
-
McGrew, R.1
Porter, R.2
Shoham, Y.3
-
33
-
-
70350689268
-
-
manuscript
-
O'Neill, A., Sangwan, A.: Honesty, rationality, and malice in secret sharing and MPC: Robust protocols for real-world populations (manuscript, 2008)
-
(2008)
Honesty, rationality, and malice in secret sharing and MPC: Robust protocols for real-world populations
-
-
O'Neill, A.1
Sangwan, A.2
-
34
-
-
70350698882
-
-
April 2007
-
Ong, S.J., Parkes, D., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority (April 2007), http://eecs.harvard.edu/~salil/ Fairness-abs.html
-
Fairness with an honest minority and a rational majority
-
-
Ong, S.J.1
Parkes, D.2
Rosen, A.3
Vadhan, S.4
-
35
-
-
70350670981
-
Fairness with an honest minority and a rational majority. Cryptology ePrint Archive
-
Report 2008/097 March
-
Ong, S.J., Parkes, D., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority. Cryptology ePrint Archive, Report 2008/097 (March 2008), http://eprint.iacr.org/
-
(2008)
-
-
Ong, S.J.1
Parkes, D.2
Rosen, A.3
Vadhan, S.4
-
36
-
-
4544268528
-
Distributed implementations of Vickrey-Clarke-Groves mechanisms
-
Parkes, D.C., Shneidman, J.: Distributed implementations of Vickrey-Clarke-Groves mechanisms. In: Proc. 3rd AAMAS, pp. 261-268 (2004)
-
(2004)
Proc. 3rd AAMAS
, pp. 261-268
-
-
Parkes, D.C.1
Shneidman, J.2
-
37
-
-
34247224323
-
-
Petcu, A., Faltings, B., Parkes, D.: M-dpop: Faithful distributed implementation of efficient social choice problems. In: AAMAS 2006, pp. 1397-1404 (May 2006)
-
Petcu, A., Faltings, B., Parkes, D.: M-dpop: Faithful distributed implementation of efficient social choice problems. In: AAMAS 2006, pp. 1397-1404 (May 2006)
-
-
-
-
38
-
-
35248883427
-
Fair secure two-party computation
-
Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
-
Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
, pp. 87-105
-
-
Pinkas, B.1
-
39
-
-
0024859552
-
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85. ACM, New York (1989)
-
Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85. ACM, New York (1989)
-
-
-
-
40
-
-
33747856809
-
A reexamination of the perfectness concept for equilibrium points in extensive games
-
Selten, R.: A reexamination of the perfectness concept for equilibrium points in extensive games. International Journal of Game Theory 4, 25-55 (1975)
-
(1975)
International Journal of Game Theory
, vol.4
, pp. 25-55
-
-
Selten, R.1
-
41
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
42
-
-
10444240238
-
Specification faithfulness in networks with rational nodes
-
St. John's, Canada
-
Shneidman, J., Parkes, D.C.: Specification faithfulness in networks with rational nodes. In: PODC 2004, St. John's, Canada (2004)
-
(2004)
PODC
-
-
Shneidman, J.1
Parkes, D.C.2
-
43
-
-
25444462746
-
Non-cooperative computation: Boolean functions with correctness and exclusivity
-
Shoham, Y., Tennenholtz, M.: Non-cooperative computation: Boolean functions with correctness and exclusivity. Theor. Comput. Sci. 343(1-2), 97-113 (2005)
-
(2005)
Theor. Comput. Sci
, vol.343
, Issue.1-2
, pp. 97-113
-
-
Shoham, Y.1
Tennenholtz, M.2
-
44
-
-
0019572642
-
New hash functions and their use in authentication and set equality
-
Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265-279 (1981)
-
(1981)
J. Comput. Syst. Sci
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, L.2
-
45
-
-
0022882770
-
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)
-
Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)
-
-
-
|