메뉴 건너뛰기




Volumn 5444 LNCS, Issue , 2009, Pages 36-53

Fairness with an honest minority and a rational majority

Author keywords

Fairness; Game theory; Secret sharing

Indexed keywords

BROADCAST CHANNELS; COMMUNICATION CHANNEL; EARLY STOPPING; ECONOMIC MODELS; EXCHANGE OF INFORMATION; FAIRNESS; HIGH PROBABILITY; SECRET RECONSTRUCTION; SECRET SHARING; SIMPLE PROTOCOL; THRESHOLD SECRET SHARING;

EID: 70350273678     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-00457-5_3     Document Type: Conference Paper
Times cited : (76)

References (45)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
    • Abraham, I., Dolev, D., Gonen, R., Halpern, J.Y.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: PODC 2006, pp. 53-62 (2006)
    • (2006) PODC 2006 , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halpern, J.Y.4
  • 4
    • 0000636587 scopus 로고
    • Strategy subsets closed under rational behavior
    • Basu, K., Weibull, J.W.: Strategy subsets closed under rational behavior. Economics Letters 36, 141-146 (1991)
    • (1991) Economics Letters , vol.36 , pp. 141-146
    • Basu, K.1    Weibull, J.W.2
  • 5
    • 84898960610 scopus 로고
    • Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract)
    • Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation (extended abstract). In: STOC 1988, pp. 1-10 (1988)
    • (1988) STOC 1988 , pp. 1-10
    • Ben-Or, M.1    Goldwasser, S.2    Wigderson, A.3
  • 7
    • 84974588386 scopus 로고    scopus 로고
    • Timed commitments
    • Bellare, M, ed, CRYPTO 2000, Springer, Heidelberg
    • Boneh, D., Naor, M.: Timed commitments. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 236-254. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 236-254
    • Boneh, D.1    Naor, M.2
  • 8
    • 84898947315 scopus 로고
    • Multiparty unconditionally secure protocols (extended abstract)
    • Chaum, D., Crépeau, C., Damgård, I.: Multiparty unconditionally secure protocols (extended abstract). In: STOC 1988, pp. 11-19 (1988)
    • (1988) STOC 1988 , pp. 11-19
    • Chaum, D.1    Crépeau, C.2    Damgård, I.3
  • 9
    • 0022199386 scopus 로고    scopus 로고
    • Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In: FOCS, pp. 383-395. IEEE, Los Alamitos (1985)
    • Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults (extended abstract). In: FOCS, pp. 383-395. IEEE, Los Alamitos (1985)
  • 10
    • 70350700194 scopus 로고    scopus 로고
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: STOC, pp. 364-369. ACM, New York (1986)
    • Cleve, R.: Limits on the security of coin flips when half the processors are faulty (extended abstract). In: STOC, pp. 364-369. ACM, New York (1986)
  • 11
    • 70350697079 scopus 로고    scopus 로고
    • Algorithms for Rationalizability and CURB Sets
    • Davis, G.B., Sandholm, T.W.: Algorithms for Rationalizability and CURB Sets. In: AAAI 2006 (2006)
    • (2006) AAAI
    • Davis, G.B.1    Sandholm, T.W.2
  • 12
    • 0022080529 scopus 로고
    • A randomized protocol for signing contracts
    • Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637-647 (1985)
    • (1985) Commun. ACM , vol.28 , Issue.6 , pp. 637-647
    • Even, S.1    Goldreich, O.2    Lempel, A.3
  • 13
  • 16
    • 70350660397 scopus 로고    scopus 로고
    • Efficient rational secret sharing in the standard communication model. Cryptology ePrint Archive
    • Report 2008/488
    • Fuchsbauer, G., Katz, J., Levieil, E., Naccache, D.: Efficient rational secret sharing in the standard communication model. Cryptology ePrint Archive, Report 2008/488 (2008), http://eprint.iacr.org/
    • (2008)
    • Fuchsbauer, G.1    Katz, J.2    Levieil, E.3    Naccache, D.4
  • 17
  • 18
    • 0023545076 scopus 로고    scopus 로고
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
    • Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game or a completeness theorem for protocols with honest majority. In: STOC, pp. 218-229. ACM, New York (1987)
  • 19
    • 33750018128 scopus 로고    scopus 로고
    • Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 229-241. Springer, Heidelberg (2006)
    • Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
  • 20
    • 4544259607 scopus 로고    scopus 로고
    • Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Babai, L. (ed.) STOC, pp. 623-632. ACM, New York (2004)
    • Halpern, J.Y., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Babai, L. (ed.) STOC, pp. 623-632. ACM, New York (2004)
  • 21
    • 33748582624 scopus 로고    scopus 로고
    • Rational secure computation and ideal mechanism design. In: FOCS
    • Los Alamitos
    • Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: FOCS, pp. 585-595. IEEE Computer Society, Los Alamitos (2005)
    • (2005) IEEE Computer Society , pp. 585-595
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 22
    • 8344250976 scopus 로고    scopus 로고
    • Large robust games
    • Kalai, E.: Large robust games. Econometrica 72(6), 1631-1665 (2004)
    • (2004) Econometrica , vol.72 , Issue.6 , pp. 1631-1665
    • Kalai, E.1
  • 23
    • 40249118370 scopus 로고    scopus 로고
    • Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 251-272. Springer, Heidelberg (2008)
    • Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
  • 24
    • 40249088241 scopus 로고    scopus 로고
    • Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 320-339. Springer, Heidelberg (2008)
    • Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
  • 25
    • 57049100461 scopus 로고    scopus 로고
    • Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423-432. ACM, New York (2008)
    • Kol, G., Naor, M.: Games for exchanging information. In: STOC, pp. 423-432. ACM, New York (2008)
  • 26
    • 20744441823 scopus 로고    scopus 로고
    • Online ascending auctions for gradually expiring goods
    • Lavi, R., Nisan, N.: Online ascending auctions for gradually expiring goods. In: SODA 2005 (2005)
    • (2005) SODA
    • Lavi, R.1    Nisan, N.2
  • 27
    • 0242550383 scopus 로고    scopus 로고
    • Truth revelation in approximately efficient combinatorial auctions
    • Lehmann, D., O'Callaghan, L.I., Shoham, Y.: Truth revelation in approximately efficient combinatorial auctions. Journal of the ACM 49(5)
    • Journal of the ACM , vol.49 , Issue.5
    • Lehmann, D.1    O'Callaghan, L.I.2    Shoham, Y.3
  • 28
    • 10444265884 scopus 로고    scopus 로고
    • Completely fair sfe and coalitionsafe cheap talk
    • Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair sfe and coalitionsafe cheap talk. In: PODC 2004, pp. 1-10 (2004)
    • (2004) PODC 2004 , pp. 1-10
    • Lepinski, M.1    Micali, S.2    Peikert, C.3    Shelat, A.4
  • 29
    • 33748680791 scopus 로고    scopus 로고
    • Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 543-552. ACM, New York (2005)
    • Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 543-552. ACM, New York (2005)
  • 30
    • 33749541500 scopus 로고    scopus 로고
    • Rationality and adversarial behavior in multiparty computation
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multiparty computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 180-197
    • Lysyanskaya, A.1    Triandopoulos, N.2
  • 35
    • 70350670981 scopus 로고    scopus 로고
    • Fairness with an honest minority and a rational majority. Cryptology ePrint Archive
    • Report 2008/097 March
    • Ong, S.J., Parkes, D., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority. Cryptology ePrint Archive, Report 2008/097 (March 2008), http://eprint.iacr.org/
    • (2008)
    • Ong, S.J.1    Parkes, D.2    Rosen, A.3    Vadhan, S.4
  • 36
    • 4544268528 scopus 로고    scopus 로고
    • Distributed implementations of Vickrey-Clarke-Groves mechanisms
    • Parkes, D.C., Shneidman, J.: Distributed implementations of Vickrey-Clarke-Groves mechanisms. In: Proc. 3rd AAMAS, pp. 261-268 (2004)
    • (2004) Proc. 3rd AAMAS , pp. 261-268
    • Parkes, D.C.1    Shneidman, J.2
  • 37
    • 34247224323 scopus 로고    scopus 로고
    • Petcu, A., Faltings, B., Parkes, D.: M-dpop: Faithful distributed implementation of efficient social choice problems. In: AAMAS 2006, pp. 1397-1404 (May 2006)
    • Petcu, A., Faltings, B., Parkes, D.: M-dpop: Faithful distributed implementation of efficient social choice problems. In: AAMAS 2006, pp. 1397-1404 (May 2006)
  • 38
    • 35248883427 scopus 로고    scopus 로고
    • Fair secure two-party computation
    • Biham, E, ed, EUROCRYPT 2003, Springer, Heidelberg
    • Pinkas, B.: Fair secure two-party computation. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 87-105. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2656 , pp. 87-105
    • Pinkas, B.1
  • 39
    • 0024859552 scopus 로고    scopus 로고
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85. ACM, New York (1989)
    • Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority (extended abstract). In: STOC, pp. 73-85. ACM, New York (1989)
  • 40
    • 33747856809 scopus 로고
    • A reexamination of the perfectness concept for equilibrium points in extensive games
    • Selten, R.: A reexamination of the perfectness concept for equilibrium points in extensive games. International Journal of Game Theory 4, 25-55 (1975)
    • (1975) International Journal of Game Theory , vol.4 , pp. 25-55
    • Selten, R.1
  • 41
    • 0018545449 scopus 로고
    • How to share a secret
    • Shamir, A.: How to share a secret. Commun. ACM 22(11), 612-613 (1979)
    • (1979) Commun. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 42
    • 10444240238 scopus 로고    scopus 로고
    • Specification faithfulness in networks with rational nodes
    • St. John's, Canada
    • Shneidman, J., Parkes, D.C.: Specification faithfulness in networks with rational nodes. In: PODC 2004, St. John's, Canada (2004)
    • (2004) PODC
    • Shneidman, J.1    Parkes, D.C.2
  • 43
    • 25444462746 scopus 로고    scopus 로고
    • Non-cooperative computation: Boolean functions with correctness and exclusivity
    • Shoham, Y., Tennenholtz, M.: Non-cooperative computation: Boolean functions with correctness and exclusivity. Theor. Comput. Sci. 343(1-2), 97-113 (2005)
    • (2005) Theor. Comput. Sci , vol.343 , Issue.1-2 , pp. 97-113
    • Shoham, Y.1    Tennenholtz, M.2
  • 44
    • 0019572642 scopus 로고
    • New hash functions and their use in authentication and set equality
    • Wegman, M.N., Carter, L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265-279 (1981)
    • (1981) J. Comput. Syst. Sci , vol.22 , Issue.3 , pp. 265-279
    • Wegman, M.N.1    Carter, L.2
  • 45
    • 0022882770 scopus 로고    scopus 로고
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)
    • Yao, A.C.-C.: How to generate and exchange secrets (extended abstract). In: FOCS, pp. 162-167. IEEE, Los Alamitos (1986)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.