메뉴 건너뛰기




Volumn 5677 LNCS, Issue , 2009, Pages 559-576

Utility dependence in correct and fair rational secret sharing

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHIC COMPUTATIONS; NON-SIMULTANEOUS; PUBLIC KNOWLEDGE; SECRET SHARING; STANDARD ASSUMPTIONS; UTILITY FUNCTIONS;

EID: 70350343370     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-03356-8_33     Document Type: Conference Paper
Times cited : (37)

References (16)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation
    • Abraham, I., Dolev, D., Gonen, R., Halpern, J.Y.: Distributed Computing Meets Game Theory: Robust Mechanisms for Rational Secret Sharing and Multiparty Computation. In: The 25th PODC, pp. 53-62 (2006)
    • (2006) The 25th PODC , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halpern, J.Y.4
  • 2
    • 0012610677 scopus 로고
    • Limits on the Security of Coin Flips when Half the Processors are Faulty
    • Cleve, R.: Limits on the Security of Coin Flips when Half the Processors are Faulty. In: 18th STOC, pp. 364-369 (1986)
    • (1986) 18th STOC , pp. 364-369
    • Cleve, R.1
  • 3
    • 70350294929 scopus 로고    scopus 로고
    • Cryptography and Game Theory
    • Cambridge University Press, Cambridge
    • Dodis, Y., Rabin, T.: Cryptography and Game Theory. In: Algorithmic Game Theory. Cambridge University Press, Cambridge (2007)
    • (2007) Algorithmic Game Theory
    • Dodis, Y.1    Rabin, T.2
  • 4
    • 33645593031 scopus 로고    scopus 로고
    • Foundations of Cryptography
    • Cambridge University Press, Cambridge
    • Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
    • (2004) Basic Applications , vol.2
    • Goldreich, O.1
  • 5
    • 33750018128 scopus 로고    scopus 로고
    • Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 229-241. Springer, Heidelberg (2006)
    • Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
  • 6
    • 4544259607 scopus 로고    scopus 로고
    • Rational Secret Sharing and Multiparty Computation
    • Halpern, J., Teague, V.: Rational Secret Sharing and Multiparty Computation. In: The 36th STOC, pp. 623-632 (2004)
    • (2004) The 36th STOC , pp. 623-632
    • Halpern, J.1    Teague, V.2
  • 7
    • 70350281823 scopus 로고    scopus 로고
    • Fuchsbauer, G., Katz, J., Levieil, E., Naccache, D.: Efficient Rational Secret Sharing in the Standard Communication Model. Cryptology ePrint Archive, Report #2008/488 (2008)
    • Fuchsbauer, G., Katz, J., Levieil, E., Naccache, D.: Efficient Rational Secret Sharing in the Standard Communication Model. Cryptology ePrint Archive, Report #2008/488 (2008)
  • 8
    • 40249118370 scopus 로고    scopus 로고
    • Katz, J.: Bridging Game Theory and Cryptography: Recent Results and Future Directions. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 251-272. Springer, Heidelberg (2008)
    • Katz, J.: Bridging Game Theory and Cryptography: Recent Results and Future Directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
  • 9
    • 40249088241 scopus 로고    scopus 로고
    • Kol, G., Naor, M.: Cryptography and Game Theory: Designing Protocols for Exchanging Information. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 320-339. Springer, Heidelberg (2008)
    • Kol, G., Naor, M.: Cryptography and Game Theory: Designing Protocols for Exchanging Information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
  • 10
    • 57049100461 scopus 로고    scopus 로고
    • Games for Exchanging Information
    • Kol, G., Naor, M.: Games for Exchanging Information. In: The 40th STOC, pp. 423-432 (2008)
    • (2008) The 40th STOC , pp. 423-432
    • Kol, G.1    Naor, M.2
  • 11
    • 33748582624 scopus 로고    scopus 로고
    • Rational Secure Computation and Ideal Mechanism Design
    • Izmalkov, S., Micali, S., Lepinski, M.: Rational Secure Computation and Ideal Mechanism Design. In: The 46th FOCS, pp. 585-595 (2005)
    • (2005) The 46th FOCS , pp. 585-595
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 14
    • 33749541500 scopus 로고    scopus 로고
    • Rationality and Adversarial Behavior in Multiparty Computation
    • Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
    • Lysyanskaya, A., Triandopoulos, N.: Rationality and Adversarial Behavior in Multiparty Computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4117 , pp. 180-197
    • Lysyanskaya, A.1    Triandopoulos, N.2
  • 15
    • 0018545449 scopus 로고
    • How to Share a Secret
    • Shamir, A.: How to Share a Secret. Communications of the ACM 22(11), 612-613 (1979)
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 16
    • 70350273678 scopus 로고    scopus 로고
    • Fairness with an Honest Minority and a Rational Majority
    • The 6th TCC, Springer, Heidelberg
    • Ong, S.J., Parkes, D., Rosen, A., Vadhan, S.: Fairness with an Honest Minority and a Rational Majority. In: The 6th TCC. LNCS, vol. 5444, pp. 36-53. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5444 , pp. 36-53
    • Ong, S.J.1    Parkes, D.2    Rosen, A.3    Vadhan, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.