-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
ACM Press, New York
-
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: 25th ACM Symposium Annual on Principles of Distributed Computing, pp. 53-62. ACM Press, New York (2006)
-
(2006)
25th ACM Symposium Annual on Principles of Distributed Computing
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.4
-
2
-
-
70350304833
-
Collusion-free multiparty computation in the mediated model
-
Halevi, S, ed, CRYPTO 2009, Springer, Heidelberg
-
Alwen, J., Katz, J., Lindell, Y., Persiano, G., Shelat, A., Visconti, I.: Collusion-free multiparty computation in the mediated model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 524-540. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 524-540
-
-
Alwen, J.1
Katz, J.2
Lindell, Y.3
Persiano, G.4
Shelat, A.5
Visconti, I.6
-
3
-
-
51849140874
-
Collusion-free protocols in the mediated model
-
Wagner, D, ed, CRYPTO 2008, Springer, Heidelberg
-
Alwen, J., Shelat, A., Visconti, I.: Collusion-free protocols in the mediated model. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 497-514. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 497-514
-
-
Alwen, J.1
Shelat, A.2
Visconti, I.3
-
4
-
-
70350343370
-
-
Asharov, G., Lindell, Y.: Utility dependence in correct and fair rational secret sharing. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, 5677, pp. 559-576. Springer, Heidelberg (2009), A full version, containing additional results: http://eprint.iacr.org/209/373
-
Asharov, G., Lindell, Y.: Utility dependence in correct and fair rational secret sharing. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 559-576. Springer, Heidelberg (2009), A full version, containing additional results: http://eprint.iacr.org/209/373
-
-
-
-
6
-
-
84958742006
-
-
Dodis, Y.: Efficient construction of (distributed) verifiable random functions. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, 2567, pp. 1-17. Springer, Heidelberg (2002)
-
Dodis, Y.: Efficient construction of (distributed) verifiable random functions. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 1-17. Springer, Heidelberg (2002)
-
-
-
-
7
-
-
70350294929
-
Cryptography and game theory
-
Nisan, N, Roughgarden, T, Tardos, E, Vazirani, V, eds, Cambridge University Press, Cambridge
-
Dodis, Y., Rabin, T.: Cryptography and game theory. In: Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V. (eds.) Algorithmic Game Theory, pp. 181-207. Cambridge University Press, Cambridge (2007)
-
(2007)
Algorithmic Game Theory
, pp. 181-207
-
-
Dodis, Y.1
Rabin, T.2
-
8
-
-
24144481228
-
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, 3386, pp. 416-431. Springer, Heidelberg (2005)
-
Dodis, Y., Yampolskiy, A.: A verifiable random function with short proofs and keys. In: Vaudenay, S. (ed.) PKC 2005. LNCS, vol. 3386, pp. 416-431. Springer, Heidelberg (2005)
-
-
-
-
10
-
-
57049135299
-
Complete fairness in secure two-party computation
-
ACM Press, New York
-
Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure two-party computation. In: 40th Annual ACM Symposium on Theory of Computing (STOC), pp. 413-422. ACM Press, New York (2008)
-
(2008)
40th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 413-422
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
11
-
-
33750018128
-
-
Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, 4116, pp. 229-241. Springer, Heidelberg (2006)
-
Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
-
-
-
-
13
-
-
4544259607
-
Rational secret sharing and multiparty computation: Extended abstract
-
ACM Press, New York
-
Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: Extended abstract. In: 36th Annual ACM Symposium on Theory of Computing (STOC), pp. 623-632. ACM Press, New York (2004)
-
(2004)
36th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 623-632
-
-
Halpern, J.1
Teague, V.2
-
14
-
-
40249119683
-
-
Izmalkov, S., Lepinski, M., Micali, S.: Verifiably secure devices. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 273-301. Springer, Heidelberg (2008)
-
Izmalkov, S., Lepinski, M., Micali, S.: Verifiably secure devices. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 273-301. Springer, Heidelberg (2008)
-
-
-
-
15
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
IEEE, Los Alamitos
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: 46th Annual Symposium on Foundations of Computer Science (FOCS), pp. 585-595. IEEE, Los Alamitos (2005)
-
(2005)
46th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
16
-
-
40249118370
-
-
Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 251-272. Springer, Heidelberg (2008)
-
Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
-
-
-
-
18
-
-
40249088241
-
-
Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, 4948, pp. 320-339. Springer, Heidelberg (2008)
-
Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
-
-
-
-
20
-
-
10444265884
-
Completely fair SFE and coalition-safe cheap talk
-
ACM Press, New York
-
Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair SFE and coalition-safe cheap talk. In: 23rd ACM Symposium Annual on Principles of Dis- tributed Computing, pp. 1-10. ACM Press, New York (2004)
-
(2004)
23rd ACM Symposium Annual on Principles of Dis- tributed Computing
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
21
-
-
33748680791
-
Collusion-free protocols
-
ACM Press, New York
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: 37th Annual ACM Symposium on Theory of Computing (STOC), pp. 543-552. ACM Press, New York (2005)
-
(2005)
37th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
22
-
-
24144447639
-
-
Lepinski, M., Micali, S., Shelat, A.: Fair-zero knowledge. In: Kilian, J. (ed.) TCC 2005. LNCS, 3378, pp. 245-263. Springer, Heidelberg (2005)
-
Lepinski, M., Micali, S., Shelat, A.: Fair-zero knowledge. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 245-263. Springer, Heidelberg (2005)
-
-
-
-
23
-
-
84937425161
-
Unique signatures and verifiable random functions from the DHDDH separation
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Lysyanskaya, A.: Unique signatures and verifiable random functions from the DHDDH separation. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 597-612. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 597-612
-
-
Lysyanskaya, A.1
-
24
-
-
33749541500
-
Rationality and adversarial behavior in multi-party computation
-
Dwork, C, ed, CRYPTO 2006, Springer, Heidelberg
-
Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 180-197
-
-
Lysyanskaya, A.1
Triandopoulos, N.2
-
25
-
-
0033346854
-
Verifiable random functions
-
IEEE, Los Alamitos
-
Micali, S., Rabin, M.O., Vadhan, S.P.: Verifiable random functions. In: 40th Annual Symposium on Foundations of Computer Science (FOCS), pp. 120-130. IEEE, Los Alamitos (1999)
-
(1999)
40th Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 120-130
-
-
Micali, S.1
Rabin, M.O.2
Vadhan, S.P.3
-
26
-
-
77949602445
-
-
Miclai, S., Shelat, A.: Truly rational secret sharing. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 54-71. Springer, Heidelberg (2009)
-
Miclai, S., Shelat, A.: Truly rational secret sharing. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 54-71. Springer, Heidelberg (2009)
-
-
-
-
27
-
-
70350273678
-
-
Ong, S.J., Parkes, D., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority. In: Reingold, O. (ed.) TCC 2009. LNCS, 5444, pp. 36-53. Springer, Heidelberg (2009)
-
Ong, S.J., Parkes, D., Rosen, A., Vadhan, S.: Fairness with an honest minority and a rational majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 36-53. Springer, Heidelberg (2009)
-
-
-
-
28
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613 (1979)
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|