메뉴 건너뛰기




Volumn , Issue , 2010, Pages 623-632

Sequential rationality in cryptographic protocols

Author keywords

Cryptography; Game theory

Indexed keywords

COMPUTATION THEORY; GAME THEORY;

EID: 78751541044     PISSN: 02725428     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/FOCS.2010.65     Document Type: Conference Paper
Times cited : (19)

References (24)
  • 1
    • 33748686155 scopus 로고    scopus 로고
    • Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
    • ACM Press
    • I. Abraham, D. Dolev, R. Gonen, and J. Halpern. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In 25th PODC, pages 53-62. ACM Press, 2006.
    • (2006) 25th PODC , pp. 53-62
    • Abraham, I.1    Dolev, D.2    Gonen, R.3    Halpern, J.4
  • 2
    • 70350343370 scopus 로고    scopus 로고
    • Utility dependence in correct and fair rational secret sharing
    • G. Asharov and Y. Lindell. Utility dependence in correct and fair rational secret sharing. In Crypto 2009, pages 559-576, 2009.
    • (2009) Crypto 2009 , pp. 559-576
    • Asharov, G.1    Lindell, Y.2
  • 4
    • 0003651338 scopus 로고
    • Coin flipping by telephone
    • M. Blum. Coin flipping by telephone. In CRYPTO81, p. 1115, 1981.
    • (1981) CRYPTO81 , pp. 1115
    • Blum, M.1
  • 5
    • 3042684929 scopus 로고    scopus 로고
    • A cryptographic solution to a game theoretic problem
    • Y. Dodis, S. Halevi, and T. Rabin. A cryptographic solution to a game theoretic problem. In Crypto'00, 2000.
    • (2000) Crypto'00
    • Dodis, Y.1    Halevi, S.2    Rabin, T.3
  • 6
    • 78751470712 scopus 로고    scopus 로고
    • Bounding rationality by discounting time
    • L. Fortnow and R. Santhanam. Bounding rationality by discounting time. In 1st ICS, 2010.
    • (2010) 1st ICS
    • Fortnow, L.1    Santhanam, R.2
  • 9
    • 33750018128 scopus 로고    scopus 로고
    • Rational secret sharing, revisited
    • Springer
    • S. D. Gordon and J. Katz. Rational secret sharing, revisited. In 5th SCN, p. 229-241. Springer, 2006.
    • (2006) 5th SCN , pp. 229-241
    • Gordon, S.D.1    Katz, J.2
  • 10
    • 78751485643 scopus 로고    scopus 로고
    • Rationality in the full-information model
    • R. Gradwohl. Rationality in the full-information model. In TCC 2010.
    • TCC 2010
    • Gradwohl, R.1
  • 13
    • 78751516976 scopus 로고    scopus 로고
    • Game theory with costly computation
    • J. Y. Halpern and R. Pass: Game theory with costly computation. In 1st ICS, 2010.
    • (2010) 1st ICS
    • Halpern, J.Y.1    Pass, R.2
  • 14
    • 4544259607 scopus 로고    scopus 로고
    • Rational secret sharing and multiparty computation: Extended abstract
    • J. Halpern and V. Teague. Rational secret sharing and multiparty computation: Extended abstract. In 36th STOC, pages 623-632, 2004.
    • (2004) 36th STOC , pp. 623-632
    • Halpern, J.1    Teague, V.2
  • 15
    • 33748582624 scopus 로고    scopus 로고
    • Rational secure computation and ideal mechanism design
    • S. Izmalkov, S. Micali, and M. Lepinski. Rational secure computation and ideal mechanism design. In FOCS 2005, 2005.
    • (2005) FOCS 2005
    • Izmalkov, S.1    Micali, S.2    Lepinski, M.3
  • 16
    • 40249118370 scopus 로고    scopus 로고
    • Bridging game theory and cryptography: Recent results and future directions
    • J. Katz. Bridging game theory and cryptography: Recent results and future directions. In 5th TCC, pages 251-272, 2008.
    • (2008) 5th TCC , pp. 251-272
    • Katz, J.1
  • 17
    • 78751484156 scopus 로고    scopus 로고
    • Efficient rational secret sharing in the standard communication model
    • J. Katz, G. Fuchsbauer, and D. Naccache. Efficient rational secret sharing in the standard communication model. In TCC 2010.
    • TCC 2010
    • Katz, J.1    Fuchsbauer, G.2    Naccache, D.3
  • 18
    • 40249088241 scopus 로고    scopus 로고
    • Cryptography and game theory: Designing protocols for exchanging information
    • G. Kol and M. Naor. Cryptography and game theory: Designing protocols for exchanging information. In 5th TCC, pages 320-339, 2008.
    • (2008) 5th TCC , pp. 320-339
    • Kol, G.1    Naor, M.2
  • 19
    • 57049100461 scopus 로고    scopus 로고
    • Games for exchanging information
    • G. Kol and M. Naor. Games for exchanging information. In 40th STOC, pages 423-432, 2008.
    • (2008) 40th STOC , pp. 423-432
    • Kol, G.1    Naor, M.2
  • 21
    • 80052296251 scopus 로고    scopus 로고
    • Rationality and adversarial behavior in multi-party computation
    • A. Lysyanskaya and N. Triandopoulos. Rationality and adversarial behavior in multi-party computation. In Crypto 2006, p. 180197, 2006.
    • (2006) Crypto 2006 , pp. 180197
    • Lysyanskaya, A.1    Triandopoulos, N.2
  • 22
    • 70350281824 scopus 로고    scopus 로고
    • Truly rational secret sharing
    • S. Micali and A. Shelat. Truly rational secret sharing. In 6th TCC, pages 54-71, 2009.
    • (2009) 6th TCC , pp. 54-71
    • Micali, S.1    Shelat, A.2
  • 23
    • 70350273678 scopus 로고    scopus 로고
    • Fairness with an honest minority and a rational majority
    • S. J. Ong, D. Parkes, A. Rosen, and S. Vadhan. Fairness with an honest minority and a rational majority. In 6th TCC, pages 36-53, 2009.
    • (2009) 6th TCC , pp. 36-53
    • Ong, S.J.1    Parkes, D.2    Rosen, A.3    Vadhan, S.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.