-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
ACM Press
-
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: 25th Annual ACM Symposium on Principles of Distributed Computing (PODC), pp. 53-62. ACM Press (2006)
-
(2006)
25th Annual ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.4
-
2
-
-
79957983000
-
Towards a game theoretic view of secure computation
-
Paterson, K.G. (ed.) EUROCRYPT 2011 Springer, Heidelberg Full version
-
Asharov, G., Canetti, R., Hazay, C.: Towards a Game Theoretic View of Secure Computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 426-445. Springer, Heidelberg (2011), Full version available at, http://eprint.iacr.org/2011/137
-
(2011)
LNCS
, vol.6632
, pp. 426-445
-
-
Asharov, G.1
Canetti, R.2
Hazay, C.3
-
3
-
-
79951510152
-
Utility dependence in correct and fair rational secret sharing
-
Asharov, G., Lindell, Y.: Utility dependence in correct and fair rational secret sharing. Journal of Cryptology 24(1), 157-202 (2011)
-
(2011)
Journal of Cryptology
, vol.24
, Issue.1
, pp. 157-202
-
-
Asharov, G.1
Lindell, Y.2
-
4
-
-
0001415601
-
Fair distribution protocols, or how the players replace fortune
-
Barany, I.: Fair distribution protocols, or how the players replace fortune. Mathematics of Operations Research 17, 327-340 (1992)
-
(1992)
Mathematics of Operations Research
, vol.17
, pp. 327-340
-
-
Barany, I.1
-
5
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
Canetti, R.: Security and composition of multiparty cryptographic protocols. Journal of Cryptology 13(1), 143-202 (2000)
-
(2000)
Journal of Cryptology
, vol.13
, Issue.1
, pp. 143-202
-
-
Canetti, R.1
-
6
-
-
0012610677
-
Limits on the security of coin flips when half the processors are faulty
-
ACM Press
-
Cleve, R.: Limits on the security of coin flips when half the processors are faulty. In: 18th Annual ACM Symposium on Theory of Computing (STOC), pp. 364-369. ACM Press (1986)
-
(1986)
18th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 364-369
-
-
Cleve, R.1
-
7
-
-
0000510636
-
Strategic information transmission
-
Crawford, V., Sobel, J.: Strategic information transmission. Econometrica 50, 1431-1451 (1982)
-
(1982)
Econometrica
, vol.50
, pp. 1431-1451
-
-
Crawford, V.1
Sobel, J.2
-
8
-
-
84974555688
-
A cryptographic solution to a game theoretic problem
-
Bellare, M. (ed.) CRYPTO 2000 Springer, Heidelberg
-
Dodis, Y., Halevi, S., Rabin, T.: A Cryptographic Solution to a Game Theoretic Problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 112-130. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1880
, pp. 112-130
-
-
Dodis, Y.1
Halevi, S.2
Rabin, T.3
-
9
-
-
70350294929
-
Cryptography and game theory
-
Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V. (eds.) Cambridge University Press
-
Dodis, Y., Rabin, T.: Cryptography and game theory. In: Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V. (eds.) Algorithmic Game Theory, pp. 181-207. Cambridge University Press (2007)
-
(2007)
Algorithmic Game Theory
, pp. 181-207
-
-
Dodis, Y.1
Rabin, T.2
-
10
-
-
0000552236
-
Universal mechanisms
-
Forges, F.: Universal mechanisms. Econometrica 58, 1342-1364 (1990)
-
(1990)
Econometrica
, vol.58
, pp. 1342-1364
-
-
Forges, F.1
-
11
-
-
77949642603
-
Efficient rational secret sharing in standard communication networks
-
Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
-
Fuchsbauer, G., Katz, J., Naccache, D.: Efficient Rational Secret Sharing in Standard Communication Networks. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 419-436. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 419-436
-
-
Fuchsbauer, G.1
Katz, J.2
Naccache, D.3
-
12
-
-
84855248474
-
Complete fairness in secure twoparty computation
-
Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure twoparty computation. J. ACM 58(6) (2011)
-
(2011)
J. ACM
, vol.58
, Issue.6
-
-
Gordon, S.D.1
Hazay, C.2
Katz, J.3
Lindell, Y.4
-
13
-
-
33750018128
-
Rational secret sharing, revisited
-
De Prisco, R., Yung, M. (eds.) SCN 2006 Springer, Heidelberg
-
Gordon, S.D., Katz, J.: Rational Secret Sharing, Revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4116
, pp. 229-241
-
-
Gordon, S.D.1
Katz, J.2
-
14
-
-
84855447466
-
Partial fairness in secure two-party computation
-
Gordon, S.D., Katz, J.: Partial fairness in secure two-party computation. Journal of Cryptology 25(1), 14-40 (2012)
-
(2012)
Journal of Cryptology
, vol.25
, Issue.1
, pp. 14-40
-
-
Gordon, S.D.1
Katz, J.2
-
15
-
-
77949605561
-
Rationality in the full-information model
-
Micciancio, D. (ed.) TCC 2010 Springer, Heidelberg
-
Gradwohl, R.: Rationality in the Full-Information Model. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 401-418. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 401-418
-
-
Gradwohl, R.1
-
16
-
-
78751541044
-
Sequential rationality in cryptographic protocols
-
IEEE
-
Gradwohl, R., Livne, N., Rosen, A.: Sequential rationality in cryptographic protocols. In: 51st FOCS Annual Symposium on Foundations of Computer Science (FOCS), pp. 623-632. IEEE (2010)
-
(2010)
51st FOCS Annual Symposium on Foundations of Computer Science (FOCS)
, pp. 623-632
-
-
Gradwohl, R.1
Livne, N.2
Rosen, A.3
-
18
-
-
40249119683
-
Verifiably secure devices
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Izmalkov, S., Lepinski, M., Micali, S.: Verifiably Secure Devices. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 273-301. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 273-301
-
-
Izmalkov, S.1
Lepinski, M.2
Micali, S.3
-
19
-
-
78650897918
-
Perfect implementation
-
Izmalkov, S., Lepinski, M., Micali, S.: Perfect implementation. Games and Economic Behavior 71(1), 121-140 (2011), http://hdl.handle.net/1721.1/50634
-
(2011)
Games and Economic Behavior
, vol.71
, Issue.1
, pp. 121-140
-
-
Izmalkov, S.1
Lepinski, M.2
Micali, S.3
-
20
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
IEEE Full version
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: 46th FOCSAnnual Symposium on Foundations of Computer Science (FOCS), pp. 585-595. IEEE (2005), Full version available at, http://dspace.mit.edu/handle/1721.1/38208
-
(2005)
46th FOCSAnnual Symposium on Foundations of Computer Science (FOCS)
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
21
-
-
40249118370
-
Bridging game theory and cryptography: Recent results and future directions
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Katz, J.: Bridging Game Theory and Cryptography: Recent Results and Future Directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 251-272. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 251-272
-
-
Katz, J.1
-
22
-
-
40249088241
-
Cryptography and game theory: Designing protocols for exchanging information
-
Canetti, R. (ed.) TCC 2008 Springer, Heidelberg
-
Kol, G., Naor, M.: Cryptography and Game Theory: Designing Protocols for Exchanging Information. In:Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 320-339. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 320-339
-
-
Kol, G.1
Naor, M.2
-
24
-
-
10444265884
-
Completely fair SFE and coalitionsafe cheap talk
-
ACM Press
-
Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair SFE and coalitionsafe cheap talk. In: 23rd ACM PODCAnnual ACM Symposium on Principles of Distributed Computing (PODC), pp. 1-10. ACM Press (2004)
-
(2004)
23rd ACM PODCAnnual ACM Symposium on Principles of Distributed Computing (PODC)
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
25
-
-
33748680791
-
Collusion-free protocols
-
ACM Press
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: 37th Annual ACM Symposium on Theory of Computing (STOC), pp. 543-552. ACM Press (2005)
-
(2005)
37th Annual ACM Symposium on Theory of Computing (STOC)
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
26
-
-
33749541500
-
Rationality and adversarial behavior in multi-party computation
-
Dwork, C. (ed.) CRYPTO 2006 Springer, Heidelberg
-
Lysyanskaya, A., Triandopoulos, N.: Rationality and Adversarial Behavior in Multi-party Computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4117
, pp. 180-197
-
-
Lysyanskaya, A.1
Triandopoulos, N.2
-
27
-
-
70350281824
-
Purely rational secret sharing (extended abstract)
-
Reingold, O. (ed.) TCC 2009 Springer, Heidelberg
-
Micali, S., Shelat, A.: Purely Rational Secret Sharing (Extended Abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 54-71. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 54-71
-
-
Micali, S.1
Shelat, A.2
-
28
-
-
70350649064
-
An optimally fair coin toss
-
Reingold, O. (ed.) TCC 2009 Springer, Heidelberg
-
Moran, T., Naor, M., Segev, G.: An Optimally Fair Coin Toss. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 1-18. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 1-18
-
-
Moran, T.1
Naor, M.2
Segev, G.3
-
29
-
-
70350273678
-
Fairness with an honest minority and a rational majority
-
Reingold, O. (ed.) TCC 2009 Springer, Heidelberg
-
Ong, S.J., Parkes, D.C., Rosen, A., Vadhan, S.: Fairness with an Honest Minority and a Rational Majority. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 36-53. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 36-53
-
-
Ong, S.J.1
Parkes, D.C.2
Rosen, A.3
Vadhan, S.4
|