-
1
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
ACM Press
-
Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: 25th ACM PODC, pp. 53-62. ACM Press (2006)
-
(2006)
25th ACM PODC
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.4
-
2
-
-
40249092942
-
Lower Bounds on Implementing Robust and Resilient Mediators
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Abraham, I., Dolev, D., Halpern, J.Y.: Lower Bounds on Implementing Robust and Resilient Mediators. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 302-319. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 302-319
-
-
Abraham, I.1
Dolev, D.2
Halpern, J.Y.3
-
3
-
-
70350304833
-
Collusion-Free Multiparty Computation in the Mediated Model
-
Halevi, S. (ed.) CRYPTO 2009. Springer, Heidelberg
-
Alwen, J., Katz, J., Lindell, Y., Persiano, G., Shelat, A., Visconti, I.: Collusion-Free Multiparty Computation in the Mediated Model. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 524-540. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5677
, pp. 524-540
-
-
Alwen, J.1
Katz, J.2
Lindell, Y.3
Persiano, G.4
Shelat, A.5
Visconti, I.6
-
4
-
-
84865506830
-
Collusion preserving computation
-
ePrint Archive, Report 2011/443
-
Alwen, J., Katz, J., Maurer, U., Zikas, V.: Collusion preserving computation. Cryptology ePrint Archive, Report 2011/443 (2011), http://eprint.iacr.org/2011/433
-
(2011)
Cryptology
-
-
Alwen, J.1
Katz, J.2
Maurer, U.3
Zikas, V.4
-
5
-
-
51849140874
-
Collusion-Free Protocols in the Mediated Model
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Alwen, J., Shelat, A., Visconti, I.: Collusion-Free Protocols in the Mediated Model. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 497-514. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 497-514
-
-
Alwen, J.1
Shelat, A.2
Visconti, I.3
-
6
-
-
0002430114
-
Subjectivity and Correlation in Randomized Strategies
-
Aumann, R.: Subjectivity and Correlation in Randomized Strategies. Journal of Math. Econ. 1, 67-96 (1974)
-
(1974)
Journal of Math. Econ.
, vol.1
, pp. 67-96
-
-
Aumann, R.1
-
8
-
-
0001415601
-
Fair distribution protocols, or how the players replace fortune
-
Barany, I.: Fair distribution protocols, or how the players replace fortune. Mathematics of Operations Research 17, 327-340 (1992)
-
(1992)
Mathematics of Operations Research
, vol.17
, pp. 327-340
-
-
Barany, I.1
-
9
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
IEEE Full version at
-
Canetti, R.: Universally composable security: A new paradigm for cryptographic protocols. In: 42nd FOCS, pp. 136-145. IEEE (2001), Full version at http://eprint.iacr.org/2000/067/
-
(2001)
42nd FOCS
, pp. 136-145
-
-
Canetti, R.1
-
10
-
-
38049064364
-
Universally Composable Security with Global Setup
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Canetti, R., Dodis, Y., Pass, R., Walfish, S.: Universally Composable Security with Global Setup. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 61-85. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 61-85
-
-
Canetti, R.1
Dodis, Y.2
Pass, R.3
Walfish, S.4
-
11
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
Canetti, R., Lindell, Y., Ostrovsky, R., Sahai, A.: Universally composable two-party and multi-party secure computation. In: STOC, pp. 494-503 (2002)
-
(2002)
STOC
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
12
-
-
84865474249
-
Universally composable security with local adversaries
-
ePrint Archive, Report 2012/117
-
Canetti, R., Vald,M.: Universally composable security with local adversaries. Cryptology ePrint Archive, Report 2012/117 (2012), http://eprint.iacr.org/2012/117
-
(2012)
Cryptology
-
-
Canetti, R.1
Vald, M.2
-
13
-
-
0000510636
-
Strategic information transmission
-
Crawford, V., Sobel, J.: Strategic information transmission. Econometrica 50, 1431-1451 (1982)
-
(1982)
Econometrica
, vol.50
, pp. 1431-1451
-
-
Crawford, V.1
Sobel, J.2
-
14
-
-
70350639645
-
Composability and On-Line Deniability of Authentication
-
Reingold, O. (ed.) TCC 2009. Springer, Heidelberg
-
Dodis, Y., Katz, J., Smith, A., Walfish, S.: Composability and On-Line Deniability of Authentication. In: Reingold, O. (ed.) TCC 2009. LNCS, vol. 5444, pp. 146-162. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5444
, pp. 146-162
-
-
Dodis, Y.1
Katz, J.2
Smith, A.3
Walfish, S.4
-
15
-
-
0000552236
-
Universal mechanisms
-
Forges, F.: Universal mechanisms. Econometrica 58, 1342-1364 (1990)
-
(1990)
Econometrica
, vol.58
, pp. 1342-1364
-
-
Forges, F.1
-
16
-
-
33645593031
-
Foundations of Cryptography
-
Cambridge University Press, Cambridge
-
Goldreich, O.: Foundations of Cryptography. Basic Applications, vol. 2. Cambridge University Press, Cambridge (2004)
-
(2004)
Basic Applications
, vol.2
-
-
Goldreich, O.1
-
17
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
ACM Press
-
Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority. In: 19th ACM STOC, pp. 218-229. ACM Press (1987)
-
(1987)
19th ACM STOC
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
18
-
-
33748582624
-
Rational Secure Computation and Ideal Mechanism Design
-
IEEE Computer Society, Washington, DC
-
Izmalkov, S., Lepinski, M., Micali, S.: Rational Secure Computation and Ideal Mechanism Design. In: FOCS 2005: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science, pp. 585-595. IEEE Computer Society, Washington, DC (2005)
-
(2005)
FOCS 2005: Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
, pp. 585-595
-
-
Izmalkov, S.1
Lepinski, M.2
Micali, S.3
-
19
-
-
40249119683
-
Verifiably Secure Devices
-
Canetti, R. (ed.) TCC 2008. Springer, Heidelberg
-
Izmalkov, S., Lepinski, M., Micali, S.: Verifiably Secure Devices. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948, pp. 273-301. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.4948
, pp. 273-301
-
-
Izmalkov, S.1
Lepinski, M.2
Micali, S.3
-
20
-
-
78650897918
-
Perfect implementation
-
Izmalkov, S., Lepinski, M., Micali, S.: Perfect implementation. Games and Economic Behavior 71(1), 121-140 (2011), http://hdl.handle.net/1721.1/50634
-
(2011)
Games and Economic Behavior
, vol.71
, Issue.1
, pp. 121-140
-
-
Izmalkov, S.1
Lepinski, M.2
Micali, S.3
-
21
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
IEEE Full version available at
-
Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mechanism design. In: 46th FOCS, pp. 585-595. IEEE (2005), Full version available at http://dspace.mit.edu/handle/1721.1/38208
-
(2005)
46th FOCS
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
22
-
-
33748680791
-
Collusion-Free Protocols
-
ACM, New York
-
Lepinksi, M., Micali, S., Shelat, A.: Collusion-Free Protocols. In: STOC 2005: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing, pp. 543-552. ACM, New York (2005)
-
(2005)
STOC 2005: Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing
, pp. 543-552
-
-
Lepinksi, M.1
Micali, S.2
Shelat, A.3
-
23
-
-
10444265884
-
Completely fair SFE and coalitionsafe cheap talk
-
ACM Press
-
Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair SFE and coalitionsafe cheap talk. In: 23rd ACM PODC, pp. 1-10. ACM Press (2004)
-
(2004)
23rd ACM PODC
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
24
-
-
33748680791
-
Collusion-free protocols
-
ACM Press
-
Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: 37th ACM STOC, pp. 543-552. ACM Press (2005)
-
(2005)
37th ACM STOC
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
25
-
-
24144447639
-
Fair-Zero Knowledge
-
Kilian, J. (ed.) TCC 2005. Springer, Heidelberg
-
Lepinski, M., Micali, S., Shelat, A.: Fair-Zero Knowledge. In: Kilian, J. (ed.) TCC 2005. LNCS, vol. 3378, pp. 245-263. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3378
, pp. 245-263
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
27
-
-
84926080684
-
-
Cambridge University Press, New York
-
Nisan, N., Roughgarden, T., Tardos, E., Vazirani, V.V.: Algorithmic Game Theory. Cambridge University Press, New York (2007)
-
(2007)
Algorithmic Game Theory
-
-
Nisan, N.1
Roughgarden, T.2
Tardos, E.3
Vazirani, V.V.4
-
28
-
-
0001217738
-
The prisoners' problem and the subliminal channel
-
Plenum Press
-
Simmons, G.J.: The prisoners' problem and the subliminal channel. In: Crypto 1983, pp. 51-67. Plenum Press (1984)
-
(1984)
Crypto 1983
, pp. 51-67
-
-
Simmons, G.J.1
-
29
-
-
0028532997
-
Cryptanalysis and protocol failures
-
Simmons, G.J.: Cryptanalysis and protocol failures. Communications of the ACM 37(11), 56-65 (1994)
-
(1994)
Communications of the ACM
, vol.37
, Issue.11
, pp. 56-65
-
-
Simmons, G.J.1
-
30
-
-
84955557536
-
The History of Subliminal Channels
-
Anderson, R. (ed.) IH 1996. Springer, Heidelberg
-
Simmons, G.J.: The History of Subliminal Channels. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 237-256. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1174
, pp. 237-256
-
-
Simmons, G.J.1
|