-
1
-
-
4544259607
-
Rational secret sharing and multiparty computation: Extended abstract
-
L. Babai, Ed. Chicago, Illinois, USA: ACM Press, Jun. 13-16
-
J. Y. Halpern and V. Teague, "Rational secret sharing and multiparty computation: Extended abstract, " in STOC 2004, L. Babai, Ed. Chicago, Illinois, USA: ACM Press, Jun. 13-16, 2004, pp. 623-632.
-
(2004)
STOC 2004
, pp. 623-632
-
-
Halpern, J.Y.1
Teague, V.2
-
2
-
-
33748686155
-
Distributed computing meets game theory: Robust mechanisms for rational secret sharing and multiparty computation
-
E. Ruppert and D. Malkhi, Eds. Denver, Colorado, USA: ACM Press, Jul. 23-26
-
I. Abraham, D. Dolev, R. Gonen, and J. Y. Halpern, "Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation, " in PODC 2006, E. Ruppert and D. Malkhi, Eds. Denver, Colorado, USA: ACM Press, Jul. 23-26, 2006, pp. 53-62.
-
(2006)
PODC 2006
, pp. 53-62
-
-
Abraham, I.1
Dolev, D.2
Gonen, R.3
Halpern, J.Y.4
-
3
-
-
40249088241
-
Cryptography and game theory: Designing protocols for exchanging information
-
ser. LNCS, R. Canetti, Ed. vol. 4948. San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21
-
G. Kol and M. Naor, "Cryptography and game theory: Designing protocols for exchanging information, " in TCC 2008, ser. LNCS, R. Canetti, Ed., vol. 4948. San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21, 2008, pp. 320-339.
-
(2008)
TCC 2008
, pp. 320-339
-
-
Kol, G.1
Naor, M.2
-
4
-
-
77949642603
-
Efficient rational secret sharing in standard communication networks
-
ser. LNCS, D. Micciancio, Ed., Zurich, Switzerland: Springer, Berlin, Germany, Feb. 9-11
-
G. Fuchsbauer, J. Katz, and D. Naccache, "Efficient rational secret sharing in standard communication networks, " in TCC 2010, ser. LNCS, D. Micciancio, Ed., vol. 5978. Zurich, Switzerland: Springer, Berlin, Germany, Feb. 9-11, 2010, pp. 419-436.
-
(2010)
TCC 2010
, vol.5978
, pp. 419-436
-
-
Fuchsbauer, G.1
Katz, J.2
Naccache, D.3
-
5
-
-
78751516976
-
Game theory with costly computation: Formulation and application to protocol security
-
A. C.-C. Yao, Ed. Tsinghua University Press
-
J. Y. Halpern and R. Pass, "Game theory with costly computation: Formulation and application to protocol security, " in ICS 2010, A. C.-C. Yao, Ed. Tsinghua University Press, 2010, pp. 120-142.
-
(2010)
ICS 2010
, pp. 120-142
-
-
Halpern, J.Y.1
Pass, R.2
-
6
-
-
79957983000
-
Towards a game-theoretic view of secure computation
-
ser. LNCS, K. G. Paterson, Ed., Springer
-
G. Asharov, R. Canetti, and C. Hazay, "Towards a game-theoretic view of secure computation, " in EUROCRYPT 2011, ser. LNCS, K. G. Paterson, Ed., vol. 6632. Springer, 2011, pp. 426-445.
-
(2011)
EUROCRYPT 2011
, vol.6632
, pp. 426-445
-
-
Asharov, G.1
Canetti, R.2
Hazay, C.3
-
7
-
-
84859972604
-
Fair computation with rational players
-
ser. LNCS, D. Pointcheval and T. Johansson, Eds., Springer
-
A. Groce and J. Katz, "Fair computation with rational players, " in EUROCRYPT 2012, ser. LNCS, D. Pointcheval and T. Johansson, Eds., vol. 7237. Springer, 2012, pp. 81-98.
-
(2012)
EUROCRYPT 2012
, vol.7237
, pp. 81-98
-
-
Groce, A.1
Katz, J.2
-
8
-
-
84974555688
-
A cryptographic solution to a game theoretic problem
-
ser. LNCS, M. Bellare, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24
-
Y. Dodis, S. Halevi, and T. Rabin, "A cryptographic solution to a game theoretic problem, " in CRYPTO 2000, ser. LNCS, M. Bellare, Ed., vol. 1880. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24, 2000, pp. 112-130.
-
(2000)
CRYPTO 2000
, vol.1880
, pp. 112-130
-
-
Dodis, Y.1
Halevi, S.2
Rabin, T.3
-
9
-
-
10444265884
-
Completely fair SFE and coalition-safe cheap talk
-
S. Chaudhuri and S. Kutten, Eds. St. John's, Newfoundland, Canada: ACM Press, Jul. 25-28
-
M. Lepinski, S. Micali, C. Peikert, and A. Shelat, "Completely fair SFE and coalition-safe cheap talk, " in PODC 2004, S. Chaudhuri and S. Kutten, Eds. St. John's, Newfoundland, Canada: ACM Press, Jul. 25-28, 2004, pp. 1-10.
-
(2004)
PODC 2004
, pp. 1-10
-
-
Lepinski, M.1
Micali, S.2
Peikert, C.3
Shelat, A.4
-
10
-
-
33748680791
-
Collusion-free protocols
-
H. N. Gabow and R. Fagin, Eds. Baltimore, Maryland, USA: ACM Press, May 22- 24
-
M. Lepinski, S. Micali, and A. Shelat, "Collusion-free protocols, " in STOC 2005, H. N. Gabow and R. Fagin, Eds. Baltimore, Maryland, USA: ACM Press, May 22- 24, 2005, pp. 543-552.
-
(2005)
STOC 2005
, pp. 543-552
-
-
Lepinski, M.1
Micali, S.2
Shelat, A.3
-
11
-
-
33748582624
-
Rational secure computation and ideal mechanism design
-
Pittsburgh, PA, USA: IEEE Computer Society Press, Oct. 23-25
-
S. Izmalkov, S. Micali, and M. Lepinski, "Rational secure computation and ideal mechanism design, " in FOCS 2005. Pittsburgh, PA, USA: IEEE Computer Society Press, Oct. 23-25, 2005, pp. 585-595.
-
(2005)
FOCS 2005
, pp. 585-595
-
-
Izmalkov, S.1
Micali, S.2
Lepinski, M.3
-
12
-
-
40249119683
-
Verifiably secure devices
-
ser. LNCS, R. Canetti, Ed., San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21
-
S. Izmalkov, M. Lepinski, and S. Micali, "Verifiably secure devices, " in TCC 2008, ser. LNCS, R. Canetti, Ed., vol. 4948. San Francisco, CA, USA: Springer, Berlin, Germany, Mar. 19-21, 2008, pp. 273-301.
-
(2008)
TCC 2008
, vol.4948
, pp. 273-301
-
-
Izmalkov, S.1
Lepinski, M.2
Micali, S.3
-
13
-
-
38049082907
-
Security against covert adversaries: Efficient protocols for realistic adversaries
-
ser. LNCS, S. Vadhan, Ed., Springer
-
Y. Aumann and Y. Lindell, "Security against covert adversaries: Efficient protocols for realistic adversaries, " in TCC 2007, ser. LNCS, S. Vadhan, Ed., vol. 4392. Springer, 2007, pp. 137-156.
-
(2007)
TCC 2007
, vol.4392
, pp. 137-156
-
-
Aumann, Y.1
Lindell, Y.2
-
15
-
-
33750018128
-
Rational secret sharing, revisited
-
ser. LNCS, R. D. Prisco and M. Yung, Eds., Maiori, Italy: Springer, Berlin, Germany, Sep. 6-8
-
S. D. Gordon and J. Katz, "Rational secret sharing, revisited, " in SCN 2006, ser. LNCS, R. D. Prisco and M. Yung, Eds., vol. 4116. Maiori, Italy: Springer, Berlin, Germany, Sep. 6-8, 2006, pp. 229-241.
-
(2006)
SCN 2006
, vol.4116
, pp. 229-241
-
-
Gordon, S.D.1
Katz, J.2
-
16
-
-
57049100461
-
Games for exchanging information
-
C. Dwork, Ed. Victoria, British Columbia, Canada: ACM Press, May 17-20
-
G. Kol and M. Naor, "Games for exchanging information, " in STOC 2008, C. Dwork, Ed. Victoria, British Columbia, Canada: ACM Press, May 17-20, 2008, pp. 423-432.
-
(2008)
STOC 2008
, pp. 423-432
-
-
Kol, G.1
Naor, M.2
-
17
-
-
57549103743
-
Beyond Nash equilibrium: Solution concepts for the 21st century
-
R. A. Bazzi and B. Patt-Shamir, Eds. Toronto, Ontario, Canada: ACM Press, Aug. 18-21
-
J. Y. Halpern, "Beyond Nash equilibrium: Solution concepts for the 21st century, " in PODC 2008, R. A. Bazzi and B. Patt-Shamir, Eds. Toronto, Ontario, Canada: ACM Press, Aug. 18-21, 2008, pp. 1-10.
-
(2008)
PODC 2008
, pp. 1-10
-
-
Halpern, J.Y.1
-
18
-
-
78751541044
-
Sequential rationality in cryptographic protocols
-
IEEE Computer Society Press
-
R. Gradwohl, N. Livne, and A. Rosen, "Sequential rationality in cryptographic protocols, " in FOCS 2010. IEEE Computer Society Press, 2010, pp. 623-632.
-
(2010)
FOCS 2010
, pp. 623-632
-
-
Gradwohl, R.1
Livne, N.2
Rosen, A.3
-
19
-
-
77954649870
-
Partial fairness in secure twoparty computation
-
ser. LNCS, H. Gilbert, Ed., Springer
-
D. Gordon and J. Katz, "Partial fairness in secure twoparty computation, " in EUROCRYPT 2010, ser. LNCS, H. Gilbert, Ed., vol. 6110. Springer, 2010, pp. 157-176.
-
(2010)
EUROCRYPT 2010
, vol.6110
, pp. 157-176
-
-
Gordon, D.1
Katz, J.2
-
20
-
-
80051969535
-
1/psecure multiparty computation without honest majority and the best of both worlds
-
ser. LNCS, P. Rogaway, Ed., Springer
-
A. Beimel, Y. Lindell, E. Omri, and I. Orlov, "1/psecure multiparty computation without honest majority and the best of both worlds, " in CRYPTO 2011, ser. LNCS, P. Rogaway, Ed., vol. 6841. Springer, 2011, pp. 277-296.
-
(2011)
CRYPTO 2011
, vol.6841
, pp. 277-296
-
-
Beimel, A.1
Lindell, Y.2
Omri, E.3
Orlov, I.4
-
21
-
-
51849140874
-
Collusion-free protocols in the mediated model
-
LNCS, D. Wagner, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 17-21
-
J. Alwen, A. Shelat, and I. Visconti, "Collusion-free protocols in the mediated model, " in CRYPTO 2008, LNCS, D. Wagner, Ed., vol. 5157. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 17-21, 2008, pp. 497-514.
-
(2008)
CRYPTO 2008
, vol.5157
, pp. 497-514
-
-
Alwen, J.1
Shelat, A.2
Visconti, I.3
-
22
-
-
70350304833
-
Collusion-free multiparty computation in the mediated model
-
ser. LNCS, S. Halevi, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 16-20
-
J. Alwen, J. Katz, Y. Lindell, G. Persiano, A. Shelat, and I. Visconti, "Collusion-free multiparty computation in the mediated model, " in CRYPTO 2009, ser. LNCS, S. Halevi, Ed., vol. 5677. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 16-20, 2009, pp. 524- 540.
-
(2009)
CRYPTO 2009
, vol.5677
, pp. 524-540
-
-
Alwen, J.1
Katz, J.2
Lindell, Y.3
Persiano, G.4
Shelat, A.5
Visconti, I.6
-
23
-
-
84865489601
-
Collusionpreserving computation
-
ser. LNCS, R. Canetti and J. Garay, Eds. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug
-
J. Alwen, J. Katz, U. Maurer, and V. Zikas, "Collusionpreserving computation, " in CRYPTO 2012, ser. LNCS, R. Canetti and J. Garay, Eds. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 2012, pp. 124-143.
-
(2012)
CRYPTO 2012
, pp. 124-143
-
-
Alwen, J.1
Katz, J.2
Maurer, U.3
Zikas, V.4
-
24
-
-
84884200633
-
Byzantine agreement with a rational adversary
-
ser. LNCS. Springer, Berlin, Germany
-
A. Groce, J. Katz, A. Thiruvengadam, and V. Zikas, "Byzantine agreement with a rational adversary, " in ICALP 2012, ser. LNCS. Springer, Berlin, Germany, 2012, pp. 561-572.
-
(2012)
ICALP 2012
, pp. 561-572
-
-
Groce, A.1
Katz, J.2
Thiruvengadam, A.3
Zikas, V.4
-
25
-
-
0000731055
-
Security and composition of multiparty cryptographic protocols
-
April
-
R. Canetti, "Security and composition of multiparty cryptographic protocols, " Journal of Cryptology, vol. 13, pp. 143-202, April 2000.
-
(2000)
Journal of Cryptology
, vol.13
, pp. 143-202
-
-
Canetti, R.1
-
26
-
-
84873944088
-
Universally composable synchronous computation
-
ser. LNCS, A. Sahai, Ed., Springer, March
-
J. Katz, U. Maurer, B. Tackmann, and V. Zikas, "Universally composable synchronous computation, " in TCC 2013, ser. LNCS, A. Sahai, Ed., vol. 7785. Springer, March 2013, pp. 477-498.
-
(2013)
TCC 2013
, vol.7785
, pp. 477-498
-
-
Katz, J.1
Maurer, U.2
Tackmann, B.3
Zikas, V.4
-
27
-
-
84893486709
-
Rational protocol design: Cryptography against incentive-driven adversaries
-
August, (Full version)
-
J. A. Garay, J. Katz, U. Maurer, B. Tackmann, and V. Zikas, "Rational protocol design: Cryptography against incentive-driven adversaries, " Cryptology ePrint Archive, Report 2013/496, August 2013, (Full version).
-
(2013)
Cryptology EPrint Archive, Report 2013/496
-
-
Garay, J.A.1
Katz, J.2
Maurer, U.3
Tackmann, B.4
Zikas, V.5
-
28
-
-
0023545076
-
How to play any mental game, or a completeness theorem for protocols with honest majority
-
A. Aho, Ed, New York City, New York, USA: ACM Press, May 25-27
-
O. Goldreich, S. Micali, and A. Wigderson, "How to play any mental game, or a completeness theorem for protocols with honest majority, " in STOC '87, A. Aho, Ed. New York City, New York, USA: ACM Press, May 25-27, 1987, pp. 218-229.
-
(1987)
STOC '87
, pp. 218-229
-
-
Goldreich, O.1
Micali, S.2
Wigderson, A.3
-
29
-
-
84873362733
-
Resource-based corruptions and the combinatorics of hidden diversity
-
R. D. Kleinberg, Ed. ACM
-
J. A. Garay, D. Johnson, A. Kiayias, and M. Yung, "Resource-based corruptions and the combinatorics of hidden diversity, " in ITCS 2013, R. D. Kleinberg, Ed. ACM, 2013, pp. 415-428.
-
(2013)
ITCS 2013
, pp. 415-428
-
-
Garay, J.A.1
Johnson, D.2
Kiayias, A.3
Yung, M.4
-
30
-
-
35448952561
-
On achieving the 'best of both worlds' in secure multiparty computation
-
U. Feige, Ed. San Diego, California, USA: ACM Press, June 11-13
-
J. Katz, "On achieving the 'best of both worlds' in secure multiparty computation, " in STOC 2007, U. Feige, Ed. San Diego, California, USA: ACM Press, June 11-13, 2007, pp. 11-20.
-
(2007)
STOC 2007
, pp. 11-20
-
-
Katz, J.1
-
31
-
-
0029723583
-
Adaptively secure multi-party computation
-
G. L. Miller, Ed. Philadelphia, Pennsylvania, USA: ACM Press, May 22-24
-
R. Canetti, U. Feige, O. Goldreich, and M. Naor, "Adaptively secure multi-party computation, " in STOC '96, G. L. Miller, Ed. Philadelphia, Pennsylvania, USA: ACM Press, May 22-24, 1996, pp. 639-648.
-
(1996)
STOC '96
, pp. 639-648
-
-
Canetti, R.1
Feige, U.2
Goldreich, O.3
Naor, M.4
-
32
-
-
0036038991
-
Universally composable two-party and multi-party secure computation
-
J. H. Reif, Ed. Montŕeal, Qúebec, Canada: ACM Press, May 19-21
-
R. Canetti, Y. Lindell, R. Ostrovsky, and A. Sahai, "Universally composable two-party and multi-party secure computation, " in STOC 2002, J. H. Reif, Ed. Montŕeal, Qúebec, Canada: ACM Press, May 19-21, 2002, pp. 494-503.
-
(2002)
STOC 2002
, pp. 494-503
-
-
Canetti, R.1
Lindell, Y.2
Ostrovsky, R.3
Sahai, A.4
-
33
-
-
0035163054
-
Universally composable security: A new paradigm for cryptographic protocols
-
Las Vegas, Nevada, USA: IEEE Computer Society Press, Oct. 14-17, Updated full version available at
-
R. Canetti, "Universally composable security: A new paradigm for cryptographic protocols, " in FOCS 2001. Las Vegas, Nevada, USA: IEEE Computer Society Press, Oct. 14-17, 2001, pp. 136-145. Updated full version available at http://eprint.iacr.org/2000/067.
-
(2001)
FOCS 2001
, pp. 136-145
-
-
Canetti, R.1
-
34
-
-
0032687056
-
Secure Computation with honest-looking parties: What if nobody is truly honest?
-
J. S. Vitter, L. L. Larmore, F. Thomson Leighton, Eds. Atlanta, Georgia, USA: ACM Press, May 1-4
-
R. Canetti and R. Ostrovsky, "Secure Computation with honest-looking parties: What if nobody is truly honest?" in STOC '99, J. S. Vitter, L. L. Larmore, F. Thomson Leighton, Eds. Atlanta, Georgia, USA: ACM Press, May 1-4, 1999, pp. 255-264.
-
(1999)
STOC '99
, pp. 255-264
-
-
Canetti, R.1
Ostrovsky, R.2
-
35
-
-
33749547215
-
On combining privacy with guaranteed output delivery in secure multiparty computation
-
ser. LNCS, Cynthia Dwork, Ed., Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24
-
Y. Ishai, E. Kushilevitz, Y. Lindell, and E. Petrank. "On combining privacy with guaranteed output delivery in secure multiparty computation, " in CRYPTO 2006, ser. LNCS, Cynthia Dwork, Ed., vol. 4117. Santa Barbara, CA, USA: Springer, Berlin, Germany, Aug. 20-24, 2006, pp. 483-500.
-
(2006)
CRYPTO 2006
, vol.4117
, pp. 483-500
-
-
Ishai, Y.1
Kushilevitz, E.2
Lindell, Y.3
Petrank, E.4
|