1 Cryptography and Game Theory
暂无分享,去创建一个
[1] Dino Gerardi,et al. Unmediated Communication in Games with Complete and Incomplete Information , 2002, J. Econ. Theory.
[2] Shai Halevi,et al. A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.
[3] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[4] Joan Feigenbaum,et al. Distributed algorithmic mechanism design: recent results and future directions , 2002, DIALM '02.
[5] R. Aumann. Subjectivity and Correlation in Randomized Strategies , 1974 .
[6] A. Urbano,et al. Computationally restricted unmediated talk under incomplete information , 2004 .
[7] Imre Bárány,et al. Fair Distribution Protocols or How the Players Replace Fortune , 1992, Math. Oper. Res..
[8] Mikhail J. Atallah,et al. Efficient Correlated Action Selection , 2006, Financial Cryptography.
[9] Abhi Shelat,et al. Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.
[10] Joseph Y. Halpern,et al. Ra-tional secret sharing and multiparty computation , 2004, STOC 2004.
[11] Moshe Tennenholtz,et al. Non-cooperative computation: Boolean functions with correctness and exclusivity , 2005, Theor. Comput. Sci..
[12] Joe Kilian. Secure Computation , 2011, Encyclopedia of Cryptography and Security.
[13] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[14] Donald Beaver,et al. Secure multiparty protocols and zero-knowledge proof systems tolerating a faulty minority , 2004, Journal of Cryptology.
[15] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[16] Leonid A. Levin,et al. Fair Computation of General Functions in Presence of Immoral Majority , 1990, CRYPTO.
[17] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[18] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.
[19] José E. Vila,et al. Computational complexity and communication: Coordination in two-player games , 2002 .
[20] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[21] Vanessa Teague,et al. Selecting Correlated Random Actions , 2004, Financial Cryptography.
[22] Sergei Izmalkov,et al. Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[23] Elchanan Ben-Porath,et al. Correlation without Mediation: Expanding the Set of Equilibrium Outcomes by "Cheap" Pre-play Procedures , 1998 .
[24] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[25] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[26] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[27] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[28] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[29] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[30] Adi Shamir,et al. How to share a secret , 1979, CACM.
[31] F. Forges. Published by: The , 2022 .