A Cryptographic Moving-Knife Cake-Cutting Protocol with High Social Surplus
暂无分享,去创建一个
[1] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[2] Thomas L. Saaty,et al. Optimization in Integers and Related Extremal Problems , 1970 .
[3] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[4] Masayuki Abe,et al. M+1-st Price Auction Using Homomorphic Encryption , 2002, Public Key Cryptography.
[5] Kaoru Kurosawa,et al. Bit-Slice Auction Circuit , 2002, ESORICS.
[6] Oded Goldreich. Foundations of Cryptography: Volume 1 , 2006 .
[7] Tatsuaki Okamoto,et al. Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption , 2010, IWSEC.
[8] Costas Busch,et al. Hardness Results for Cake Cutting , 2005, Bull. EATCS.
[9] Tatsuaki Okamoto,et al. Meta-Envy-Free Cake-Cutting Protocols , 2010, MFCS.
[10] Silvio Micali,et al. Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems , 1991, JACM.
[11] Gerhard J. Woeginger,et al. A Lower Bound for Cake Cutting , 2003, ESA.
[12] Martin Shubik. Essays in Mathematical Economics, in Honor of Oskar Morgenstern , 1967 .
[13] W. Stromquist. How to Cut a Cake Fairly , 1980 .
[14] S. Rajsbaum. Foundations of Cryptography , 2014 .
[15] Shimon Even,et al. A note on cake cutting , 1984, Discret. Appl. Math..
[16] Ariel D. Procaccia,et al. Truth, justice, and cake cutting , 2010, Games Econ. Behav..
[17] Jack M. Robertson,et al. Cake-cutting algorithms - be fair if you can , 1998 .
[18] Steven J. Brams,et al. Fair division - from cake-cutting to dispute resolution , 1998 .
[19] Ariel D. Procaccia,et al. Cake cutting: not just child's play , 2013, CACM.