Multi-round Anonymous Auction Protocols
暂无分享,去创建一个
[1] A. Mas-Colell,et al. Microeconomic Theory , 1995 .
[2] David Chaum,et al. Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result , 1987, CRYPTO.
[3] Paul R. Milgrom,et al. Auctions and Bidding: A Primer , 1989 .
[4] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[5] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[6] R. McAfee,et al. Auctions and Bidding , 1986 .
[7] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[8] Matthew K. Franklin,et al. The design and implementation of a secure auction service , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[9] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[10] Joan Feigenbaum,et al. Security with Low Communication Overhead , 1990, CRYPTO.
[11] Silvio Micali,et al. The round complexity of secure protocols , 1990, STOC '90.
[12] J. Doug Tygar,et al. Electronic Auctions with Private Bids , 1998, USENIX Workshop on Electronic Commerce.
[13] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[14] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[15] Donald Beaver,et al. Multiparty Computation with Faulty Majority , 1989, CRYPTO.
[16] David Clark,et al. Internet cost allocation and pricing , 1997 .
[17] B. Klopfenstein. Internet Economics , 1998 .
[18] Adi Shamir,et al. How to share a secret , 1979, CACM.