Fair Computation with Rational Players
暂无分享,去创建一个
[1] Richard Cleve,et al. Limits on the security of coin flips when half the processors are faulty , 1986, STOC '86.
[2] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[3] Nikolaos Makriyannis. On the Classification of Finite Boolean Functions up to Fairness , 2014, SCN.
[4] Yehuda Lindell,et al. Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, CRYPTO.
[5] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.
[6] Abhi Shelat. Collusion-free protocols , 2010, BQGT.
[7] Yehuda Lindell,et al. Secure Multi-Party Computation without Agreement , 2005, Journal of Cryptology.
[8] Alon Rosen,et al. Limits on the Power of Cryptographic Cheap Talk , 2013, IACR Cryptol. ePrint Arch..
[9] J. Sobel,et al. STRATEGIC INFORMATION TRANSMISSION , 1982 .
[10] Ran Canetti,et al. Security and Composition of Multiparty Cryptographic Protocols , 2000, Journal of Cryptology.
[11] Tim Roughgarden,et al. Algorithmic Game Theory , 2007 .
[12] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[13] Shien Jin Ong,et al. Fairness with an Honest Minority and a , 2008 .
[14] Jonathan Katz,et al. Complete Fairness in Multi-Party Computation Without an Honest Majority , 2009, IACR Cryptol. ePrint Arch..
[15] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[16] Shai Halevi,et al. A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.
[17] Yehuda Lindell,et al. Complete Fairness in Secure Two-Party Computation , 2011, JACM.
[18] Sergei Izmalkov,et al. Rational secure computation and ideal mechanism design , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).
[19] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[20] Sergei Izmalkov,et al. Verifiably Secure Devices , 2008, TCC.
[21] Abhi Shelat,et al. Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.
[22] Sergei Izmalkov,et al. Perfect implementation , 2011, Games Econ. Behav..
[23] Moni Naor,et al. Games for exchanging information , 2008, STOC.
[24] Moni Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[25] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[26] Gilad Asharov,et al. Towards Characterizing Complete Fairness in Secure Two-Party Computation , 2014, IACR Cryptol. ePrint Arch..
[27] Georg Fuchsbauer,et al. Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..
[28] Ran Canetti,et al. Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.
[29] Ronen Gradwohl,et al. Rationality in the Full-Information Model , 2010, TCC.
[30] Eran Omri,et al. 1/p-Secure Multiparty Computation without Honest Majority and the Best of Both Worlds , 2011, CRYPTO.
[31] Alon Rosen,et al. Sequential Rationality in Cryptographic Protocols , 2010, 2010 IEEE 51st Annual Symposium on Foundations of Computer Science.
[32] Imre Bárány,et al. Fair Distribution Protocols or How the Players Replace Fortune , 1992, Math. Oper. Res..
[33] T. Rabin,et al. Algorithmic Game Theory: Cryptography and Game Theory , 2007 .
[34] Abhi Shelat,et al. Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.
[35] Jonathan Katz,et al. Partial Fairness in Secure Two-Party Computation , 2010, Journal of Cryptology.
[36] Tal Rabin,et al. 1 Cryptography and Game Theory , 2022 .