Social rational secure multi‐party computation
暂无分享,去创建一个
Hao Wang | Zhe Liu | Qiuliang Xu | Yilei Wang | Qiuliang Xu | Hao Wang | Yilei Wang | Zhe Liu
[1] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[2] Georg Fuchsbauer,et al. Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..
[3] Abhi Shelat,et al. Collusion-free protocols , 2005, STOC '05.
[4] Elchanan Ben-Porath,et al. Cheap talk in games with incomplete information , 2003, J. Econ. Theory.
[5] Ueli Maurer,et al. Complete characterization of adversaries tolerable in secure multi-party computation (extended abstract) , 1997, PODC '97.
[6] John H. Miller,et al. Rational Cooperation in the Finitely Repeated Prisoner's Dilemma: Experimental Evidence , 1993 .
[7] Tal Rabin,et al. Simplified VSS and fast-track multiparty computations with applications to threshold cryptography , 1998, PODC '98.
[8] Ueli Maurer,et al. Player Simulation and General Adversary Structures in Perfect Multiparty Computation , 2000, Journal of Cryptology.
[9] A. Urbano,et al. Computationally restricted unmediated talk under incomplete information , 2004 .
[10] David M. Kreps,et al. Rational cooperation in the finitely repeated prisoners' dilemma , 1982 .
[11] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[12] Paul R. Milgrom,et al. Predation, reputation, and entry deterrence☆ , 1982 .
[13] Mehrdad Nojoumian. Socio-Rational Secret Sharing as a New Direction in Both Rational Cryptography and Game Theory , 2011, IACR Cryptol. ePrint Arch..
[14] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[15] Florian Kerschbaum,et al. Parallelizing secure linear programming , 2009, NSS 2009.
[16] Matthew K. Franklin,et al. Secure Communication in Minimal Connectivity Models , 1998, Journal of Cryptology.
[17] David Chaum,et al. Multiparty unconditionally secure protocols , 1988, STOC '88.
[18] Silvio Micali,et al. How to play ANY mental game , 1987, STOC.
[19] Abhi Shelat,et al. Completely fair SFE and coalition-safe cheap talk , 2004, PODC '04.
[20] Yongge Wang,et al. Perfectly Secure Message Transmission Revisited , 2002, IEEE Transactions on Information Theory.
[21] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[22] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[23] Shai Halevi,et al. A Cryptographic Solution to a Game Theoretic Problem , 2000, CRYPTO.
[24] Abhi Shelat,et al. Purely Rational Secret Sharing (Extended Abstract) , 2009, TCC.
[25] Ran Canetti,et al. Toward a Game Theoretic View of Secure Computation , 2011, Journal of Cryptology.
[26] Florian Kerschbaum,et al. Parallelizing secure linear programming , 2009, Concurr. Comput. Pract. Exp..
[27] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[28] Yehuda Lindell,et al. Utility Dependence in Correct and Fair Rational Secret Sharing , 2009, CRYPTO.
[29] Jonathan Katz,et al. Fair Computation with Rational Players , 2012, EUROCRYPT.
[30] Akira Okada. Perfect Bayesian Equilibrium and Sequential Equilibrium , 2011 .
[31] José E. Vila,et al. Computational complexity and communication: Coordination in two-player games , 2002 .
[32] Radu State,et al. Breaking Tor Anonymity with Game Theory and Data Mining , 2010, 2010 Fourth International Conference on Network and System Security.
[33] Timothy Lethbridge,et al. A New Approach for the Trust Calculation in Social Networks , 2006, ICE-B.
[34] Munindar P. Singh,et al. An adaptive social network for information access: Theoretical and experimental results , 2003, Appl. Artif. Intell..
[35] C. Pandu Rangan,et al. Rational Secret Sharing with Repeated Games , 2008, ISPEC.
[36] Moni Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[37] Moti Yung,et al. Perfectly secure message transmission , 1993, JACM.
[38] Douglas R. Stinson,et al. Socio-Rational Secret Sharing as a New Direction in Rational Cryptography , 2012, GameSec.
[39] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.
[40] Douglas R. Stinson,et al. Unconditionally secure social secret sharing scheme , 2010, IET Inf. Secur..
[41] Moni Naor,et al. Games for exchanging information , 2008, STOC.
[42] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[43] W. Hamilton,et al. The evolution of cooperation. , 1984, Science.
[44] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.