Rational secret sharing as extensive games
暂无分享,去创建一个
[1] Moni Naor,et al. Cryptography and Game Theory: Designing Protocols for Exchanging Information , 2008, TCC.
[2] M. Dufwenberg. Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.
[3] Jonathan Katz,et al. Bridging Game Theory and Cryptography: Recent Results and Future Directions , 2008, TCC.
[4] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[5] T. Rabin,et al. Algorithmic Game Theory: Cryptography and Game Theory , 2007 .
[6] David C. Parkes,et al. Fairness with an Honest Minority and a Rational Majority , 2009, TCC.
[7] Joseph Y. Halpern,et al. Rational secret sharing and multiparty computation: extended abstract , 2004, STOC '04.
[8] Tal Rabin,et al. 1 Cryptography and Game Theory , 2022 .
[9] Moni Naor,et al. Games for exchanging information , 2008, STOC.
[10] Anna Lysyanskaya,et al. Rationality and Adversarial Behavior in Multi-party Computation , 2006, CRYPTO.
[11] C. Pandu Rangan,et al. Rational Secret Sharing with Repeated Games , 2008, ISPEC.
[12] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[13] Jonathan Katz,et al. Rational Secret Sharing, Revisited , 2006, SCN.
[14] Oded Goldreich,et al. Foundations of Cryptography: List of Figures , 2001 .
[15] Yehuda Lindell,et al. Complete Fairness in Secure Two-Party Computation , 2011, JACM.
[16] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[17] Tal Rabin,et al. Verifiable secret sharing and multiparty protocols with honest majority , 1989, STOC '89.
[18] Oded Goldreich. Foundations of Cryptography: Index , 2001 .
[19] Oded Goldreich,et al. Foundations of Cryptography: Volume 1, Basic Tools , 2001 .
[20] Adi Shamir,et al. How to share a secret , 1979, CACM.
[21] Georg Fuchsbauer,et al. Efficient Rational Secret Sharing in Standard Communication Networks , 2010, IACR Cryptol. ePrint Arch..
[22] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[23] Danny Dolev,et al. Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation , 2006, PODC '06.