Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Rational secret sharing and multiparty computation - MaRDI portal

Rational secret sharing and multiparty computation

From MaRDI portal
Publication:3580953

DOI10.1145/1007352.1007447zbMath1192.94119OpenAlexW2168325212MaRDI QIDQ3580953

Joseph Y. Halpern, Vanessa Teague

Publication date: 15 August 2010

Published in: Proceedings of the thirty-sixth annual ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1007352.1007447




Related Items (36)

One-time rational secret sharing scheme based on bayesian gameIncentive-driven attacker for corrupting two-party protocolsGame theoretic notions of fairness in multi-party coin tossAn optimally fair coin tossToward a game theoretic view of secure computationEnforcing input correctness via certification in garbled circuit evaluationImproved signature schemes for secure multi-party computation with certified inputsA complete characterization of game-theoretically fair, multi-party coin tossFair quantum secret sharing based on symmetric bivariate polynomialTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme\(\log^\ast\)-round game-theoretically-fair leader electionA game-theoretic security framework for quantum cryptography: performance analysis and applicationData curation from privacy-aware agentsUtility dependence in correct and fair rational secret sharingRational quantum secret sharing scheme based on GHZ stateSecure message transmission on directed networksProtocol completion incentive problems in cryptographic Vickrey auctionsWhen Is a Semi-honest Secure Multiparty Computation Valuable?Realistic versus Rational Secret SharingPerfectly Secure Message Transmission Against Independent Rational AdversariesExtremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verificationA rational framework for secure communicationEstablishing rational networking using the DL04 quantum secure direct communication protocolRational protocol of quantum secure multi-party computationUnmediated communication with partially verifiable typesGame theoretic security of quantum bit commitmentTightly coupled multi-group threshold secret sharing based on Chinese remainder theoremCryptography and Game Theory: Designing Protocols for Exchanging InformationRound-preserving parallel composition of probabilistic-termination cryptographic protocolsThreshold changeable secret sharing with secure secret reconstructionFair hierarchical secret sharing scheme based on smart contractEfficient Rational Secret Sharing in Standard Communication NetworksVerification of multi-agent systems with public actions against strategy logicA rational threshold signature model and protocol based on different permissionsEconomically Optimal Variable Tag Length Message AuthenticationScalable mechanisms for rational secret sharing




This page was built for publication: Rational secret sharing and multiparty computation