Collusion-free protocols
From MaRDI portal
Publication:3581451
DOI10.1145/1060590.1060671zbMath1192.94122OpenAlexW2078907844MaRDI QIDQ3581451
Abhi Shelat, Matt Lepinksi, Silvio Micali
Publication date: 16 August 2010
Published in: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1145/1060590.1060671
Related Items (9)
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ Steganography-free zero-knowledge ⋮ Utility dependence in correct and fair rational secret sharing ⋮ Blackwell's comparison of experiments and discounted repeated games ⋮ Collusion-Free Protocols in the Mediated Model ⋮ Cryptography and Game Theory: Designing Protocols for Exchanging Information ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Efficient Rational Secret Sharing in Standard Communication Networks
This page was built for publication: Collusion-free protocols