Collusion-Free Protocols in the Mediated Model
From MaRDI portal
Publication:3600237
DOI10.1007/978-3-540-85174-5_28zbMath1183.68079OpenAlexW1907580662MaRDI QIDQ3600237
Abhi Shelat, Ivan Visconti, Joël Alwen
Publication date: 10 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_28
Distributed systems (68M14) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (9)
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer ⋮ Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions ⋮ On access control encryption without sanitization ⋮ Privacy preserving solution of DCOPs by mediation ⋮ Steganography-free zero-knowledge ⋮ PC-SyncBB: a privacy preserving collusion secure DCOP algorithm ⋮ Message Transmission with Reverse Firewalls—Secure Communication on Corrupted Machines ⋮ Efficient Rational Secret Sharing in Standard Communication Networks ⋮ MPC with friends and foes
Cites Work
- Unnamed Item
- Unnamed Item
- Subjectivity and correlation in randomized strategies
- Collusion-free protocols
- Proofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systems
- The Prisoners’ Problem and the Subliminal Channel
- Verifiably Secure Devices
- Secure Computation Without Authentication
- Completely fair SFE and coalition-safe cheap talk
This page was built for publication: Collusion-Free Protocols in the Mediated Model