A rational framework for secure communication
From MaRDI portal
Publication:497644
DOI10.1016/j.ins.2013.06.027zbMath1336.94073OpenAlexW2037473757MaRDI QIDQ497644
Changgen Peng, Youliang Tian, Yichuan Wang, Liumei Zhang, Jian-Feng Ma
Publication date: 24 September 2015
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2013.06.027
Cryptography (94A60) Other game-theoretic models (91A40) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Bayesian mechanism for rational secret sharing scheme ⋮ Towards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme
Uses Software
Cites Work
- Provably secure three-party password-based authenticated key exchange protocol
- A rational approach to cryptographic protocols
- Secure communications over insecure channels
- Utility Dependence in Correct and Fair Rational Secret Sharing
- Rational Secret Sharing, Revisited
- Rational secret sharing and multiparty computation
- New directions in cryptography
- A method for obtaining digital signatures and public-key cryptosystems
- Distributed computing meets game theory
- Secure Communications over Insecure Channels Based on Short Authenticated Strings
- Rationality and Adversarial Behavior in Multi-party Computation
- CONCUR 2003 - Concurrency Theory
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A rational framework for secure communication