Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Cryptography and Game Theory: Designing Protocols for Exchanging Information - MaRDI portal

Cryptography and Game Theory: Designing Protocols for Exchanging Information

From MaRDI portal
Publication:5445513

DOI10.1007/978-3-540-78524-8_18zbMath1162.94378OpenAlexW2120391870MaRDI QIDQ5445513

Gillat Kol, Moni Naor

Publication date: 5 March 2008

Published in: Theory of Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-78524-8_18




Related Items (24)

One-time rational secret sharing scheme based on bayesian gameBayesian mechanism for rational secret sharing schemeGame theoretic notions of fairness in multi-party coin tossAn optimally fair coin tossToward a game theoretic view of secure computationA Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious TransferFully leakage-resilient signaturesA complete characterization of game-theoretically fair, multi-party coin tossTowards reducing delegation overhead in replication-based verification: an incentive-compatible rational delegation computing scheme\(\log^\ast\)-round game-theoretically-fair leader electionA game-theoretic security framework for quantum cryptography: performance analysis and applicationUtility dependence in correct and fair rational secret sharingSimpler statistically sender private oblivious transfer from ideals of cyclotomic integersSecure message transmission on directed networksThe meeting businessmen problem: requirements and limitationsWhen Is a Semi-honest Secure Multiparty Computation Valuable?Realistic versus Rational Secret SharingEstablishing rational networking using the DL04 quantum secure direct communication protocolUnmediated communication with partially verifiable typesCryptography and Game Theory: Designing Protocols for Exchanging InformationPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningNon-interactive zero knowledge from sub-exponential DDHEfficient Rational Secret Sharing in Standard Communication NetworksEconomically Optimal Variable Tag Length Message Authentication



Cites Work


This page was built for publication: Cryptography and Game Theory: Designing Protocols for Exchanging Information