Cryptography Reference
In-Depth Information
MAC used inside. The t -out-of- n protocol is ( t
1)-resilient and the is expo-
nentially small in the number of participants. We leave it as an open problem to
determine the lower bound of in both cases.
References
1. Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game
theory: robust mechanisms for rational secret sharing and multiparty computa-
tion. In: 25th ACM Symposium Annual on Principles of Distributed Computing,
pp. 53-62. ACM Press, New York (2006)
2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National
Computer Conference, American Federation of Information Processing Societies
Proceedings, vol. 48, pp. 313-317 (1979)
3. Daskalakis, C., Goldberg, P., Papadimitriou, C.: The complexity of computing a
Nash equilibrium. In: Proc. STOC 2006, pp. 71-78. ACM Press, New York (2006)
4. Daskalakis, C., Mehta, A., Papadimitriou, C.: A note on approximate Nash equilib-
ria. In: International Workshop on Internet and Network Economics, pp. 297-306
(2006)
5. Fuchsbauer, G., Katz, J., Naccache, D.: Ecient Rational Secret Sharing in
Standard Communication Networks. In: Micciancio, D. (ed.) TCC 2010. LNCS,
vol. 5978, pp. 419-436. Springer, Heidelberg (2010)
6. Gordon, S.D., Hazay, C., Katz, J., Lindell, Y.: Complete fairness in secure two-
party computation. In: Proc. STOC 2008, pp. 413-422. ACM Press, New York
(2008)
7. Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung,
M. (eds.) SCN 2006. LNCS, vol. 4116, pp. 229-241. Springer, Heidelberg (2006)
8. Halpern, J., Teague, V.: Rational secret sharing and multiparty computation. In:
Proc. of 36th STOC, pp. 623-632. ACM Press, New York (2004)
9. Izmalkov, S., Micali, S., Lepinski, M.: Rational secure computation and ideal mech-
anism design. In: 46th Annual Symposium on Foundations of Computer Science
(FOCS), pp. 585-595. IEEE, Los Alamitos (2005)
10. Kol, G., Naor, M.: Games for exchanging information. In: STOC 2008, pp. 423-432.
ACM, New York (2008)
11. Kol, G., Naor, M.: Cryptography and game theory: Designing protocols for
exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol. 4948,
pp. 320-339. Springer, Heidelberg (2008)
12. Lepinski, M., Micali, S., Peikert, C., Shelat, A.: Completely fair SFE and coali-
tionsafe cheap talk. In: 23rd ACM Symposium Annual on Principles of Distributed
Computing, pp. 1-10. ACM Press, New York (2004)
13. Lepinski, M., Micali, S., Shelat, A.: Collusion-free protocols. In: 37th Annual ACM
Symposium on Theory of Computing (STOC), pp. 543-552. ACM Press, New York
(2005)
14. Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-
party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 180-197.
Springer, Heidelberg (2006)
15. Maleka, S., Shareef, A., Rangan, C.P.: The deterministic protocol for rational secret
sharing. In: IEEE International Symposium on Parallel and Distributed Processing,
IPDPS 2008, pp. 1-7 (2008)
Search WWH ::




Custom Search