Cryptography Reference
In-Depth Information
16. Osborne, M., Rubinstein, A.: A Course in Game Theory. MIT Press, Cambridge
(2004)
17. Rabin, T., Ben-Or, M.: Verifiable Secret Sharing and Multiparty Protocols with
Honest Majority. In: Proceedings of the 21th Annual ACM Symposium on Theory
of Computing (STOC), pp. 73-85 (1989)
18. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612-613
(1979)
19. Wegman, M., Carter, L.: New hash functions and their use in authentication and
set equality. Journal of Computer and System Sciences 22, 265-279 (1981)
20. Zhang, Z.: Rational secret sharing as extensive games,
http://eprint.iacr.org/2010/184
 
 
Search WWH ::




Custom Search