Lecture Notes in Computer Science
DOI: 10.1007/978-3-540-78524-8_18
|View full text |Cite
|
Sign up to set email alerts
|

Cryptography and Game Theory: Designing Protocols for Exchanging Information

Abstract: The goal of this paper is nding fair protocols for the secret sharing and secure multiparty computation (SMPC) problems, when players are assumed to be rational.It was observed by Halpern and Teague (STOC 2004) that protocols with bounded number of iterations are susceptible to backward induction and cannot be considered rational. Previously suggested cryptographic solutions all share the property of having an essential exponential upper bound on their running time, and hence they are also susceptible to backw… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
131
0

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 137 publications
(131 citation statements)
references
References 32 publications
0
131
0
Order By: Relevance
“…To eliminate the on-line dealer, several schemes rely on multiple invocations of protocols for generic secure multi-party computation [11,24,1,18,4]. It is unclear whether computationally efficient protocols with suitable functionality can be designed.…”
Section: Computational Inefficiencymentioning
confidence: 99%
See 3 more Smart Citations
“…To eliminate the on-line dealer, several schemes rely on multiple invocations of protocols for generic secure multi-party computation [11,24,1,18,4]. It is unclear whether computationally efficient protocols with suitable functionality can be designed.…”
Section: Computational Inefficiencymentioning
confidence: 99%
“…Kol and Naor [18] show how to avoid simultaneous broadcast, at the cost of increasing the round complexity by a (multiplicative) factor linear in the size of the domain from which the secret is chosen; this approach cannot (efficiently) handle secrets of super-logarithmic length. Subsequent work by Kol and Naor [19] (see also [4]) shows how to avoid the assumption of simultaneous broadcast at the expense of increasing the round complexity by a (multiplicative) factor of t. We provide a detailed comparison of our results to those of [19] in Section 1.3.…”
Section: Strong Communication Modelsmentioning
confidence: 99%
See 2 more Smart Citations
“…Several protocols have been devised to solve this problem [5,4,1,10,9,8,7,6,11,13,2,3], but only a handful have actually dealt with rational secret sharing using an asynchronous broadcast channel. These include Maleka et al's result [10] and Fuchsbauer et al's result [3], and Ong et al's result [13].…”
Section: Introductionmentioning
confidence: 99%