Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security 2018
DOI: 10.1145/3243734.3243857
|View full text |Cite
|
Sign up to set email alerts
|

FairSwap

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
53
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 156 publications
(53 citation statements)
references
References 18 publications
0
53
0
Order By: Relevance
“…ϕ : σ → {0, 1}. For example, the FairSwap protocol implements such a mechanism by arithmetic circuits [12]. p are the payments made from a receiving agent B to a performing agent A as stated in the agreement.…”
Section: Contracts and Agreementsmentioning
confidence: 99%
See 4 more Smart Citations
“…ϕ : σ → {0, 1}. For example, the FairSwap protocol implements such a mechanism by arithmetic circuits [12]. p are the payments made from a receiving agent B to a performing agent A as stated in the agreement.…”
Section: Contracts and Agreementsmentioning
confidence: 99%
“…For instance, the first iteration of this strategy is denoted by γ = 0; the next iteration by γ = 1. If we consider a one-shot game, whether the agent optimally commits a desired or undesired action is determined by (12). However, this does not consider the fact that once the agent performs an undesired action they need to work back up through the layers, with greater opportunity costs for their lockedup deposit, by performing ω − 1 desired actions to reach the highest layer again.…”
Section: Decision Boundary For Type T Rmentioning
confidence: 99%
See 3 more Smart Citations