Proceedings of the Fortieth Annual ACM Symposium on Theory of Computing 2008
DOI: 10.1145/1374376.1374437
|View full text |Cite
|
Sign up to set email alerts
|

Games for exchanging information

Abstract: We consider the rational versions of two of the classical problems in foundations of cryptography: secret sharing and multiparty computation, suggested by Halpern and Teague (STOC 2004). Our goal is to design games and fair strategies that encourage rational participants to exchange information about their inputs for their mutual benefit, when the only mean of communication is a broadcast channel.We show that protocols for the above information exchanging tasks, where players' values come from a bounded domain… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
193
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 93 publications
(195 citation statements)
references
References 15 publications
2
193
0
Order By: Relevance
“…This is quite similar to what was proven in Kol and Naor's paper [7] for Theorem 5.2. However, in our case, we are using an asynchronous channel instead of the simultaneous channel that they used.…”
Section: Protocol Analysissupporting
confidence: 91%
See 4 more Smart Citations
“…This is quite similar to what was proven in Kol and Naor's paper [7] for Theorem 5.2. However, in our case, we are using an asynchronous channel instead of the simultaneous channel that they used.…”
Section: Protocol Analysissupporting
confidence: 91%
“…The values of β 0 and c 0 : We now need to calculate two values before we proceed to formulate our theorem. This analysis is present in Kol and Naor's paper [7] and will be repeated below (with slight tweaks) for the sake of understanding. We first define the utility values for a player i as follows:…”
Section: Protocol Analysismentioning
confidence: 95%
See 3 more Smart Citations