A rational approach to cryptographic protocols
Tài liệu tham khảo
Fischer, 1993, An application of game-theoretic techniques to cryptography, vol. 13, 99
Dodis, 2000, A cryptographic solution to a game theoretic problem, vol. 1880, 112
O. Gossner, Repeated games played by cryptographically sophisticated players, Technical Report Paper 9836, Catholique de Louvain-Center for Operations Research and Economics, 1999
F. Brandt, T. Sandholm, Correctness and pricvacy in distributed mechanisms, in: Proceedings of the Agent-Mediated Electronic Commerce Workshop, New York, 2004
Garay, 2000, Abuse-Free optimistic contract signing, vol. 1666, 449
L. Buttyan, J. Hubaux, Toward a formal model of fair exchange — A game theoretic approach, Technical Report EPFL SSC/ 1999/039, Laboratory of Computer Communications and Applications, Swiss Federal Institute of Technology, Lausanne, 1999
S. Kremer, J.F. Raskin, Game analysis of abuse-free contract signing, in: Computer Security Foundations Workshop, Canada, 2002
T. Sandholm, X. Wang, (Im)possibility of safe exchange mechanism design, in: Proceedings of National Conference on Artificial Intelligence, 2002, pp. 338–344
Chadha, 2003, Contract signing, optimism and advantage, vol. 2761, 366
L. Buttyan, J. Hubaux, Rational exchange — A formal model based on game theory, in: 2nd International Workshop on Electronic Commerce, Heidelberg, Germany, 2001, pp. 16–17
Asokan, 2000, Optimistic fair exchange of digital signatures, IEEE Journal on Selected Areas in Communications, 18, 593, 10.1109/49.839935
L. Buttyan, Building blocks for secure services: Authenticated key transport and rational exchange protocols, Ph.D. Thesis, Laboratory of Computer Communications and Applications, Swiss Federal Institute of Technology, Lausanne, 2002
Even, 1985, A randomizaed protocol for signing contract, Communications of the ACM, 28, 637, 10.1145/3812.3818
Goldreich, 2002, vol. 2
M. Rabin, How to excahnge secrets by oblivious transfer, Technical Report TR-81, Harvard, 1981