A rational approach to cryptographic protocols

Mathematical and Computer Modelling - Tập 46 - Trang 80-87 - 2007
P. Caballero-Gil1, C. Henández-Goya1, C. Bruno-Castañeda1
1Department of Statistics, Operations Research and Computing, Faculty of Mathematics, University of La Laguna, 38271 Tenerife, Spain

Tài liệu tham khảo

Fischer, 1993, An application of game-theoretic techniques to cryptography, vol. 13, 99 Dodis, 2000, A cryptographic solution to a game theoretic problem, vol. 1880, 112 O. Gossner, Repeated games played by cryptographically sophisticated players, Technical Report Paper 9836, Catholique de Louvain-Center for Operations Research and Economics, 1999 F. Brandt, T. Sandholm, Correctness and pricvacy in distributed mechanisms, in: Proceedings of the Agent-Mediated Electronic Commerce Workshop, New York, 2004 Garay, 2000, Abuse-Free optimistic contract signing, vol. 1666, 449 L. Buttyan, J. Hubaux, Toward a formal model of fair exchange — A game theoretic approach, Technical Report EPFL SSC/ 1999/039, Laboratory of Computer Communications and Applications, Swiss Federal Institute of Technology, Lausanne, 1999 S. Kremer, J.F. Raskin, Game analysis of abuse-free contract signing, in: Computer Security Foundations Workshop, Canada, 2002 T. Sandholm, X. Wang, (Im)possibility of safe exchange mechanism design, in: Proceedings of National Conference on Artificial Intelligence, 2002, pp. 338–344 Chadha, 2003, Contract signing, optimism and advantage, vol. 2761, 366 L. Buttyan, J. Hubaux, Rational exchange — A formal model based on game theory, in: 2nd International Workshop on Electronic Commerce, Heidelberg, Germany, 2001, pp. 16–17 Asokan, 2000, Optimistic fair exchange of digital signatures, IEEE Journal on Selected Areas in Communications, 18, 593, 10.1109/49.839935 L. Buttyan, Building blocks for secure services: Authenticated key transport and rational exchange protocols, Ph.D. Thesis, Laboratory of Computer Communications and Applications, Swiss Federal Institute of Technology, Lausanne, 2002 Even, 1985, A randomizaed protocol for signing contract, Communications of the ACM, 28, 637, 10.1145/3812.3818 Goldreich, 2002, vol. 2 M. Rabin, How to excahnge secrets by oblivious transfer, Technical Report TR-81, Harvard, 1981