Sciweavers

4 search results - page 1 / 1
» Rationality and Adversarial Behavior in Multi-party Computat...
Sort
View
STOC
1996
ACM
185views Algorithms» more  STOC 1996»
13 years 8 months ago
Adaptively Secure Multi-Party Computation
A fundamental problem in designing secure multi-party protocols is how to deal with adaptive adversaries i.e., adversaries that may choose the corrupted parties during the course ...
Ran Canetti, Uriel Feige, Oded Goldreich, Moni Nao...
CRYPTO
2006
Springer
93views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
Rationality and Adversarial Behavior in Multi-party Computation
Anna Lysyanskaya, Nikos Triandopoulos
IWSEC
2010
Springer
13 years 3 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
TCC
2010
Springer
208views Cryptology» more  TCC 2010»
14 years 1 months ago
Rationality in the Full-Information Model
We study rationality in protocol design for the full-information model, a model characterized by computationally unbounded adversaries, no private communication, and no simultanei...
Ronen Gradwohl