Sciweavers

27 search results - page 2 / 6
» Sequential Rationality in Cryptographic Protocols
Sort
View
CRYPTO
2009
Springer
105views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Privacy-Enhancing Auctions Using Rational Cryptography
Abstract. We consider enhancing with privacy concerns a large class of auctions, which include sealed-bid single-item auctions but also general multi-item multi-winner auctions, ou...
Peter Bro Miltersen, Jesper Buus Nielsen, Nikos Tr...
ECAI
2006
Springer
13 years 9 months ago
Alternating-Offers Bargaining Under One-Sided Uncertainty on Deadlines
Abstract. Alternating-offers is the most prominent negotiation protocol for automatic bilateral bargaining. Nevertheless, in most settings it is still not known how two fully ratio...
Francesco Di Giunta, Nicola Gatti
CRYPTO
2009
Springer
122views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Utility Dependence in Correct and Fair Rational Secret Sharing
The problem of carrying out cryptographic computations when the participating parties are rational in a game-theoretic sense has recently gained much attention. One problem that h...
Gilad Asharov, Yehuda Lindell
TCC
2009
Springer
133views Cryptology» more  TCC 2009»
14 years 5 months ago
Composing Quantum Protocols in a Classical Environment
We propose a general security definition for cryptographic quantum protocols that implement classical non-reactive two-party tasks. The definition is expressed in terms of simple q...
Serge Fehr, Christian Schaffner
CORR
2006
Springer
125views Education» more  CORR 2006»
13 years 5 months ago
Reversible Logic to Cryptographic Hardware: A New Paradigm
Differential Power Analysis (DPA) presents a major challenge to mathematically-secure cryptographic protocols. Attackers can break the encryption by measuring the energy consumed i...
Himanshu Thapliyal, Mark Zwolinski