Sciweavers

75
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Game Theory with Costly Computation: Formulation and Application to Protocol Security
: We develop a general game-theoretic framework for reasoning about strategic agents performing possibly costly computation. In this framework, many traditional game-theoretic resu...
Joseph Y. Halpern, Rafael Pass
53
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Robustly Leveraging Collusion in Combinatorial Auctions
feuse of its devstting eets in utions nd other mehnismsD ollusion is prohiited nd leglly proseutedF etD olluders hve lwys existedD nd my ontinue to existF e thus rise the followin...
Jing Chen, Silvio Micali, Paul Valiant
55
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Playing Games without Observing Payoffs
Michal Feldman, Adam Kalai, Moshe Tennenholtz
68
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Pan-Private Streaming Algorithms
Collectors of confidential data, such as governmental agencies, hospitals, or search engine providers, can be pressured to permit data to be used for purposes other than that for ...
Cynthia Dwork, Moni Naor, Toniann Pitassi, Guy N. ...
68
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol
Andrew Lutomirski, Scott Aaronson, Edward Farhi, D...
66
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
A New Approach to Strongly Polynomial Linear Programming
Mihály Bárász, Santosh Vempala
103
Voted
ICS
2010
Tsinghua U.
15 years 6 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz