Abstract—In game theory, a trusted mediator acting on behalf of the players can enable the attainment of correlated equilibria, which may provide better payoffs than those available from the Nash equilibria alone. We explore the approach of replacing the trusted mediator with an unconditionally secure sampling protocol that jointly generates the players ’ actions. We characterize the joint distributions that can be securely sampled by malicious players via protocols using error-free communication. This class of distributions depends on whether players may speak simultaneously (“cheap talk”) or must speak in turn (“polite talk”). In applying sampling protocols toward attaining correlated equilibria with rational players, we observe that secu...
We study turn-based quantitative multiplayer non zero-sum games played onfinite graphs with reachabi...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
author done under the supervision of Prof. Ehud Lehrer. I would like to thank Prof. Lehrer for his c...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
ABSTRACT We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of ...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of size up t...
Abstract—An important subclass of secure multiparty computation is secure sampling: two parties outp...
Secure multiparty computation enables protocol participants to compute the output of a public functi...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
A common problem in many markets is that competing firms cannot plan joint business strategies which...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
We study an interactive framework that explicitly allows for nonrational behavior. We do not place a...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
This paper considers the problem of Nash equilibrium (NE) seeking in aggregative games, where the co...
We study turn-based quantitative multiplayer non zero-sum games played onfinite graphs with reachabi...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
author done under the supervision of Prof. Ehud Lehrer. I would like to thank Prof. Lehrer for his c...
We revisit the question of whether cryptographic protocols can replace correlated equilibria mediato...
ABSTRACT We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of ...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
We study k-resilient Nash equilibria, joint strategies where no member of a coalition C of size up t...
Abstract—An important subclass of secure multiparty computation is secure sampling: two parties outp...
Secure multiparty computation enables protocol participants to compute the output of a public functi...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
A common problem in many markets is that competing firms cannot plan joint business strategies which...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
We study an interactive framework that explicitly allows for nonrational behavior. We do not place a...
This paper analyzes the implementation of correlated equilibria that are immune to joint deviations ...
This paper considers the problem of Nash equilibrium (NE) seeking in aggregative games, where the co...
We study turn-based quantitative multiplayer non zero-sum games played onfinite graphs with reachabi...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
author done under the supervision of Prof. Ehud Lehrer. I would like to thank Prof. Lehrer for his c...