There are many fruitful connections between the research areas of game theory and cryptography. For example, game theory was used to solve cryptographic information exchange problems, such as secret sharing and secure multiparty computation (SMPC). Our research involves a study of two-player games defined over several algebraic structures. These structures are used as mathematical platforms for numerous modern cryptosystems. The aim of this research is to identify algebraic structures providing a defense against more recently developed protocol-based attacks while still supporting other security objectives. Our methods include investigation of games defined over various fundamental finite groups, followed by investigation of the effects of ...
The goal of this paper is to (re)introduce a real-world chal-lenge problem for researchers in multia...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Most previous work on unconditionally secure multiparty computation has focused on computing over a ...
The Cryptographic and Game Theory worlds seem to have an intersection in that they both deal with an...
Abstract. We study two impartial games introduced by Anderson and Harary and further devel-oped by B...
We provide two methodologies in the area of computation theory to solve optimal strategies for games...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
This book is about relations between three different areas of mathematics and theoretical computer s...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
International audienceThe algebraic-group model (AGM), which lies between the generic group model an...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
(Draft 0.4) In the game-playing technique, one writes a pseudocode game such that an adversary’s adv...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
The goal of this paper is to (re)introduce a real-world chal-lenge problem for researchers in multia...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Most previous work on unconditionally secure multiparty computation has focused on computing over a ...
The Cryptographic and Game Theory worlds seem to have an intersection in that they both deal with an...
Abstract. We study two impartial games introduced by Anderson and Harary and further devel-oped by B...
We provide two methodologies in the area of computation theory to solve optimal strategies for games...
he algebraic-group model (AGM), which lies between the generic group model and the standard model of...
The progressively ubiquitous connectivity in the present information systems pose newer challenges t...
This book is about relations between three different areas of mathematics and theoretical computer s...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
International audienceThe algebraic-group model (AGM), which lies between the generic group model an...
We study the natural problem of secure n-party computation (in the computationally unbounded attack ...
(Draft 0.4) In the game-playing technique, one writes a pseudocode game such that an adversary’s adv...
This thesis report is submitted in partial fulfillment of the requirements for the degree of Bachelo...
Cryptography lies at the heart of most technologies deployed today for secure communications. At the...
The goal of this paper is to (re)introduce a real-world chal-lenge problem for researchers in multia...
In the Crypto'07 paper [5], Desmedt et al. studied the problem of achieving secure n-party computati...
Most previous work on unconditionally secure multiparty computation has focused on computing over a ...