The field of rational cryptography considers the design of cryptographic protocols in the presence of rational agents seeking to maximize local utility functions. This departs from the standard secure multiparty computation setting, where players are assumed to be either honest or malicious. We detail the construction of both a two-party and a multiparty game theoretic framework for constructing rational cryptographic protocols. Our framework specifies the utility function assumptions necessary to realize the privacy, correctness, and fairness guarantees for protocols. We demonstrate that our framework correctly models cryptographic protocols, such as rational secret sharing, where existing work considers equilibrium concepts that yield unr...
Players in a game are assumed to be totally rational and absolutely smart. However, in reality all p...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
Players in a game are assumed to be totally rational and absolutely smart. However, in reality all p...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Rational cryptography has recently emerged as a very promising field of research by combining notion...
Rational cryptography has recently emerged as a very promising field of research by combining notion...
Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create mo...
Privacy-preserving set intersection protocol is desirable for many practical applications. Malicious...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
The Cryptographic and Game Theory worlds seem to have an intersection in that they both deal with an...
Players in a game are assumed to be totally rational and absolutely smart. However, in reality all p...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
Players in a game are assumed to be totally rational and absolutely smart. However, in reality all p...
The field of rational cryptography considers the design of cryptographic protocols in the presence o...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Rational cryptography has recently emerged as a very promising field of research by combining notion...
Rational cryptography has recently emerged as a very promising field of research by combining notion...
Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create mo...
Privacy-preserving set intersection protocol is desirable for many practical applications. Malicious...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Proceedings of: 10th International Conference on Parallel Problem Solving from Nature (PPSN 2008), D...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
The Cryptographic and Game Theory worlds seem to have an intersection in that they both deal with an...
Players in a game are assumed to be totally rational and absolutely smart. However, in reality all p...
Part 7: Privacy-Preserving Data Applications IIInternational audiencePrivacy-preserving data mining ...
Players in a game are assumed to be totally rational and absolutely smart. However, in reality all p...