Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium

From MaRDI portal
Publication:2829231

DOI10.1007/978-3-662-53008-5_20zbMath1391.94752OpenAlexW2466495210MaRDI QIDQ2829231

Omkant Pandey, Sanjam Garg, Akshayaram Srinivasan

Publication date: 27 October 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53008-5_20




Related Items (36)

On the Complexity of Equilibrium Computation in First-Price AuctionsTFNP: An UpdateThe Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOSuccinct garbling schemes from functional encryption through a local simulation paradigmFE and iO for Turing machines from minimal assumptionsThe Journey from NP to TFNP HardnessFrom Cryptomania to Obfustopia Through Secret-Key Functional EncryptionSingle-Key to Multi-Key Functional Encryption with Polynomial LossFrom cryptomania to obfustopia through secret-key functional encryptionFrom minicrypt to obfustopia via private-key functional encryptionFrom FE combiners to secure MPC and backSNARGs and PPAD hardness from the decisional Diffie-Hellman assumptionBroadcast, trace and revoke with optimal parameters from polynomial hardnessUnique end of potential lineCollusion-resistant functional encryption for RAMsNon-interactive universal argumentsConstrained (Verifiable) Pseudorandom Function from Functional EncryptionPPAD is as hard as LWE and iterated squaringStreaming functional encryptionHardness of Continuous Local Search: Query Complexity and Cryptographic Lower BoundsRobust Transforming Combiners from Indistinguishability Obfuscation to Functional EncryptionFrom Minicrypt to Obfustopia via Private-Key Functional EncryptionDecomposable obfuscation: a framework for building applications of obfuscation from polynomial hardnessCan PPAD hardness be based on standard cryptographic assumptions?Constrained pseudorandom functions from functional encryptionCombiners for functional encryption, unconditionallyContinuous verifiable delay functionsIndistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplificationUnique End of Potential LineRevisiting the Cryptographic Hardness of Finding a Nash EquilibriumAmplifying the security of functional encryption, unconditionallyThe Complexity of Necklace Splitting, Consensus-Halving, and Discrete Ham SandwichFiat-Shamir for repeated squaring with applications to PPAD-hardness and VDFsDelegation with updatable unambiguous proofs and PPAD-hardnessPseudorandom Functions: Three Decades LaterBreaking the Sub-Exponential Barrier in Obfustopia



Cites Work


This page was built for publication: Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium