Cryptography and game theory
From MaRDI portal
Publication:3524717
Recommendations
Cited in
(11)- Utility dependence in correct and fair rational secret sharing
- Bayesian mechanism for rational secret sharing scheme
- On the impossibility of surviving (iterated) deletion of weakly dominated strategies in rational MPC
- Game theoretic notions of fairness in multi-party coin toss
- Correlation and unmediated cheap talk in repeated games with imperfect monitoring
- Toward a game theoretic view of secure computation
- Bridging Game Theory and Cryptography: Recent Results and Future Directions
- A complete characterization of game-theoretically fair, multi-party coin toss
- \(\log^\ast\)-round game-theoretically-fair leader election
- A game-theoretical and cryptographical approach to crypto-cloud computing and its economical and financial aspects
- Noisy three-player dilemma game: robustness of the quantum advantage
This page was built for publication: Cryptography and game theory
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3524717)