A Cryptographic Solution to a Game Theoretic Problem
- 11 August 2000
- book chapter
- Published by Springer Nature
- p. 112-130
- https://doi.org/10.1007/3-540-44598-6_7
Abstract
No abstract availableKeywords
This publication has 25 references indexed in Scilit:
- Does parallel repetition lower the error in computationally sound protocols?Published by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- A Public Key Cryptosystem and a Signature Scheme Based on Discrete LogarithmsPublished by Springer Nature ,2000
- Efficient Zero-Knowledge Proofs of Knowledge without Intractability AssumptionsPublished by Springer Nature ,2000
- Concurrent zero-knowledgePublished by Association for Computing Machinery (ACM) ,1998
- An application of game theoretic techniques to cryptographyPublished by American Mathematical Society (AMS) ,1993
- Universal MechanismsEconometrica, 1990
- Witness indistinguishable and witness hiding protocolsPublished by Association for Computing Machinery (ACM) ,1990
- Can sunspots replace a mediator?Journal of Mathematical Economics, 1988
- Completeness theorems for non-cryptographic fault-tolerant distributed computationPublished by Association for Computing Machinery (ACM) ,1988
- Subjectivity and correlation in randomized strategiesJournal of Mathematical Economics, 1974