2013
DOI: 10.1007/978-3-642-41383-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Game-Theoretic Security for Bit Commitment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Much study has been devoted to rational secret sharing [20,1,14,24,25,27,28,3]. There are studies on other cryptographic primitives such as fair two-party computation [2,16], leader election [15], byzantine agreement [17], oblivious transfer [21], and commitment schemes [22]. Our work also can be seen as a study of rational cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…Much study has been devoted to rational secret sharing [20,1,14,24,25,27,28,3]. There are studies on other cryptographic primitives such as fair two-party computation [2,16], leader election [15], byzantine agreement [17], oblivious transfer [21], and commitment schemes [22]. Our work also can be seen as a study of rational cryptography.…”
Section: Related Workmentioning
confidence: 99%
“…In addition, as in the work of [4,14,15], we consider Nash equilibrium as the solution concept in terms of the game theory.…”
Section: Analysis Of Game-theoretic Securitymentioning
confidence: 99%
“…Recently, Asharov et al [4] studied two-party protocols in the fail-stop model in terms of game-theoretic security and showed how the notion of game theory can capture cryptographic properties. Furthermore, the game-theoretic security for oblivious transfer [14] and bit commitment [15] has been studied in the malicious model.…”
Section: Introductionmentioning
confidence: 99%