2016
DOI: 10.1093/comjnl/bxw094
|View full text |Cite
|
Sign up to set email alerts
|

General Constructions of Rational Secret Sharing with Expected Constant-Round Reconstruction: Table 1.

Abstract: We present a general construction of a rational secret-sharing protocol that converts any rational secret-sharing protocol to a protocol with an expected constant-round reconstruction. Our construction can be applied to protocols for synchronous channels, and preserves a strict Nash equilibrium of the original protocol. Combining with an existing protocol, we obtain the first expected constant-round protocol that achieves a strict Nash equilibrium with the optimal coalition resilience ⌈ n 2 ⌉ − 1, where n is t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
2
2
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…Halpern and Teague and followers [16,15,13,17,18] explored the rivalrous and excludable common good framework. Given a run r in the game tree, they introduce vector info(r) to be the n-tuple (t 1 , t 2 , .…”
Section: Halpern and Teague's Modelmentioning
confidence: 99%
“…Halpern and Teague and followers [16,15,13,17,18] explored the rivalrous and excludable common good framework. Given a run r in the game tree, they introduce vector info(r) to be the n-tuple (t 1 , t 2 , .…”
Section: Halpern and Teague's Modelmentioning
confidence: 99%
“…There are many studies using game-theoretic analysis for cryptographic primitives, including secret sharing [10]- [19], two-party protocols [20]- [22], public-key encryption [9], leader election [23], [24], Byzantine agreement [25], delegation of computation [26]- [30], and protocol design [31], [32]. Among them, repeated games have been introduced only in rational secret sharing [33].…”
Section: Related Workmentioning
confidence: 99%
“…Halpern and Teague [8] first studied the rational behavior of participants for secret sharing. Since then, rational secret sharing has been intensively studied [9], [10], [11], [12], [13], [14], [15]. Moreover, there have been many studies using game-theoretic analysis of cryptographic primitives/protocols, including two-party computation [16], [17], leader election [18], [19], Byzantine agreement [20], consensus [21], public-key encryption [22], [23], delegation of computation [24], [25], [26], [27], [28], [29], and protocol design [30], [31].…”
Section: Introductionmentioning
confidence: 99%