Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
31
views
26
references
Top references
cited by
16
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,592
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings
Bridging Game Theory and Cryptography: Recent Results and Future Directions
other
Author(s):
Jonathan Katz
Publication date
(Print):
2008
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
New directions in predictive processing
Most cited references
26
Record
: found
Abstract
: not found
Article
: not found
Subjectivity and correlation in randomized strategies
Robert J. Aumann
(1974)
0
comments
Cited
189
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Algorithmic Game Theory
Noam Nisan
,
Tim Roughgarden
,
Eva Tardos
…
(2007)
0
comments
Cited
162
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Limits on the security of coin flips when half the processors are faulty
R. Cleve
(1986)
0
comments
Cited
51
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 251-272
DOI:
10.1007/978-3-540-78524-8_15
SO-VID:
a071b0bd-9036-48b8-9627-f55cb5861cb1
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Incrementally Verifiable Computation or Proofs of Knowledge Imply Time/Space Efficiency
pp. 19
On Seed-Incompressible Functions
pp. 37
Asymptotically Efficient Lattice-Based Digital Signatures
pp. 55
Basing Weak Public-Key Cryptography on Strong One-Way Functions
pp. 73
Which Languages Have 4-Round Zero-Knowledge Proofs?
pp. 89
How to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-Knowledge
pp. 107
General Properties of Quantum Zero-Knowledge Proofs
pp. 125
The Layered Games Framework for Specifications and Analysis of Security Protocols
pp. 142
Universally Composable Multi-party Computation with an Unreliable Common Reference String
pp. 155
Efficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert Adversaries
pp. 176
Fast Private Norm Estimation and Heavy Hitters
pp. 194
Matroids Can Be Far from Ideal Secret Sharing
pp. 213
Perfectly-Secure MPC with Linear Communication Complexity
pp. 231
MPC vs. SFE: Perfect Security in a Unified Corruption Model
pp. 251
Bridging Game Theory and Cryptography: Recent Results and Future Directions
pp. 273
Verifiably Secure Devices
pp. 302
Lower Bounds on Implementing Robust and Resilient Mediators
pp. 320
Cryptography and Game Theory: Designing Protocols for Exchanging Information
pp. 340
Equivocal Blind Signatures and Adaptive UC-Security
pp. 356
P-signatures and Noninteractive Anonymous Credentials
pp. 375
Multi-property Preserving Combiners for Hash Functions
pp. 393
OT-Combiners via Secure Computation
pp. 412
Semi-honest to Malicious Oblivious Transfer—The Black-Box Way
pp. 427
Black-Box Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
pp. 445
A Linear Lower Bound on the Communication Complexity of Single-Server Private Information Retrieval
pp. 465
Randomness Extraction Via δ-Biased Masking in the Presence of a Quantum Attacker
pp. 482
An Equivalence Between Zero Knowledge and Commitments
pp. 501
Interactive and Noninteractive Zero Knowledge are Equivalent in the Help Model
pp. 535
The Round-Complexity of Black-Box Zero-Knowledge: A Combinatorial Characterization
pp. 553
On Constant-Round Concurrent Zero-Knowledge
pp. 571
Concurrent Non-malleable Commitments from Any One-Way Function
pp. 589
Faster and Shorter Password-Authenticated Key Exchange
pp. 607
Saving Private Randomness in One-Way Functions and Pseudorandom Generators
pp. 626
Degradation and Amplification of Computational Hardness
Similar content
2,592
Data Security using Compression and Cryptography Techniques
Authors:
Ruchita Sharma
,
Swarnalata Bollavarapu
Cheating prevention in Visual Cryptography using steganographic scheme
Authors:
Biswapati Jana
,
Partha Chowdhuri
,
auMadhumita Mallick
…
A design of secure communication architecture applying quantum cryptography
Authors:
See all similar
Cited by
16
FlipIt: The Game of “Stealthy Takeover”
Authors:
Ronald L. Rivest
,
Alina Oprea
,
Ari Juels
…
Efficient Rational Secret Sharing in Standard Communication Networks
Authors:
Georg Fuchsbauer
,
Jonathan Katz
,
David Naccache
Defending against the Unknown Enemy: Applying FlipIt to System Security
Authors:
Kevin Bowers
,
Marten van Dijk
,
Robert Griffin
…
See all cited by