A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer.
Shota GotoJunji ShikataPublished in: IMACC (2015)
Keyphrases
- game theoretic
- key agreement protocol
- game theory
- semi honest
- decision problems
- security protocols
- privacy preserving
- cryptographic protocols
- nash equilibrium
- security properties
- nash equilibria
- imperfect information
- authentication protocol
- rational agents
- security requirements
- key exchange
- key distribution
- privacy preserving data mining
- trust model
- security model
- information security
- access control
- agent programming
- diffie hellman
- private information retrieval
- security mechanisms
- solution concepts
- regret minimization
- pure nash equilibrium
- decision making
- trusted third party
- coalitional games
- key management
- multi agent systems
- cooperative