A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer.
Shota GotoJunji ShikataPublished in: IACR Cryptol. ePrint Arch. (2015)
Keyphrases
- game theoretic
- key agreement protocol
- game theory
- semi honest
- decision problems
- nash equilibrium
- security protocols
- privacy preserving
- cryptographic protocols
- security properties
- nash equilibria
- diffie hellman
- key exchange
- privacy preserving data mining
- security requirements
- imperfect information
- authentication protocol
- information security
- agent programming
- solution concepts
- key distribution
- private information retrieval
- fair exchange protocols
- trust model
- multi party
- regret minimization
- messages exchanged
- pure nash equilibria
- pure nash equilibrium
- multi agent systems
- coalitional games
- multi agent
- provably secure
- trusted third party
- access control