Towards a Game-Theoretic Security Analysis of Off-Chain Protocols.
Sophie RainZeta AvarikiotiLaura KovácsMatteo MaffeiPublished in: CoRR (2021)
Keyphrases
- game theoretic
- security analysis
- authentication protocol
- key exchange
- security properties
- mutual authentication
- game theory
- secure electronic
- public key
- decision problems
- smart card
- security requirements
- nash equilibrium
- high security
- encryption scheme
- trust model
- nash equilibria
- agent programming
- authentication scheme
- combinatorial auctions
- user authentication
- pure nash equilibrium
- minority game
- pure nash equilibria
- information systems
- power consumption
- access control
- np hard
- decision making