[1] |
HALPEN J , TEAGUE V . Rational secret sharing and multiparty com-putation:extended abstract[A]. Proc of the 36th annual ACM Sympo-sium on Theory of Computing[C]. New York, 2004.623-632.
|
[2] |
FISCHERR M , WRIGHT R . An application of game-theoretic tech-niques to cryptography[EB/OL]. . 2011.
|
[3] |
DODIS Y , HALEVI S , RABIN T . A cryptographic solution to a game theoretic problem[A]. Proc of CRYPTO2000[C]. Heidelberg,Springer, 2000.112-131.
|
[4] |
GORDON S D , KATZ J . Rational secret sharing,revisited[A]. Proc of SCN 2006[C]. Heidelberg,Springer, 2006.229-241.
|
[5] |
ABRAHAM I , DOLEV D , GONEN R , et al. Distributed computing meets game theory:robust mechanisms for rational secret sharing and multiparty computation[A]. Proc of the 25th Annual ACM Symp on Principles of Distributed Computing[C]. New York, 2006.53-62.
|
[6] |
LYSYANSKAYA A , TRIANDOPOULOS N . Rationality and adver-sarial behaviour in multi-party computation(extended abstract)[A]. Proc of CRYPTO2006[C]. Heidelberg,Springer, 2006.180-197.
|
[7] |
MALEKA S , AMJED S , PANDU R C. . The deterministic protocol for rational secret sharing[A]. Proc of IEEE Int Parallel and Distributed Processing Symp[C]. Piscataway,NJ, 2008.1-7.
|
[8] |
MALEKA S , AMJED S , PANDU R C. . Rational secret sharing with repeated games[A]. Proc of Information Security Practice and Experi-ence[C]. Berlin,Springer, 2008.334-346.
|
[9] |
ASHAROY G , LINDELL Y . Utility dependence in correct and fair rational secret sharing[A]. Proc of CRYPTO2009[C]. Heidelberg,Springer, 2009.559-576.
|
[10] |
ZHANG Z F , LIU M L . Rational secret sharing as extensive games[J]. Science China Information Sciences, 2013,56(3): 1-13.
|
[11] |
田有亮, 马建峰, 彭长根 , 等. 秘密共享体制的博弈论分析[J]. 电子学报 2011,39(12): 2790-2795. TIAN Y L , MA J F , PENG C G , et al. Game-theoretic analysis for the secret sharing scheme[J]. Acta Electronica Sinica, 2011,39(12): 2790-2795.
|
[12] |
TIAN Y L , MA J F , PENG C G , et al. One-time rational secret sharing scheme based on Bayesian game[J]. Wuhan University Journal of Nature Science, 2011,16(5): 430-434.
|
[13] |
TIAN Y L , MA J F , PENG C G , et al. A rational framework for secure communication[J]. Information Sciences, 2013,250:215-226.
|
[14] |
TIAN Y L , PENG C G , LIN D D , et al. Bayesian mechanism for ra-tional secret sharing scheme[J]. Science China Information Sciences, 2015,58(5): 1-13.
|
[15] |
田有亮, 彭长根, 马建峰 , 等. 通用可组合公平安全多方计算协议[J]. 通信学报 2014,35(2): 54-62. TIAN Y L , PENG C G , MA J F , et al. Universally composable secure multiparty computation protocol with fairness[J]. Journal on Commu-nications, 2014,35(2): 54-62.
|
[16] |
张恩, 蔡永泉 . 理性的安全两方计算协议[J]. 计算机研究与发展 2013,50(7): 1409-1417. ZHANG E , CAI Y Q . Rational secure two-party computation proto-col[J]. Journal of Computer Research and Development, 2013,50(7): 1409-1417.
|
[15] |
彭长根, 刘海, 田有亮 , 等. 混合偏好模型下的分布式理性秘密共享方案[J]. 计算机研究与发展 2014,51(7): 1476-1485. PENG C G , LIU H , TIAN Y L , et al. A distributed rational secret sharing scheme with hybrid preference model[J]. Journal of Computer Research and Development, 2014,51(7): 1476-1485.
|
[18] |
王伊蕾, 郑志华, 王皓 , 等. 满足可计算序贯均衡的理性公平计算[J]. 计算机研究与发展 2014,51(7): 1527-1537. WANG Y L , ZHENG Z H , WANG H , et al. Rational fair computation with computational sequential equilibrium[J]. Journal of Computer Research and Development, 2014,51(7): 1527-1537.
|