搜索结果: 1-15 共查到“军事学 game”相关记录23条 . 查询时间(0.029 秒)
A critique of game-based definitions of receipt-freeness for voting
E-voting receipt-freeness privacy
font style='font-size:12px;'>
2019/7/24
We analyse three game-based definitions of receipt-freeness; uncovering soundness issues with two of the definitions and completeness issues with all three. Hence, two of the definitions are too weak,...
Quantum Lazy Sampling and Game-Playing Proofs for Quantum Indifferentiability
game-playing proofs QROM indifferentiability
font style='font-size:12px;'>
2019/4/28
Game-playing proofs constitute a powerful framework for classical cryptographic security arguments, most notably applied in the context of indifferentiability. An essential ingredient in such proofs i...
Secure Trick-Taking Game Protocols: How to Play Online Spades with Cheaters
Trick-Taking Games Zero-Knowledge Spades, Bridge
font style='font-size:12px;'>
2019/4/15
Trick-Taking Games (TTGs) are card games in which each player plays one of his cards in turn according to a given rule. The player with the highest card then wins the trick, i.e., he gets all the card...
Game Channels: State Channels for the Gambling Industry with Built-In PRNG
blockchain distributed cryptography public-key cryptography
font style='font-size:12px;'>
2019/4/10
Blockchain technology has immense potential. At the same time, it is not always possible to scale blockchains. State Channels solve the problem of scalability while increasing the blockchain's speed a...
Game Theoretic Notions of Fairness in Multi-Party Coin Toss
coin toss coin flip
font style='font-size:12px;'>
2018/11/12
Coin toss has been extensively studied in the cryptography literature, and the well-accepted notion of fairness (henceforth called strong fairness) requires that a corrupt coalition cannot cause non-n...
Simplifying Game-Based Definitions: Indistinguishability up to Correctness and Its Application to Stateful AE
indistinguishability oracle silencing provable security
font style='font-size:12px;'>
2018/6/5
Often the simplest way of specifying game-based cryptographic definitions is apparently barred because the adversary would have some trivial win. Disallowing or invalidating these wins can lead to com...
CryptHOL: Game-based Proofs in Higher-order Logic
Provable Security Game-based Proofs Theorem Proving
font style='font-size:12px;'>
2017/8/8
Game-based proofs are a well-established paradigm for structuring security arguments and simplifying their understanding. We present a novel framework, CryptHOL, for rigorous game-based proofs that is...
Game-Theoretic Security for Two-Party Protocols
game theory oblivious transfer commitment
font style='font-size:12px;'>
2016/12/7
Asharov, Canetti, and Hazay (Eurocrypt 2011) studied how game-theoretic concepts can be used to capture the cryptographic properties of correctness, privacy, and fairness in two-party protocols for fa...
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT
RFID authentication protocols Traceability attacks Internet of Things
font style='font-size:12px;'>
2016/6/27
Recently, Radio Frequency Identification (RFID) and Near Field Communication (NFC) systems are found in various
user-friendly services that all of us deal with in our daily lives. As these systems ar...
Game-Theoretic Framework for Integrity Verication in Computation Outsourcing
computation outsourcing integrity game theory
font style='font-size:12px;'>
2016/6/22
In the cloud computing era, in order to avoid computational burdens, many organizations tend to outsource their computations to third-party cloud servers. In order to protect service quality, the inte...
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
Internet of things RFID authentication protocols Security and privacy
font style='font-size:12px;'>
2016/4/21
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a ...
A comprehensive analysis of game-based ballot privacy definitions
Voting Privacy Ballot Privacy
font style='font-size:12px;'>
2016/1/3
We critically survey game-based security definitions for the privacy of voting schemes. In addition to known
limitations, we unveil several previously unnoticed shortcomings. Surprisingly, the conclu...
Financial Cryptography: Algorithmic Mechanisms for a Hedonic Game
Financial cryptography Private comparison Yao’s Millionaire problem
font style='font-size:12px;'>
2015/12/31
A (or a group of) selling agent wants to allocate and sell a (or a set of) parcel of land optimally and fairly to a buying agent within the capacity constraint of the selling agent and budget constrai...
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer
game-theoretic security universal composability local universal composability
font style='font-size:12px;'>
2015/12/22
In this paper, we consider the following question: Does composing protocols having gametheoretic
security result in a secure protocol in the sense of game-theoretic security? In order
to discuss the...
Towards a Game Theoretic View of Secure Computation
Game-Theory Secure computation Fairness
font style='font-size:12px;'>
2012/3/29
We demonstrate how Game Theoretic concepts and formalism can be used to capture cryptographic notions of security. In the restricted but indicative case of two-party protocols in the face of malicious...