搜索结果: 1-15 共查到“知识库 Games”相关记录228条 . 查询时间(0.531 秒)
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State
Multiparty Computation Card Games Cryptographic Protocols
2018/4/4
While many cryptographic protocols for card games have been proposed, all of them focus on card games where players have some state that must be kept secret from each other, e.g. closed cards and bluf...
ROYALE: A Framework for Universally Composable Card Games with Financial Rewards and Penalties Enforcement
Poker Card Games Fairness Blockchain
2018/3/7
While many tailor made card game protocols are known, the vast majority of those suffer from three main issues: lack of mechanisms for distributing financial rewards and punishing cheaters, lack of co...
This work shows that weighted majority voting games occur in cryptocurrencies. In particular, two such games are highlighted. The first game, which we call the Rule Game, pertains to the scenario wher...
(A Counterexample to) Parallel Repetition for Non-Signaling Multi-Player Games
parallel repetition non-signaling strategies
2017/11/28
We give a three-player game whose non-signaling value is constant (2/3) under any number of parallel repetitions. This is the first known setting where parallel repetition completely fails to reduce t...
Privacy Notions for Privacy-Preserving Distributed Data Mining: Foundations and Privacy Games
privacy privacy games privacy notions
2017/11/27
It is well understood that the huge volumes of data captured in recent years have the potential to underpin significant research developments in many fields. But, to realise these benefits, all releva...
Repeated Games for Generating Randomness in Encryption
game theory repeated game randomness
2017/3/6
In encryption schemes, the sender may not generate randomness properly if generating randomness is costly, and the sender is not concerned about the security of a message. The problem was studied by t...
Cost-Aware Cut-and-Choose Games with Applications in Cryptography and Prefix-Free Codes
Cut-and-choose games Algorithmic game theory Unequal-cost Huffman codes
2017/2/28
Cost-aware cut-and-choose game is a fundamental technique that has many cryptographic applications. Best existing solutions of this game assumed for simplicity that the number of challenges is publicl...
MARKOV MODELING OF MOVING TARGET DEFENSE GAMES
Moving Target Defense Security Capacity Markov Models
2016/12/12
We introduce a Markov-model-based framework for Moving Target Defense (MTD) analysis. The framework allows modeling of a broad range of MTD strategies, provides general theorems about how the probabil...
Prediction Games
signaling game theory prediction
2016/6/12
We consider an extension of signaling games to the case of prediction, where one agent (‘sender’) perceives the current state of the world and sends a signal. The second agent (‘receiver’) perceives t...
Random number generators have direct applications in information security, online
gaming, gambling, and computer science in general. True random number generators
need an entropy source which is a p...
Optimality of Non-Adaptive Strategies: The Case of Parallel Games
indistinguishability proofs conditional equivalence random systems
2016/1/23
Most cryptographic security proofs require showing that two systems are indistinguishable. A central tool in such proofs is that of a game, where winning the game means provoking a certain condition...
Optimal Machine Strategy to Commit to in Two-person Repeated Games
Optimal Machine Strategy Repeated Games
2016/1/22
The problem of computing optimal strategy to commit to in various games has attracted intense research in-terests and has important real-world applications such as security (attacker-defender) games. ...
In this paper we aim to optimize power consumption of mo-bile games without compromising user experience. We study the behavior of 40 mobile games on a smartphone and iden-tify two power-inefficient i...
On Power Splitting Games in Distributed Computation: The Case of Bitcoin Pooled Mining
Cryptocurrency block withholding attack distributed computation
2016/1/4
Several new services incentivize clients to compete in solving large computation tasks in exchange for financial rewards. This model of competitive distributed computation enables every user connected...
One-Sided Device-Independent QKD and Position-based Cryptography from Monogamy Games
foundations quantum cryptography
2016/1/3
A serious concern with quantum key distribution (QKD)
schemes is that, when under attack, the quantum devices in a real-life
implementation may behave differently than modeled in the security
proof...