[1] SHAMIR A.How to share asecret[J].Communications of the ACM,1979,22(11):612-613.
[2] BLAKLEY GR.Safeguarding cryptographic keys[A].Smith M.Proceedings of the 1979 AFIPS National Computer Conference[C].New York:AFIPS Press,1979.313-317.
[3] HALPERN J,TEAGUE V.Rational secret sharing and multiparty computation:extended abstract[A].Calinescu G.Proceedings of the 36th Annual ACM Symposium on Theory of Computing[C].New York:ACM Press,2004.623-632.
[4] GORDON S D,KATZ J.Rational secret sharing revisited[A].Yung M.LNCS4116:Proceedings of the 5th International Conference on Security and Cryptography for Networks[C].Berlin:Springer Press,2006.229-241.
[5] ABRAHAM I,DOLEV D,GONENEN R,et a1.Distributed computing meets game theory:robust mechanisms for rational secret sharing and multiparty computation[A].Ruppert E.Proceedings of the 25th Annual ACM Symposium on Principles of Distributed Computing[C].New York:ACM Press,2006.53-62.
[6] KATZ J.Bridging game theory and cryptography:recent results and future directions[A].Canetti R.LNCS4948:Proceedings of the 5th Conference on Theory of Cryptography[C].Berlin:Springer Press,2008.251-272.
[7] MALEKA S,SHAREEF A,RANGAN C.P.Rational secret sharing with repeated games[A].Susilo W.LNCS4991:Proceedings of the 4th International Conference on Information Security Practice and Experience[C].Berlin:Springer Press,2008.334-346.
[8] ASHAROV G,LINDELL Y.Utility dependence in correct and fair rational secret sharing[A].Halevi S.LNCS5677:Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology[C].Berlin:Springer Press,2009.559-576.
[9] 田有亮,马建峰,彭长根.秘密共享体制的博弈论分析[J].电子学报,2011,39(12):32-46. TIAN You-liang,MA Jian-feng,PENG Chang-gen.Game-theoretic analysis for the secret sharing scheme[J].Acta Electronica Sinica,2011,39(12):32-46.(in Chinese)
[10] TIAN You-liang,MA Jian-feng,PENG Chang-gen,et al.One-time rational secret sharing scheme based on Bayesian game[J].Wuhan University Journal of Natural Sciences,2011,16(5):430-434.
[11] ZHANG Zhi-fang,LIU Mu-lan.Rational secret sharing as extensive game [J].Science China Information Sciences,2013,56(3):1-13.
[12] FEIGENBAUM J,PAPADIMITRIOU C,SAMI R,et al.A bgp-based mechanism for lowest-cost routing[J].Journal of Distributed Computing,2005,18(1):61-72.
[13] FEIGENBAUM J,SHENKER S.Distributed algorithmic mechanism design:recent results and future directions[A].Marathe M.Proceedings of the 6th International Workshop on Discrete Algorithms and Methods for Mobil Computing and Communication[C].New York:ACM Press,2002.1-13.
[14] PARKES D,SHEIDMAN J.Distributed implementations ofvickrey-clarke-groves mechanisms[A].Scerri P.Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multi-Agent Systems[C].Washington:IEEE Computer Society Press,2004.261-268.
[15] DANIV,MOVAHEDI M,SAIA J.Scalable mechanisms for rational secret sharing[A].Fraigniaud P.Proceedings of the 30th Annual ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing[C].New York:ACM Press,2012.187-196.
[16] JOYEE D S,ASIM K P.Achieving correctness in fair rational secret sharing[A].Kanade T.LNCS8257:Proceedings of the 12th International Conference on Cryptology and Network Security[C].Berlin:Springer Press,2013.139-161.
[17] NOJOUMIAN M,STINSON D,GRAINGER M.Unconditionally secure social secret sharing scheme[J].IET Information Security,2010,4(4):202-211.
[18] OSBORNE M,RUBINSTEIN A.A Course in Game Theory[M].Cambridge:MIT Press,2004.
[19] NISAN N,RONEN A.Algorithmic mechanism design [J].Games and Economic Behavior,2001,35(1/2):166-196.
[20] GROCE A,KATZ J.Fair computation with rational players[A].Johansson T.LNCS7237:Proceedings of the 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques[C].Berlin:Springer Press,2012.81-98.
[21] 张恩.理性信息交换密码协议若干模型及应用研究[D].北京:北京工业大学计算机学院,2013. |