A game-theoretic model for two-party cryptographic protocols

被引:0
|
作者
Caballero-Gil, P [1 ]
Hernández-Goya, C [1 ]
Bruno-Castañeda, C [1 ]
机构
[1] Univ La Laguna, Dept Stat Operat Res & Comp, Tenerife 38271, Spain
关键词
D O I
10.1109/ITCC.2004.1286751
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This work illustrates the close connection between cryptographic protocols and games. Several two-person game theoretic concepts and techniques are here used to model and analyze different two-party cryptographic protocols in a malicious model in order to find equilibrium conditions that allow to protect honest parties against all possible strategies of adversaries.
引用
收藏
页码:773 / 777
页数:5
相关论文
共 50 条
  • [21] Neighbor intervention: A game-theoretic model
    Mesterton-Gibbons, Mike
    Sherratt, Tom N.
    JOURNAL OF THEORETICAL BIOLOGY, 2009, 256 (02) : 263 - 275
  • [22] Game-Theoretic Model of SARS Precautions
    Aquino, Leslie J. Camacho
    Cruz, Aurienne
    Dominguez, Regina-Mae
    Lee, Brian
    Oh, Hyunju
    Rychtar, Jan
    Taylor, Dewey
    KYUNGPOOK MATHEMATICAL JOURNAL, 2024, 64 (03): : 371 - 393
  • [23] A game-theoretic model of the war in Chechnya
    Kern, L
    GAME THEORY, EXPERIENCE, RATIONALITY: FOUNDATIONS OF SOCIAL SCIENCES, ECONOMICS AND ETHICS, 1998, 5 : 337 - 347
  • [24] AN EVOLUTIONARY GAME-THEORETIC MODEL OF CANNIBALISM
    Cushing, J. M.
    Henson, Shandelle M.
    Hayward, James L.
    NATURAL RESOURCE MODELING, 2015, 28 (04) : 497 - 521
  • [25] A game-theoretic model of sexual harassment
    Batabyal, Amitrajeet A.
    Beladi, Hamid
    ECONOMICS BULLETIN, 2020, 40 (02): : 1281 - 1291
  • [26] A Game-Theoretic Model of Metaphorical Bargaining
    Klebanov, Beata Beigman
    Beigman, Eyal
    ACL 2010: 48TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS, 2010, : 698 - 709
  • [27] A GAME-THEORETIC MODEL OF THE APPROPRIATIONS PROCESS
    KIEWIET, R
    MCCUBBINS, M
    MATHEMATICAL SOCIAL SCIENCES, 1987, 13 (03) : 302 - 302
  • [28] A GAME-THEORETIC MODEL FOR MERGERS AND ACQUISITIONS
    VANDENHONERT, RC
    STEWART, TJ
    EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 1992, 59 (02) : 275 - 287
  • [29] How good is a two-party election game?
    Lin, Chuang-Chieh
    Lu, Chi-Jen
    Chen, Po-An
    THEORETICAL COMPUTER SCIENCE, 2021, 871 : 79 - 93
  • [30] Cryptographic quantum communication schemes for two-party addresser authentication
    Shimizu, K
    Imoto, N
    CLEO(R)/PACIFIC RIM 2001, VOL II, TECHNICAL DIGEST, 2001, : 410 - 411