{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T00:11:06Z","timestamp":1725754266618},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319027852"},{"type":"electronic","value":"9783319027869"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-02786-9_14","type":"book-chapter","created":{"date-parts":[[2013,10,30]],"date-time":"2013-10-30T10:29:21Z","timestamp":1383128961000},"page":"226-245","source":"Crossref","is-referenced-by-count":7,"title":["Equilibrium Concepts for Rational Multiparty Computation"],"prefix":"10.1007","author":[{"given":"John Ross","family":"Wallrabenstein","sequence":"first","affiliation":[]},{"given":"Chris","family":"Clifton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-540-78524-8_15","volume-title":"Theory of Cryptography","author":"J. Katz","year":"2008","unstructured":"Katz, J.: Bridging game theory and cryptography: Recent results and future directions. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.\u00a04948, pp. 251\u2013272. Springer, Heidelberg (2008)"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.tcs.2005.05.009","volume":"343","author":"Y. Shoham","year":"2005","unstructured":"Shoham, Y., Tennenholtz, M.: Non-cooperative computation: boolean functions with correctness and exclusivity. Theor. Comput. Sci.\u00a0343, 97\u2013113 (2005)","journal-title":"Theor. Comput. Sci."},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/978-3-642-20465-4_24","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"G. Asharov","year":"2011","unstructured":"Asharov, G., Canetti, R., Hazay, C.: Towards a game theoretic view of secure computation. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol.\u00a06632, pp. 426\u2013445. Springer, Heidelberg (2011)"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-44598-6_7","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Dodis","year":"2000","unstructured":"Dodis, Y., Halevi, S., Rabin, T.: A cryptographic solution to a game theoretic problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 112\u2013130. Springer, Heidelberg (2000)"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1145\/1007352.1007447","volume-title":"Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing, STOC 2004","author":"J. Halpern","year":"2004","unstructured":"Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: Proceedings of the Thirty-Sixth Annual ACM Symposium on Theory of Computing, STOC 2004, pp. 623\u2013632. ACM, New York (2004)"},{"key":"14_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/11818175_11","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"A. Lysyanskaya","year":"2006","unstructured":"Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behavior in multi-party computation. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 180\u2013197. Springer, Heidelberg (2006)"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1109\/FOCS.2010.65","volume-title":"Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010","author":"R. Gradwohl","year":"2010","unstructured":"Gradwohl, R., Livne, N., Rosen, A.: Sequential rationality in cryptographic protocols. In: Proceedings of the 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, FOCS 2010, pp. 623\u2013632. IEEE Computer Society, Washington, DC (2010)"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1400751.1400752","volume-title":"Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing, PODC 2008","author":"J.Y. Halpern","year":"2008","unstructured":"Halpern, J.Y.: Beyond nash equilibrium: solution concepts for the 21st century. In: Proceedings of the Twenty-Seventh ACM Symposium on Principles of Distributed Computing, PODC 2008, pp. 1\u201310. ACM, New York (2008)"},{"key":"14_CR9","first-page":"423","volume-title":"Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC 2008","author":"G. Kol","year":"2008","unstructured":"Kol, G., Naor, M.: Games for exchanging information. In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC 2008, pp. 423\u2013432. ACM, New York (2008)"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-642-34266-0_2","volume-title":"Decision and Game Theory for Security","author":"M. Nojoumian","year":"2012","unstructured":"Nojoumian, M., Stinson, D.: Socio-rational secret sharing as a new direction in rational cryptography. In: Grossklags, J., Walrand, J. (eds.) GameSec 2012. LNCS, vol.\u00a07638, pp. 18\u201337. Springer, Heidelberg (2012)"},{"key":"14_CR11","unstructured":"Halpern, J.Y., Pass, R.: Game theory with costly computation. In: Proceedings of the Behavioral and Quantitative Game Theory on Conference on Future Directions BQGT, vol.\u00a010, p. 1 (2008)"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-29011-4_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2012","author":"A. Groce","year":"2012","unstructured":"Groce, A., Katz, J.: Fair computation with rational players. In: Pointcheval, D., Johansson, T. (eds.) EUROCRYPT 2012. LNCS, vol.\u00a07237, pp. 81\u201398. Springer, Heidelberg (2012)"},{"key":"14_CR13","unstructured":"Osborne, M.J., Rubinstein, A.: A Course in Game Theory. MIT Press Books, vol.\u00a01. The MIT Press (1994)"},{"key":"14_CR14","unstructured":"Fudenberg, D., Tirole, J.: Game Theory. MIT Press (August 1991)"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1016\/0022-0000(84)90070-9","volume":"28","author":"S. Goldwasser","year":"1984","unstructured":"Goldwasser, S., Micali, S.: Probabilistic encryption. J. Comput. Syst. Sci.\u00a028, 270\u2013299 (1984)","journal-title":"J. Comput. Syst. Sci."},{"issue":"5","key":"14_CR16","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1287\/mnsc.14.5.320","volume":"14","author":"J.C. Harsanyi","year":"1968","unstructured":"Harsanyi, J.C.: Games with incomplete information played by bayesian players, i-iii. part ii. bayesian equilibrium points. Management Science\u00a014(5), 320\u2013334 (1968)","journal-title":"Management Science"},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S. Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput.\u00a018, 186\u2013208 (1989)","journal-title":"SIAM J. Comput."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Gordon, S.D., Katz, J.: Rational secret sharing, revisited. Cryptology ePrint Archive, Report 2006\/142 (2006), http:\/\/eprint.iacr.org\/","DOI":"10.1007\/11832072_16"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-642-00457-5_4","volume-title":"Theory of Cryptography","author":"S. Micali","year":"2009","unstructured":"Micali, S., Shelat, A.: Purely rational secret sharing (extended abstract). In: Reingold, O. (ed.) TCC 2009. LNCS, vol.\u00a05444, pp. 54\u201371. Springer, Heidelberg (2009)"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/978-3-642-11799-2_25","volume-title":"Theory of Cryptography","author":"G. Fuchsbauer","year":"2010","unstructured":"Fuchsbauer, G., Katz, J., Naccache, D.: Efficient rational secret sharing in standard communication networks. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol.\u00a05978, pp. 419\u2013436. Springer, Heidelberg (2010)"},{"key":"14_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1007\/978-3-642-31585-5_50","volume-title":"Automata, Languages, and Programming","author":"A. Groce","year":"2012","unstructured":"Groce, A., Katz, J., Thiruvengadam, A., Zikas, V.: Byzantine agreement with a rational adversary. In: Czumaj, A., Mehlhorn, K., Pitts, A., Wattenhofer, R. (eds.) ICALP 2012, Part II. LNCS, vol.\u00a07392, pp. 561\u2013572. Springer, Heidelberg (2012)"},{"key":"14_CR22","first-page":"1","volume":"56","author":"Z. Zhang","year":"2013","unstructured":"Zhang, Z., Liu, M.: Rational secret sharing as extensive games. Science China Information Sciences\u00a056, 1\u201313 (2013)","journal-title":"Science China Information Sciences"},{"issue":"11","key":"14_CR23","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"320","DOI":"10.1007\/978-3-540-78524-8_18","volume-title":"Theory of Cryptography","author":"G. Kol","year":"2008","unstructured":"Kol, G., Naor, M.: Cryptography and game theory: designing protocols for exchanging information. In: Canetti, R. (ed.) TCC 2008. LNCS, vol.\u00a04948, pp. 320\u2013339. Springer, Heidelberg (2008)"},{"key":"14_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1007\/978-3-642-03356-8_32","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"P.B. Miltersen","year":"2009","unstructured":"Miltersen, P.B., Nielsen, J.B., Triandopoulos, N.: Privacy-enhancing auctions using rational cryptography. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 541\u2013558. Springer, Heidelberg (2009)"},{"key":"14_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-642-24209-0_24","volume-title":"Information Security and Cryptology - ICISC 2010","author":"Z. Zhang","year":"2011","unstructured":"Zhang, Z., Liu, M.: Unconditionally secure rational secret sharing in standard communication networks. In: Rhee, K.-H., Nyang, D. (eds.) ICISC 2010. LNCS, vol.\u00a06829, pp. 355\u2013369. Springer, Heidelberg (2011)"},{"key":"14_CR27","unstructured":"Gilboa, I., Zemel, E.: Nash and correlated equilibria: Some complexity considerations. Discussion Papers 777, Northwestern University, Center for Mathematical Studies in Economics and Management Science (June 1988)"},{"key":"14_CR28","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s00199-003-0378-z","volume":"23","author":"A. Urbano","year":"2004","unstructured":"Urbano, A., Vila, J.: Computationally restricted unmediated talk under incomplete information. Economic Theory\u00a023, 283\u2013320 (2004)","journal-title":"Economic Theory"},{"issue":"4","key":"14_CR29","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1287\/moor.1080.0340","volume":"33","author":"B. Stengel von","year":"2008","unstructured":"von Stengel, B., Forges, F.: Extensive-form correlated equilibrium: Definition and computational complexity. Math. Oper. Res.\u00a033(4), 1002\u20131022 (2008)","journal-title":"Math. Oper. Res."},{"key":"14_CR30","doi-asserted-by":"crossref","unstructured":"Bonanno, G.: Agm-consistency and perfect bayesian equilibrium. part i: definition and properties. International Journal of Game Theory, 1\u201326 (2011)","DOI":"10.1007\/s00182-011-0296-4"},{"key":"14_CR31","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-D\u00edaz, J., Mel\u00e9ndez-Jim\u00e9nez, M.: On the notion of perfect bayesian equilibrium. TOP, 1\u201316 (2011), 10.1007\/s11750-011-0239-z","DOI":"10.1007\/s11750-011-0239-z"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-02786-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,11]],"date-time":"2022-03-11T02:03:19Z","timestamp":1646964199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-02786-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319027852","9783319027869"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-02786-9_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}