{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T22:55:25Z","timestamp":1762210525459},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540791034"},{"type":"electronic","value":"9783540791041"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-79104-1_24","type":"book-chapter","created":{"date-parts":[[2008,3,13]],"date-time":"2008-03-13T07:28:21Z","timestamp":1205393301000},"page":"334-346","source":"Crossref","is-referenced-by-count":31,"title":["Rational Secret Sharing with Repeated Games"],"prefix":"10.1007","author":[{"given":"Shaik","family":"Maleka","sequence":"first","affiliation":[]},{"given":"Amjed","family":"Shareef","sequence":"additional","affiliation":[]},{"given":"C. Pandu","family":"Rangan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1145\/1007352.1007447","volume-title":"STOC 2004: Proceedings of the 36th annual ACM Symposium on Theory of Computing","author":"J. Halpern","year":"2004","unstructured":"Halpern, J., Teague, V.: Rational secret sharing and multiparty computation: extended abstract. In: STOC 2004: Proceedings of the 36th annual ACM Symposium on Theory of Computing, pp. 623\u2013632. ACM, New York, USA (2004)"},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A. Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM\u00a022, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/11832072_16","volume-title":"Security and Cryptography for Networks","author":"S.D. Gordon","year":"2006","unstructured":"Gordon, S.D., Katz, J.: Rational secret sharing, revisited. In: De Prisco, R., Yung, M. (eds.) SCN 2006. LNCS, vol.\u00a04116, pp. 229\u2013241. Springer, Heidelberg (2006)"},{"key":"24_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1146381.1146393","volume-title":"PODC 2006: Proceedings of the 25th annual ACM symposium on Principles of distributed computing","author":"I. Abraham","year":"2006","unstructured":"Abraham, I., Dolev, D., Gonen, R., Halpern, J.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: PODC 2006: Proceedings of the 25th annual ACM symposium on Principles of distributed computing, pp. 53\u201362. ACM, New York, USA (2006)"},{"key":"24_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/11818175_11","volume-title":"Advances in Cryptology - CRYPTO 2006","author":"A. Lysyanskaya","year":"2006","unstructured":"Lysyanskaya, A., Triandopoulos, N.: Rationality and adversarial behaviour in multi-party computation (extended abstract). In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol.\u00a04117, pp. 180\u2013197. Springer, Heidelberg (2006)"},{"key":"24_CR6","unstructured":"Maleka, S., Amjed, S., Pandu Rangan, C.: The deterministic protocol for rational secret sharing. In: SSN 2008: The 4th International Workshop on Security in Systems and Networks (to be published, 2008)"},{"key":"24_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1007\/3-540-44598-6_7","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"Y. Dodis","year":"2000","unstructured":"Dodis, Y., Halevi, S., Rabin, T.: A cryptographic solution to a game theoretic problem. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 112\u2013130. Springer, Heidelberg (2000)"},{"key":"24_CR8","doi-asserted-by":"crossref","unstructured":"Franklin, M., Yung, M.: Communication complexity of secure computation. In: 24th ACM Symposium on Theory of Computing (STOC), pp. 699\u2013710 (1992)","DOI":"10.1145\/129712.129780"},{"key":"24_CR9","volume-title":"An Introduction to Game Theory","author":"M. Osborne","year":"2004","unstructured":"Osborne, M.: An Introduction to Game Theory. Oxford University Press, Oxford (2004)"},{"issue":"113","key":"24_CR10","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2307\/2296617","volume":"38","author":"J.W. Friedman","year":"1971","unstructured":"Friedman, J.W.: A non-cooperative equilibrium for supergames. Review of Economic Studies\u00a038(113), 1\u201312 (1971)","journal-title":"Review of Economic Studies"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-79104-1_24.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:10:17Z","timestamp":1619521817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-79104-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540791034","9783540791041"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-79104-1_24","relation":{},"subject":[]}}