Research on security multi-party computing based on game theory
In the classic millionaire agreement,one party can get the final wealth comparison results,you can not tell the other party,you can not comply with this agreement,combined with game theory can avoid this problem,you can make the participants away from the agreement proceeds less than compliance with...
Saved in:
Main Authors: | Xinglan ZHANG, Wei ZHENG |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2018-01-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2018010 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Solution of secure multi-party multi-data raking problem based on El Gamal encryption
by: LIU Wen1, et al.
Published: (2007-01-01) -
Analysis of cyberspace security based on game theory
by: Jian-ming ZHU, et al.
Published: (2015-12-01) -
Deniable authentication for multi-party protocol
by: Yong CHEN, et al.
Published: (2016-06-01) -
Rational-security and fair two-party comparison protocol
by: Bowen ZHAO, et al.
Published: (2023-12-01) -
Shared-Custodial Wallet for Multi-Party Crypto-Asset Management
by: Yimika Erinle, et al.
Published: (2024-12-01)