www.coalitiontheory.net
Published on www.coalitiontheory.net (http://coalitiontheory.net)

Home > Verifiably Secure Devices

Verifiably Secure Devices

Article
Author/s: 
Sergei Izmalkov, Matt Lepinski, and Silvio Micali
Publisher: 
IACR
Year: 
2008
PDF [1]
We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated problem at the intersection of game theory, cryptography and efficient algorithms; and 2. Enable the secure evaluation of multiple interdependent functions.

Source URL:http://coalitiontheory.net/content/veri%EF%AC%81ably-secure-devices

Links
[1] https://www.iacr.org/archive/tcc2008/49480267/49480267.pdf