Game-Theoretic Security for Bit Commitment

@inproceedings{Higo2013GameTheoreticSF,
  title={Game-Theoretic Security for Bit Commitment},
  author={Haruna Higo and Keisuke Tanaka and Kenji Yasunaga},
  booktitle={IWSEC},
  year={2013}
}
Higo, Tanaka, Yamada, and Yasunaga (ACISP 2012) studied oblivious transfer (OT) from a game-theoretic viewpoint in the malicious model. Their work can be considered as an extension of the study on two-party computation in the fail-stop model by Asharov, Canetti, and Hazay (EUROCRYPT 2011). This paper focuses on bit commitment, and continues to study it from a perspective of game theory. In a similar manner to the work on OT, we consider bit commitment in the malicious model. In order to… CONTINUE READING

References

Publications referenced by this paper.

Similar Papers

Loading similar papers…