How to use bitcoin to design fair protocols
I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …
Fairness in an unfair world: Fair multiparty computation from public bulletin boards
Secure multiparty computation allows mutually distrusting parties to compute a function on
their private inputs such that nothing but the function output is revealed. Achieving fairness …
their private inputs such that nothing but the function output is revealed. Achieving fairness …
Active harmony: Towards automated performance tuning
C Tapus, IH Chung… - SC'02: Proceedings of the …, 2002 - ieeexplore.ieee.org
In this paper, we present the Active Harmony automated runtime tuning system. We describe
the interface used by programs to make applications tunable. We present the Library …
the interface used by programs to make applications tunable. We present the Library …
The multi-user security of authenticated encryption: AES-GCM in TLS 1.3
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” …
a way to rigorously formulate, and answer, questions about the “randomized nonce” …
A modular security analysis of the TLS handshake protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security
(TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity …
(TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity …
Usable optimistic fair exchange
Fairly exchanging digital content is an everyday problem. It has been shown that fair
exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with …
exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with …
Fair private set intersection with a semi-trusted arbiter
A private set intersection (PSI) protocol allows two parties to compute the intersection of their
input sets privately. Most of the previous PSI protocols only output the result to one party and …
input sets privately. Most of the previous PSI protocols only output the result to one party and …
Ambiguous optimistic fair exchange
Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or
services in a fair manner between two parties, a signer and a verifier, with the help of an …
services in a fair manner between two parties, a signer and a verifier, with the help of an …
Optimally efficient multi-party fair exchange and fair secure multi-party computation
H Kılınç, A Küpçü - Cryptographers' Track at the RSA Conference, 2015 - Springer
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are
under-studied fields of research, with practical importance. We examine MFE scenarios …
under-studied fields of research, with practical importance. We examine MFE scenarios …
[PDF][PDF] Bitcoin and Secure Computation with Money.
I Bentov, R Kumaresan, T Moran - 2017 - pdfs.semanticscholar.org
Bitcoin and Secure Computation With Money How to Use Bitcoin to Play Internet Poker Page 1
Fairness with Penalties Secure Cash Distribution End Bitcoin and Secure Computation With …
Fairness with Penalties Secure Cash Distribution End Bitcoin and Secure Computation With …