How to use bitcoin to design fair protocols

I Bentov, R Kumaresan - Annual Cryptology Conference, 2014 - Springer
We study a model of fairness in secure computation in which an adversarial party that aborts
on receiving output is forced to pay a mutually predefined monetary penalty. We then show …

Fairness in an unfair world: Fair multiparty computation from public bulletin boards

AR Choudhuri, M Green, A Jain, G Kaptchuk… - Proceedings of the 2017 …, 2017 - dl.acm.org
Secure multiparty computation allows mutually distrusting parties to compute a function on
their private inputs such that nothing but the function output is revealed. Achieving fairness …

Active harmony: Towards automated performance tuning

C Tapus, IH Chung… - SC'02: Proceedings of the …, 2002 - ieeexplore.ieee.org
In this paper, we present the Active Harmony automated runtime tuning system. We describe
the interface used by programs to make applications tunable. We present the Library …

The multi-user security of authenticated encryption: AES-GCM in TLS 1.3

M Bellare, B Tackmann - Advances in Cryptology–CRYPTO 2016: 36th …, 2016 - Springer
We initiate the study of multi-user (mu) security of authenticated encryption (AE) schemes as
a way to rigorously formulate, and answer, questions about the “randomized nonce” …

A modular security analysis of the TLS handshake protocol

P Morrissey, NP Smart, B Warinschi - … on the Theory and Application of …, 2008 - Springer
We study the security of the widely deployed Secure Session Layer/Transport Layer Security
(TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modularity …

Usable optimistic fair exchange

A Küpçü, A Lysyanskaya - Computer Networks, 2012 - Elsevier
Fairly exchanging digital content is an everyday problem. It has been shown that fair
exchange cannot be achieved without a trusted third party (called the Arbiter). Yet, even with …

Fair private set intersection with a semi-trusted arbiter

C Dong, L Chen, J Camenisch, G Russello - … , Newark, NJ, USA, July 15-17 …, 2013 - Springer
A private set intersection (PSI) protocol allows two parties to compute the intersection of their
input sets privately. Most of the previous PSI protocols only output the result to one party and …

Ambiguous optimistic fair exchange

Q Huang, G Yang, DS Wong, W Susilo - … on the Theory and Application of …, 2008 - Springer
Optimistic fair exchange (OFE) is a protocol for solving the problem of exchanging items or
services in a fair manner between two parties, a signer and a verifier, with the help of an …

Optimally efficient multi-party fair exchange and fair secure multi-party computation

H Kılınç, A Küpçü - Cryptographers' Track at the RSA Conference, 2015 - Springer
Multi-party fair exchange (MFE) and fair secure multi-party computation (fair SMPC) are
under-studied fields of research, with practical importance. We examine MFE scenarios …

[PDF][PDF] Bitcoin and Secure Computation with Money.

I Bentov, R Kumaresan, T Moran - 2017 - pdfs.semanticscholar.org
Bitcoin and Secure Computation With Money How to Use Bitcoin to Play Internet Poker Page 1
Fairness with Penalties Secure Cash Distribution End Bitcoin and Secure Computation With …