Verifiably Secure Devices

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated pr...

Full description

Bibliographic Details
Main Authors: Lepinski, Matt, Micali, Silvio, Izmalkov, Sergei
Other Authors: Silvio Micali
Published: 2007
Subjects:
Online Access:http://hdl.handle.net/1721.1/39659
_version_ 1826207912657158144
author Lepinski, Matt
Micali, Silvio
Izmalkov, Sergei
author2 Silvio Micali
author_facet Silvio Micali
Lepinski, Matt
Micali, Silvio
Izmalkov, Sergei
author_sort Lepinski, Matt
collection MIT
description We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated problem at the intersection of game theory, cryptography and efficient algorithms; and2. Enable the secure evaluation of multiple interdependent functions.
first_indexed 2024-09-23T13:56:55Z
id mit-1721.1/39659
institution Massachusetts Institute of Technology
last_indexed 2024-09-23T13:56:55Z
publishDate 2007
record_format dspace
spelling mit-1721.1/396592019-04-12T09:47:32Z Verifiably Secure Devices Lepinski, Matt Micali, Silvio Izmalkov, Sergei Silvio Micali Theory of Computation interdependent functions correlated equilibrium Implementation interdependent mechanisms We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated problem at the intersection of game theory, cryptography and efficient algorithms; and2. Enable the secure evaluation of multiple interdependent functions. 2007-12-05T18:15:10Z 2007-12-05T18:15:10Z 2007-12-05 MIT-CSAIL-TR-2007-056 http://hdl.handle.net/1721.1/39659 Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory 29 p. application/pdf application/postscript
spellingShingle interdependent functions
correlated equilibrium
Implementation
interdependent mechanisms
Lepinski, Matt
Micali, Silvio
Izmalkov, Sergei
Verifiably Secure Devices
title Verifiably Secure Devices
title_full Verifiably Secure Devices
title_fullStr Verifiably Secure Devices
title_full_unstemmed Verifiably Secure Devices
title_short Verifiably Secure Devices
title_sort verifiably secure devices
topic interdependent functions
correlated equilibrium
Implementation
interdependent mechanisms
url http://hdl.handle.net/1721.1/39659
work_keys_str_mv AT lepinskimatt verifiablysecuredevices
AT micalisilvio verifiablysecuredevices
AT izmalkovsergei verifiablysecuredevices