Verifiably Secure Devices
We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated pr...
Main Authors: | , , |
---|---|
Other Authors: | |
Published: |
2007
|
Subjects: | |
Online Access: | http://hdl.handle.net/1721.1/39659 |
_version_ | 1826207912657158144 |
---|---|
author | Lepinski, Matt Micali, Silvio Izmalkov, Sergei |
author2 | Silvio Micali |
author_facet | Silvio Micali Lepinski, Matt Micali, Silvio Izmalkov, Sergei |
author_sort | Lepinski, Matt |
collection | MIT |
description | We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated problem at the intersection of game theory, cryptography and efficient algorithms; and2. Enable the secure evaluation of multiple interdependent functions. |
first_indexed | 2024-09-23T13:56:55Z |
id | mit-1721.1/39659 |
institution | Massachusetts Institute of Technology |
last_indexed | 2024-09-23T13:56:55Z |
publishDate | 2007 |
record_format | dspace |
spelling | mit-1721.1/396592019-04-12T09:47:32Z Verifiably Secure Devices Lepinski, Matt Micali, Silvio Izmalkov, Sergei Silvio Micali Theory of Computation interdependent functions correlated equilibrium Implementation interdependent mechanisms We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of achieving correlated equilibrium, an important and extensively investigated problem at the intersection of game theory, cryptography and efficient algorithms; and2. Enable the secure evaluation of multiple interdependent functions. 2007-12-05T18:15:10Z 2007-12-05T18:15:10Z 2007-12-05 MIT-CSAIL-TR-2007-056 http://hdl.handle.net/1721.1/39659 Massachusetts Institute of Technology Computer Science and Artificial Intelligence Laboratory 29 p. application/pdf application/postscript |
spellingShingle | interdependent functions correlated equilibrium Implementation interdependent mechanisms Lepinski, Matt Micali, Silvio Izmalkov, Sergei Verifiably Secure Devices |
title | Verifiably Secure Devices |
title_full | Verifiably Secure Devices |
title_fullStr | Verifiably Secure Devices |
title_full_unstemmed | Verifiably Secure Devices |
title_short | Verifiably Secure Devices |
title_sort | verifiably secure devices |
topic | interdependent functions correlated equilibrium Implementation interdependent mechanisms |
url | http://hdl.handle.net/1721.1/39659 |
work_keys_str_mv | AT lepinskimatt verifiablysecuredevices AT micalisilvio verifiablysecuredevices AT izmalkovsergei verifiablysecuredevices |