共 40 条
- [1] Cao Z F., New Directions of Modern Cryptography, (2012)
- [2] Fu A, Qin N, Wang Y, Et al., Nframe: A privacy-preserving with non-frameability handover authentication protocol based on (t,n) secret sharing for LTE/LTE-A networks, Wireless Networks, 23, 7, pp. 2165-2176, (2017)
- [3] Maitraye D, Nusrat J M, Sharmin A, Et al., A novel secret sharing approach for privacy-preserving authenticated disease risk queries in genomic databases, Proceedings of the 42nd Annual International Conference on Computer Software and Applications (COMPSAC 2018), pp. 645-654, (2018)
- [4] Liu H, Li X H, Xu M F, Et al., A fair data access control towards rational users in cloud storage, Information Sciences, 418, pp. 258-271, (2017)
- [5] Leon J H, Gamze T, Zekeriya E., BAdASS: Preserving privacy in behavioural advertising with applied secret sharing, Proceedings of the 12th International Conference on Provable Security (ProvSec 2018), pp. 397-405, (2018)
- [6] Mahdi C., Nearly optimal robust secret sharing, Designs, Codes and Cryptography, 87, 8, pp. 1777-1796, (2019)
- [7] Halpern J, Teague V., Rational secret sharing and multiparty computation: Extended abstract, Proceedings of the 36th Annual ACM Symposium on Theory of Computing (STOC 2004), pp. 623-632, (2004)
- [8] Dodis Y, Rabin T., Cryptography and Game Theory, (2007)
- [9] Katz J., Bridging game theory and cryptography: Recent results and future directions, Proceedings of the 5th International Conference on Theory of Cryptography (TCC 2008), pp. 251-272, (2008)
- [10] Nanavati N R, Jinwala D C., A game theory based repeated rational secret sharing scheme for privacy preserving distributed data mining, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), pp. 512-517, (2013)